• Sublime Core Feed
High Severity

Attachment: HTML Attachment with Javascript location

Labels

Credential Phishing
Malware/Ransomware
Evasion
HTML smuggling
Scripting
Archive analysis
Content analysis
File analysis
Javascript analysis
HTML analysis

Description

Recursively scans files and archives to detect HTML smuggling techniques.

References

No references.

@vector_sec
Created Aug 17th, 2023 • Last updated Aug 21st, 2023
Feed Source
Sublime Core Feed
Source
GitHub
type.inbound
and any(attachments,
        (
          .file_extension in~ ("html", "htm", "shtml", "dhtml")
          or .file_extension in~ $file_extensions_common_archives
          or .file_type == "html"
        )
        and .size <= 5000
        and any(file.explode(.),
                any(.scan.javascript.identifiers, . == "location")
                and length(.scan.javascript.identifiers) < 100
        )
)
MQL Rule Console
DocsLearning Labs

Playground

Test against your own EMLs or sample data.

Share

Post about this on your socials.

Get Started. Today.

Managed or self-managed. No MX changes.

Get Started