• delivr.to Feed
High Severity

Attachment: RTF with Embedded OLE Object (Unsolicited)

Labels

No labels.

Description

An RTF file with an embedded OLE object from an unsolicited source. This format could be used to deliver a weaponized RTF file, such as CVE-2025-21298.

@delivr_to
Created Jan 22nd, 2025 • Last updated Jan 22nd, 2025
Feed Source
delivr.to Feed
Source
type.inbound

and any(attachments,
    (
        // RTF is a direct attachment or this is an archive format
        .file_type == "rtf"
        or .file_extension in $file_extensions_common_archives
    ) 
    and any(file.explode(.),
        // The file is an RTF
        .file_extension == "rtf" and 
        
        //   {\rtf1{\object\objhtml\objw1\objh1\objupdate\rsltpict{\*\objclass delivr}{\*\objdata ...
        any(.scan.strings.strings, strings.ilike(., "*\\object*")) and 
        any(.scan.strings.strings, strings.ilike(., "*\\objhtml*")) and 
        any(.scan.strings.strings, strings.ilike(., "*\\objupdate*")) and 
        any(.scan.strings.strings, strings.ilike(., "*\\objdata*"))
    )
)
and (
    (
        not profile.by_sender_email().solicited
        and profile.by_sender_email().prevalence in ("new", "outlier")
    )
    or (
        profile.by_sender_email().any_messages_malicious_or_spam
        and not profile.by_sender_email().any_false_positives
    )
    or sender.email.domain.domain == "delivrto.me"
)
MQL Rule Console
DocsLearning Labs

Playground

Test against your own EMLs or sample data.

Share

Post about this on your socials.

Get Started. Today.

Managed or self-managed. No MX changes.

Deploy and integrate a free Sublime instance in minutes.
Get Started