← Back to Explore
sublimehighRule
Attachment: .csproj with suspicious commands
Attached .csproj file contains suspicious commands.
Detection Query
type.inbound
and any(attachments,
.file_extension == "csproj"
and any(file.explode(.),
(
(any(.scan.strings.strings, strings.contains(., 'DllImport')))
and (
any(.scan.strings.strings,
strings.icontains(., 'CreateProcess')
)
)
)
)
)
Data Sources
Email MessagesEmail HeadersEmail Attachments
Platforms
email
Tags
Suspicious attachment
Raw Content
name: "Attachment: .csproj with suspicious commands"
description: |
Attached .csproj file contains suspicious commands.
references:
- "https://delivr.to/payloads?id=9d80cf8d-fb68-40fb-8969-4b11f3a29c9f"
type: "rule"
severity: "high"
source: |
type.inbound
and any(attachments,
.file_extension == "csproj"
and any(file.explode(.),
(
(any(.scan.strings.strings, strings.contains(., 'DllImport')))
and (
any(.scan.strings.strings,
strings.icontains(., 'CreateProcess')
)
)
)
)
)
tags:
- "Suspicious attachment"
attack_types:
- "Malware/Ransomware"
tactics_and_techniques:
- "Evasion"
- "Scripting"
detection_methods:
- "File analysis"
id: "fe45b81d-43df-52fc-9bf8-79824819fb51"