EXPLORE
← Back to Explore
sublimehighRule

Link to auto-downloaded file with Google Drive branding

A link in the body of the email downloads a file from a site that uses Google Drive branding as employed by threat actors, such as Qakbot.

Detection Query

type.inbound
and length(body.links) < 10
and any(body.links,
        // This isn't a Google Drive link
        .href_url.domain.root_domain != "google.com"
        and 

        // There are files downloaded
        length(ml.link_analysis(.).files_downloaded) > 0
        and 

        // Google Drive branding
        ml.link_analysis(.).credphish.brand.name == "GoogleDrive"
        and ml.link_analysis(.).credphish.brand.confidence == "high"
        and 

        // Hi from Qakbot
        any(file.explode(ml.link_analysis(.).screenshot),
            any([
                  "the file is not displayed correctly",
                  "use local downloaded file"
                ],
                strings.icontains(..scan.ocr.raw, .)
            )
        )
)
and (
  not profile.by_sender().solicited
  or (
    profile.by_sender().any_messages_malicious_or_spam
    and not profile.by_sender().any_messages_benign
  )
)

Data Sources

Email MessagesEmail HeadersEmail Attachments

Platforms

email

Tags

Malfam: QakBot
Raw Content
name: "Link to auto-downloaded file with Google Drive branding"
description: |
  A link in the body of the email downloads a file from a site that uses Google Drive branding as employed by threat actors, such as Qakbot.
type: "rule"
references:
  - "https://delivr.to/payloads?id=ef39f124-6766-491c-a46c-00f2b60aa7a7"
  - "https://twitter.com/pr0xylife/status/1598016053787123713"
severity: "high"
source: |
  type.inbound
  and length(body.links) < 10
  and any(body.links,
          // This isn't a Google Drive link
          .href_url.domain.root_domain != "google.com"
          and 
  
          // There are files downloaded
          length(ml.link_analysis(.).files_downloaded) > 0
          and 
  
          // Google Drive branding
          ml.link_analysis(.).credphish.brand.name == "GoogleDrive"
          and ml.link_analysis(.).credphish.brand.confidence == "high"
          and 
  
          // Hi from Qakbot
          any(file.explode(ml.link_analysis(.).screenshot),
              any([
                    "the file is not displayed correctly",
                    "use local downloaded file"
                  ],
                  strings.icontains(..scan.ocr.raw, .)
              )
          )
  )
  and (
    not profile.by_sender().solicited
    or (
      profile.by_sender().any_messages_malicious_or_spam
      and not profile.by_sender().any_messages_benign
    )
  )
tags:
  - "Malfam: QakBot"
attack_types:
  - "Malware/Ransomware"
tactics_and_techniques:
  - "Impersonation: Brand"
  - "Social engineering"
detection_methods:
  - "Content analysis"
  - "File analysis"
  - "Optical Character Recognition"
  - "URL analysis"
  - "URL screenshot"
id: "4b5343be-9b10-58a3-8d14-a1bae1eebc62"