Adobe branded PDF file linking to a password-protected file from untrusted sender
Attachment: 7z Archive Containing RAR File
Attachment: Any HTML file within archive (unsolicited)
Attachment: Any .sap file (unsolicited)
Attachment: Archive containing disallowed file type
Attachment: Archive containing HTML file with file scheme link
Attachment: Archive with embedded CHM file
Attachment: Archive with embedded EXE file
Attachment: Archive with pdf, txt and wsf files
Attachment: Base64 encoded bash command in filename
Attachment: Calendar file with invisible Unicode characters
Attachment: Calendar invite from recently registered domain
Attachment: Callback phishing solicitation via image file
Attachment: Callback phishing solicitation via pdf file
Attachment: Callback phishing solicitation via text-based file
Attachment: .csproj with suspicious commands
Attachment: DocX embedded binary
Attachment: DOCX with hyperlink targeting recipient address
Attachment: Double base64-encoded zip file in HTML smuggling attachment
Attachment: Embedded VBScript in MHT file (unsolicited)
Attachment: EML containing a base64 encoded script
Attachment: EML file contains HTML attachment with login portal indicators
Attachment: EML file with HTML attachment (unsolicited)
Attachment: EML file with IPFS links
Attachment: EML with embedded Javascript in SVG file
Attachment: EML with Encrypted ZIP
Attachment: EML with link to credential phishing page
Attachment: EML with SharePoint files shared from GoDaddy federated tenants
Attachment: EML with Sharepoint link likely unrelated to sender
Attachment: EML with suspicious indicators
Attachment: Emotet heavily padded doc in zip file
Attachment: Employment contract update with suspicious file naming
Attachment: Encrypted PDF with credential theft body
Attachment: Encrypted zip file with payment-related lure
Attachment: Excel file with suspicious template identifier
Attachment: Excel Web Query File (IQY)
Attachment: Fake attachment image lure
Attachment: Fake Slack installer
Attachment: Fake Zoom installer
Attachment: File execution via Javascript
Attachment: Filename containing Unicode braille pattern blank character
Attachment: Filename containing Unicode right-to-left override character
Attachment: Finance themed PDF with observed phishing template
Attachment: HTML attachment with Javascript location
Attachment: HTML file contains exclusively Javascript
Attachment: HTML file with excessive 'const' declarations and abnormally long timeouts
Attachment: HTML file with excessive padding and suspicious patterns
Attachment: HTML smuggling 'body onload' linking to suspicious destination
Attachment: HTML smuggling 'body onload' with high entropy and suspicious text
Attachment: HTML smuggling with atob and high entropy via calendar invite