(YARA) YARA_SMTP_Exfiltration
rule Detect_SMTP_Exfiltration
{
meta:
description = "Detects potential SMTP exfiltration scripts"
author = "Unprotect"
date = "2025-01-09"
reference = "Example based on SMTP exfiltration code"
strings:
$smtp_client = "SmtpClient" nocase
$mail_message = "MailMessage" nocase
$email_subject = "Exfiltrated Data" nocase
$attachment = "Attachment" nocase
$smtp_server = "smtp.gmail.com" nocase
$email_address = /[a-z0-9._%+-]+@[a-z0-9.-]+\.[a-z]{2,}/ nocase
$hardcoded_password = /"[a-z0-9!@#$%^&*()_+={}\[\]:;'<>,.?\/-]{6,}"/ nocase
condition:
$smtp_client and $mail_message and $email_subject and $attachment and $smtp_server and $email_address and $hardcoded_password
}
Associated Techniques
Technique Name | Technique ID's | Snippet(s) | OS |
---|---|---|---|
Exfiltration via SMTP | U0912 |
Created
January 9, 2025
Last Revised
January 9, 2025