← Back to Explore
sublimelowRule
Attachment: PDF generated with wkhtmltopdf tool and default title
Detects PDF attachments that were generated using the wkhtmltopdf conversion tool, which converts HTML/CSS to PDF. This tool is commonly used by attackers to create legitimate-looking PDF documents from web content for social engineering purposes.
Detection Query
type.inbound
and any(filter(attachments, .file_extension == "pdf"),
strings.istarts_with(beta.parse_exif(.).producer, "Qt")
and strings.icontains(beta.parse_exif(.).creator, "wkhtmltopdf")
and beta.parse_exif(.).title == "Document"
)
Data Sources
Email MessagesEmail HeadersEmail Attachments
Platforms
email
Tags
Attack surface reduction
Raw Content
name: "Attachment: PDF generated with wkhtmltopdf tool and default title"
description: "Detects PDF attachments that were generated using the wkhtmltopdf conversion tool, which converts HTML/CSS to PDF. This tool is commonly used by attackers to create legitimate-looking PDF documents from web content for social engineering purposes."
type: "rule"
severity: "low"
source: |
type.inbound
and any(filter(attachments, .file_extension == "pdf"),
strings.istarts_with(beta.parse_exif(.).producer, "Qt")
and strings.icontains(beta.parse_exif(.).creator, "wkhtmltopdf")
and beta.parse_exif(.).title == "Document"
)
attack_types:
- "BEC/Fraud"
- "Callback Phishing"
- "Credential Phishing"
- "Malware/Ransomware"
tags:
- "Attack surface reduction"
tactics_and_techniques:
- "PDF"
- "Evasion"
detection_methods:
- "File analysis"
- "Exif analysis"
id: "64e6c8a8-b75b-5c43-acb8-765ce05dca36"