Attachment: HTML smuggling 'body onload' linking to suspicious destination
Attachment: HTML smuggling 'body onload' with high entropy and suspicious text
Attachment: HTML smuggling with atob and high entropy via calendar invite
Attachment: HTML smuggling with base64 encoded ZIP file
Attachment: HTML smuggling with concatenation obfuscation
Attachment: HTML smuggling with decimal encoding
Attachment: HTML smuggling with embedded base64-encoded executable
Attachment: HTML smuggling with embedded base64-encoded ISO
Attachment: HTML smuggling with eval and atob
Attachment: HTML smuggling with eval and atob via calendar invite
Attachment: HTML smuggling with excessive line break obfuscation
Attachment: HTML smuggling with excessive string concatenation and suspicious patterns
Attachment: HTML smuggling with fromCharCode and other signals
Attachment: HTML smuggling with hex strings
Attachment: HTML smuggling with high entropy and other signals
Attachment: HTML smuggling with raw array buffer
Attachment: HTML smuggling with RC4 decryption
Attachment: HTML smuggling with ROT13
Attachment: HTML smuggling with setTimeout
Attachment: HTML smuggling with unescape
Attachment: HTML with emoji-to-character map
Attachment: HTML with hidden body
Attachment: HTML with JavaScript functions for HTTP requests
Attachment: ICS calendar file with QR code containing recipient email address
Attachment: ICS calendar with embedded file from internal sender with SPF failure
Attachment: ICS file with AWS Lambda URL
Attachment: ICS file with excessive custom properties
Attachment: ICS file with non-Gregorian calendar scale
Attachment: ICS with embedded document
Attachment: ICS with embedded Javascript in SVG file
Attachment: ICS with employee policy review lure
Attachment: JavaScript file with suspicious base64-encoded executable
Attachment: Legal themed message or PDF with suspicious indicators
Attachment: Link file with UNC path
Attachment: Link to Doubleclick.net open redirect
Attachment: Macro files containing MHT content
Attachment: Malformed OLE file
Attachment: MSI installer file
Attachment: MS Office or RTF file with Shell.Explorer.1 com object with embedded LNK
Attachment: Office file contains OLE relationship to credential phishing page
Attachment: Office file with credential phishing URLs
Attachment: Office file with document sharing and browser instruction lures
Attachment: Office file with suspicious function calls or downloaded file path
Attachment: OLE external relationship containing file scheme link to executable filetype
Attachment: OLE external relationship containing file scheme link to IP address
Attachment: Password-protected PDF with fake document indicators
Attachment: PDF file with low reputation links to suspicious filetypes (unsolicited)
Attachment: PDF file with low reputation link to ZIP file (unsolicited)
Attachment: PDF generated with wkhtmltopdf tool and default title
Attachment: PDF Object Hash - Encrypted PDFs with fake payment notification