Attachment: Archive contains DLL-loading macro
Attachment: Archive with embedded EXE file
Attachment: DocX embedded binary
Attachment: EML with Encrypted ZIP
Attachment: HTML file with excessive padding and suspicious patterns
Attachment: HTML file with reference to recipient and suspicious patterns
Attachment: HTML smuggling with embedded base64-encoded executable
Attachment: JavaScript file with suspicious base64-encoded executable
Attachment: Malformed OLE file
Attachment: Malicious OneNote commands
Attachment: MS Office or RTF file with Shell.Explorer.1 com object with embedded LNK
Attachment: Password-protected PDF with fake document indicators
Attachment: PDF contains W9 or invoice YARA signatures
Attachment: PDF with CVE-2026-34621 lures
Attachment: PDF with JSFck obfuscation
Attachment: PDF With SAI Global ISO9001 Logo
Attachment: PDF with split QR code
Attachment: PDF with suspicious view document characteristics
Attachment: RTF with embedded content
Attachment: WinRAR CVE-2025-8088 exploitation
Attachment with unscannable encrypted zip (unsolicited)
Attachment: ZIP file with CVE-2026-0866 exploit
Encrypted Microsoft Office files from untrusted sender
Link to auto-downloaded disk image in encrypted zip
Link to auto-downloaded DMG in encrypted zip
Link to auto-download of a suspicious file type (unsolicited)