Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Enable scanning of application/hta per default #89

Closed
Clevero opened this issue Jul 26, 2019 · 3 comments
Closed

Enable scanning of application/hta per default #89

Clevero opened this issue Jul 26, 2019 · 3 comments
Assignees

Comments

@Clevero
Copy link
Contributor

Clevero commented Jul 26, 2019

Malware in the form of a .hta file are not covered by default

Expected Behavior

Files with the mime type of application/hta are scanned per default

Context (Environment)

Discovered some older mails before peekaboo was in production and tested those against peekaboo and they were not filtered because text/html was on the whitelist of mime types

Detailed Description

Example files:
https://sandbox.pikker.ee/analysis/1151123/summary/
https://www.virustotal.com/gui/file/f5d7c7b182b6db23f2bba773d39ba78730fc5ad8171e3dc06e8d02ea885ff1f9/details

I can also provide the original .hta files if needed

@Clevero Clevero changed the title Enable scanning of text/html (.hta) per default Enable scanning of application/hta per default Jul 26, 2019
@Jack28
Copy link
Member

Jack28 commented Aug 6, 2019

We will get around to this, stay tuned ;-)

@Jack28 Jack28 self-assigned this Aug 27, 2019
@Jack28
Copy link
Member

Jack28 commented Aug 27, 2019

With the new generic ruleset you can create an expression to test .hta files

@Jack28
Copy link
Member

Jack28 commented Oct 30, 2019

For example:

sample.file_extension == 'hta' and cuckooreport.score > 4 -> bad

This will enforce Cuckoo analysis for .hta files and flag them as bad if the score is greater than 4

Feel free to reopen

@Jack28 Jack28 closed this as completed Oct 30, 2019
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants