High Severity
Link to auto-downloaded file with Adobe branding
Description
A link in the body of the email downloads a file from a site that uses Adobe branding as employed by threat actors, such as Qakbot.
References
Sublime Security
Created Aug 17th, 2023 • Last updated Apr 25th, 2024
Feed Source
Sublime Core Feed
Source
type.inbound
and any(body.links,
// There are files downloaded
length(ml.link_analysis(.).files_downloaded) > 0
and
// Adobe branding
ml.link_analysis(.).credphish.brand.name == "Adobe"
and ml.link_analysis(.).credphish.brand.confidence == "high"
and
// Qakbot text for user coercion
any(file.explode(ml.link_analysis(.).screenshot),
all(["the file is not displayed correctly", "document password"],
strings.icontains(..scan.ocr.raw, .)
)
)
)
and (
not profile.by_sender().solicited
or (
profile.by_sender().any_messages_malicious_or_spam
and not profile.by_sender().any_false_positives
)
)
Playground
Test against your own EMLs or sample data.