Detection Method: File analysis

File analysis breaks down and inspects file contents, formats, and embedded elements to uncover hidden threats. This method goes beyond basic file attributes, deeply examining the inner structure of files to find potentially malicious content that looks legitimate on the surface.
File analysis helps detect:
  • Malicious macros in Office documents (Word, Excel, PowerPoint)
  • Obfuscated scripts hidden in PDFs or other document types
  • Executable code disguised in non-executable files
  • Hidden text content using encoding or steganography
  • Suspicious metadata or file properties suggesting tampering
Rule Name & Severity
Last Updated
Author
Types, Tactics & Capabilities
Attachment: PDF with recipient email in link
2d ago
Mar 3rd, 2026
Sublime Security
/feeds/core/detection-rules/attachment-pdf-with-recipient-email-in-link-0399d08f
Attachment: PDF with a suspicious string and single URL
3d ago
Mar 2nd, 2026
Sublime Security
/feeds/core/detection-rules/attachment-pdf-with-a-suspicious-string-and-single-url-3bdbb7ad
Attachment: PDF Object Hash - Encrypted PDFs with fake payment notification
3d ago
Mar 2nd, 2026
Sublime Security
/feeds/core/detection-rules/attachment-pdf-object-hash-encrypted-pdfs-with-fake-payment-notification-a8a19bae
Attachment: Finance themed PDF with observed phishing template
3d ago
Mar 2nd, 2026
Sublime Security
/feeds/core/detection-rules/attachment-finance-themed-pdf-with-observed-phishing-template-c936f7cc
Attachment: PDF with suspicious link and action-oriented language
6d ago
Feb 27th, 2026
Sublime Security
/feeds/core/detection-rules/attachment-pdf-with-suspicious-link-and-action-oriented-language-816d33a0
Attachment: PDF with multistage landing - ClickUp abuse
6d ago
Feb 27th, 2026
Sublime Security
/feeds/core/detection-rules/attachment-pdf-with-multistage-landing-clickup-abuse-0dc40316
Attachment: PDF with ReportLab library and default metadata
6d ago
Feb 27th, 2026
Sublime Security
/feeds/core/detection-rules/attachment-pdf-with-reportlab-library-and-default-metadata-7094bfdd
Attachment: Encrypted PDF with credential theft body
7d ago
Feb 26th, 2026
Sublime Security
/feeds/core/detection-rules/attachment-encrypted-pdf-with-credential-theft-body-c9596c9a
Attachment: QR code with recipient targeting and special characters
12d ago
Feb 21st, 2026
Sublime Security
/feeds/core/detection-rules/attachment-qr-code-with-recipient-targeting-and-special-characters-fc9e1c09
Attachment: QR code with suspicious URL patterns in EML file
12d ago
Feb 21st, 2026
Sublime Security
/feeds/core/detection-rules/attachment-qr-code-with-suspicious-url-patterns-in-eml-file-2289acd5
Attachment: PDF with password in filename matching body text
14d ago
Feb 19th, 2026
Sublime Security
/feeds/core/detection-rules/attachment-pdf-with-password-in-filename-matching-body-text-2c9c3b24
Impersonation: Recipient organization in sender display name with credential theft image
16d ago
Feb 17th, 2026
Sublime Security
/feeds/core/detection-rules/impersonation-recipient-organization-in-sender-display-name-with-credential-theft-image-6abfb20e
Brand Impersonation: PayPal
20d ago
Feb 13th, 2026
Sublime Security
/feeds/core/detection-rules/brand-impersonation-paypal-a6b2ceee
Attachment: Self-sender PDF with minimal content and view prompt
21d ago
Feb 12th, 2026
Sublime Security
/feeds/core/detection-rules/attachment-self-sender-pdf-with-minimal-content-and-view-prompt-07670a8c
Brand impersonation: Dropbox
21d ago
Feb 12th, 2026
Sublime Security
/feeds/core/detection-rules/brand-impersonation-dropbox-61f11d12
Attachment: cmd file extension
24d ago
Feb 9th, 2026
Sublime Security
/feeds/core/detection-rules/attachment-cmd-file-extension-a902b8ed
Attachment: Legal themed message or PDF with suspicious indicators
28d ago
Feb 5th, 2026
Sublime Security
/feeds/core/detection-rules/attachment-legal-themed-message-or-pdf-with-suspicious-indicators-19133301
macOS malware: Compiled AppleScript with document double-extension
28d ago
Feb 5th, 2026
Sublime Security
/feeds/core/detection-rules/macos-malware-compiled-applescript-with-document-double-extension-9669c169
Attachment: PDF contains W9 or invoice YARA signatures
29d ago
Feb 4th, 2026
Sublime Security
/feeds/core/detection-rules/attachment-pdf-contains-w9-or-invoice-yara-signatures-9a8e8a98
Attachment: QR code with encoded recipient targeting and redirect indicators
1mo ago
Jan 30th, 2026
Sublime Security
/feeds/core/detection-rules/attachment-qr-code-with-encoded-recipient-targeting-and-redirect-indicators-5d51e565