• Sublime Core Feed
High Severity

Attachment: JavaScript file with suspicious base64-encoded executable

Description

JavaScript attachment or compressed JavaScript file containing a base64 encoded executable.

References

No references.

Sublime Security
Created Apr 1st, 2024 • Last updated Apr 1st, 2024
Source
type.inbound
and any(attachments,
        (
          .file_extension in~ $file_extensions_common_archives
          or .file_extension in ("js", "jar")
        )
        and any(file.explode(.),
                (
                  (
                    .file_extension in ("js", "jar")
                    or any(.flavors.yara, . == "javascript_file")
                  )
                  and any(.flavors.yara, . == 'base64_pe')
                )
        )
)
MQL Rule Console
DocsLearning Labs

Playground

Test against your own EMLs or sample data.

Share

Post about this on your socials.

Get Started. Today.

Managed or self-managed. No MX changes.

Deploy and integrate a free Sublime instance in minutes.
Get Started