← Back to Explore
sublimehighRule
Attachment: Malformed OLE file
Attached OLE file (typically a Microsoft Office document) is malformed, possibly to evade traditional scanners and filters.
Detection Query
type.inbound
and any(attachments,
.file_extension in $file_extensions_macros
and any(file.explode(.),
any(.scan.yara.matches, .name == "MALFORMED_OLE_HEADER")
)
)
Data Sources
Email MessagesEmail HeadersEmail Attachments
Platforms
email
Raw Content
name: "Attachment: Malformed OLE file"
description: |
Attached OLE file (typically a Microsoft Office document) is malformed, possibly to evade traditional scanners and filters.
references:
- "https://x.com/anyrun_app/status/1861024182210900357"
type: "rule"
severity: "high"
source: |
type.inbound
and any(attachments,
.file_extension in $file_extensions_macros
and any(file.explode(.),
any(.scan.yara.matches, .name == "MALFORMED_OLE_HEADER")
)
)
attack_types:
- "Credential Phishing"
- "Malware/Ransomware"
tactics_and_techniques:
- "Evasion"
detection_methods:
- "File analysis"
- "YARA"
id: "5aadc68f-9a67-5fd0-a825-3d7e1c5bfcb3"