Skip to content

Commit

Permalink
Sync from PR#2107
Browse files Browse the repository at this point in the history
Create suspicious_sender_display_name_procedurally_generated_blob.yml by @morriscode
#2107
Source SHA be93a3e
Triggered by @morriscode
  • Loading branch information
Sublime Rule Testing Bot committed Nov 12, 2024
1 parent ffee376 commit 9a013c7
Showing 1 changed file with 34 additions and 0 deletions.
Original file line number Diff line number Diff line change
@@ -0,0 +1,34 @@
name: "Suspicious sender display name with long procedurally generated text blob"
description: "This rule identifies sender display names containing long strings of nonsensical or procedurally generated characters, which are often used in phishing or spam campaigns for campaign tracking and identification, as well as to bypass detection filters."
type: "rule"
severity: "medium"
source: |
type.inbound
and regex.icontains(sender.display_name, '\b[\w\p{L}\p{N}]{35,}\b')
// negate org domains unless they fail DMARC authentication
and (
(
sender.email.domain.root_domain in $org_domains
and not headers.auth_summary.dmarc.pass
)
or sender.email.domain.root_domain not in $org_domains
)
// negate highly trusted sender domains unless they fail DMARC authentication
and (
(
sender.email.domain.root_domain in $high_trust_sender_root_domains
and not headers.auth_summary.dmarc.pass
)
or sender.email.domain.root_domain not in $high_trust_sender_root_domains
)
attack_types:
- "Credential Phishing"
tactics_and_techniques:
- "Evasion"
detection_methods:
- "Content analysis"
- "Sender analysis"
id: "2a40b043-52dc-59ca-8519-3793e8817d07"
testing_pr: 2107
testing_sha: be93a3eb886dfc635a5ea081ce50845748ff75c6

0 comments on commit 9a013c7

Please sign in to comment.