On 12/07/2021 07:40, Dave Funk wrote:
On Sun, 11 Jul 2021, Kevin A. McGrail wrote:

On 7/11/2021 5:11 PM, John Hardin wrote:
"The other parts contain an application/vnd.ms-officetheme and an application/x-mso file. Which (in addition to the text/xml files) are used by Microsoft Word to load the embedded Word document."

Would the presence of all three of those MIME types be a scorable indicator?

If you can get me a spample, I'm sure I can tell you but in general we block macros so that's all that's needed.  Likely the OLEVBMacro plugin and KAM ruleset is blocking all of these already if you have the plugin enabled.

Aren't there already rules and heuristics in ClamAV for detecting VBmacros in office docs?

I've got two copies of ClamAV running, one used as a blocking direct milter with default rules and another one feeding into the SA "clamav.pm" plugin with extra rules and heuristics/algorithms enabled.

I quarantine emails that are caught by ClamAV with 'ScanOLE2 true' and 'AlertOLE2Macros true'; these are then checked by command-line tool mraptor (part of olevba) to see if the macros are truly malicious.

I will try the OLEVBMacro plugin alongside, thanks for the heads up.


Reply via email to