Attachment: Any .sap file (unsolicited)
Attachment: Archive contains DLL-loading macro
Attachment: cmd file extension
Attachment: .csproj with suspicious commands
Attachment: CVE-2021-40444 - MSHTML Remote Code Execution Vulnerability
Attachment: CVE-2025-24071 - Microsoft Windows File Explorer Spoofing Vulnerability
Attachment: Double base64-encoded zip file in HTML smuggling attachment
Attachment: Embedded Javascript in SVG file
Attachment: Embedded VBScript in MHT file (unsolicited)
Attachment: EML containing a base64 encoded script
Attachment: EML with embedded Javascript in SVG file
Attachment: Encrypted Microsoft Office file (unsolicited)
Attachment: Fake Slack installer
Attachment: Fake Zoom installer
Attachment: File execution via Javascript
Attachment: HTML attachment with Javascript location
Attachment: HTML attachment with login portal indicators
Attachment: HTML file contains exclusively Javascript
Attachment: HTML file with excessive 'const' declarations and abnormally long timeouts
Attachment: HTML file with reference to recipient and suspicious patterns
Attachment: HTML smuggling 'body onload' linking to suspicious destination
Attachment: HTML smuggling 'body onload' with high entropy and suspicious text
Attachment: HTML smuggling with atob and high entropy
Attachment: HTML smuggling with atob and high entropy via calendar invite
Attachment: HTML smuggling with auto-downloaded file
Attachment: HTML smuggling with base64 encoded JavaScript function
Attachment: HTML smuggling with base64 encoded ZIP file
Attachment: HTML smuggling with concatenation obfuscation
Attachment: HTML smuggling with decimal encoding
Attachment: HTML smuggling with embedded base64 streamed file download
Attachment: HTML smuggling with eval and atob
Attachment: HTML smuggling with eval and atob via calendar invite
Attachment: HTML smuggling with excessive line break obfuscation
Attachment: HTML smuggling with excessive string concatenation and suspicious patterns
Attachment: HTML smuggling with fromCharCode and other signals
Attachment: HTML smuggling with high entropy and other signals
Attachment: HTML smuggling with RC4 decryption
Attachment: HTML smuggling with ROT13
Attachment: HTML smuggling with setTimeout
Attachment: HTML smuggling with unescape
Attachment: HTML with emoji-to-character map
Attachment: HTML with hidden body
Attachment: HTML with JavaScript functions for HTTP requests
Attachment: HTML with obfuscation and recipient's email in JavaScript strings
Attachment: ICS with embedded Javascript in SVG file
Attachment: JavaScript file with suspicious base64-encoded executable
Attachment: LNK with embedded content
Attachment: Macro files containing MHT content
Attachment: Macro with suspected use of COM ShellBrowserWindow object for process creation
Attachment: Malicious OneNote commands