type.inbound
and any(attachments,
.file_extension in $file_extensions_common_archives
and any(file.explode(.),
any(.scan.zip.attempted_files,
regex.icontains(., '(\.\.\s\.\\){1,}')
) or
any(.scan.yara.matches,
.name == "SUSP_archive_CVE_2025_6218_Jul25"
)
)
)
and (
(
// unsolicited
not profile.by_sender_email().solicited
// negate highly trusted sender domains unless they fail DMARC authentication
and (
(
sender.email.domain.root_domain in $high_trust_sender_root_domains
and (
any(distinct(headers.hops, .authentication_results.dmarc is not null),
strings.ilike(.authentication_results.dmarc, "*fail")
)
)
)
or sender.email.domain.root_domain not in $high_trust_sender_root_domains
)
)
or sender.email.domain.domain == "delivrto.me"
)
Playground
Test against your own EMLs or sample data.