Attachment: Excel file with document sharing lure created by Go Excelize
Attachment: Excel file with suspicious template identifier
Attachment: Excel Web Query File (IQY)
Attachment: Fake attachment image lure
Attachment: Fake lawyer & sports agent identities
Attachment: Fake scan-to-email
Attachment: Fake secure message and suspicious indicators
Attachment: Fake Slack installer
Attachment: Fake voicemail via PDF
Attachment: Fake Zoom installer
Attachment: Fictitious invoice using LinkedIn's address
Attachment: File execution via Javascript
Attachment: Filename containing Unicode braille pattern blank character
Attachment: Filename containing Unicode right-to-left override character
Attachment: Finance themed PDF with observed phishing template
Attachment: HTML attachment with Javascript location
Attachment: HTML attachment with login portal indicators
Attachment: HTML file contains exclusively Javascript
Attachment: HTML file with excessive 'const' declarations and abnormally long timeouts
Attachment: HTML file with excessive padding and suspicious patterns
Attachment: HTML file with reference to recipient and suspicious patterns
Attachment: HTML smuggling 'body onload' linking to suspicious destination
Attachment: HTML smuggling 'body onload' with high entropy and suspicious text
Attachment: HTML smuggling Microsoft sign in
Attachment: HTML smuggling with atob and high entropy
Attachment: HTML smuggling with atob and high entropy via calendar invite
Attachment: HTML smuggling with auto-downloaded file
Attachment: HTML smuggling with base64 encoded JavaScript function
Attachment: HTML smuggling with base64 encoded ZIP file
Attachment: HTML smuggling with concatenation obfuscation
Attachment: HTML smuggling with decimal encoding
Attachment: HTML smuggling with embedded base64-encoded executable
Attachment: HTML smuggling with embedded base64-encoded ISO
Attachment: HTML smuggling with embedded base64 streamed file download
Attachment: HTML smuggling with eval and atob
Attachment: HTML smuggling with eval and atob via calendar invite
Attachment: HTML smuggling with excessive line break obfuscation
Attachment: HTML smuggling with excessive string concatenation and suspicious patterns
Attachment: HTML smuggling with fromCharCode and other signals
Attachment: HTML smuggling with hex strings
Attachment: HTML smuggling with high entropy and other signals
Attachment: HTML smuggling with raw array buffer
Attachment: HTML smuggling with RC4 decryption
Attachment: HTML smuggling with ROT13
Attachment: HTML smuggling with setTimeout
Attachment: HTML smuggling with unescape
Attachment: HTML with emoji-to-character map
Attachment: HTML with hidden body
Attachment: HTML with JavaScript functions for HTTP requests
Attachment: HTML with obfuscation and recipient's email in JavaScript strings