• Sublime Core Feed
Critical Severity

Attachment: CVE-2025-24071 - Microsoft Windows File Explorer Spoofing Vulnerability

Labels

Credential Phishing
Scripting
Macros
Exploit
Archive analysis
Content analysis
File analysis

Description

Detects a Windows library file (.library-ms) containing a network path, either as a direct attachment or within an archive. This file type can be used to cause Windows to send NTLM hash to malicious network locations.

References

Sublime Security
Created Mar 21st, 2025 • Last updated Mar 21st, 2025
Feed Source
Sublime Core Feed
Source
GitHub
type.inbound
and any(attachments,
        // handle directly attached files first
        (
          .file_extension == "library-ms"
          // and contains a url with the \\
          and strings.icontains(file.parse_text(.).text, '<url>\\')
        )
        // handle library-ms files inside of archives
        or (
          .file_extension in $file_extensions_common_archives
          and any(file.explode(.),
                  // the exploded archive contained a file with the library-ms extension
                  .file_extension == "library-ms"
                  // and the strings in that file contain the required url variable
                  and any(.scan.strings.strings, strings.contains(., '<url>\\'))
          )
        )
)
MQL Rule Console
DocsLearning Labs

Playground

Test against your own EMLs or sample data.

Share

Post about this on your socials.

Get Started. Today.

Managed or self-managed. No MX changes.

Get Started