Detection Method: File analysis

File analysis breaks down and inspects file contents, formats, and embedded elements to uncover hidden threats. This method goes beyond basic file attributes, deeply examining the inner structure of files to find potentially malicious content that looks legitimate on the surface.
File analysis helps detect:
  • Malicious macros in Office documents (Word, Excel, PowerPoint)
  • Obfuscated scripts hidden in PDFs or other document types
  • Executable code disguised in non-executable files
  • Hidden text content using encoding or steganography
  • Suspicious metadata or file properties suggesting tampering
Rule Name & Severity
Last Updated
Author
Types, Tactics & Capabilities
Brand Impersonation: PayPal
4d ago
Feb 13th, 2026
Sublime Security
/feeds/core/detection-rules/brand-impersonation-paypal-a6b2ceee
Attachment: Self-sender PDF with minimal content and view prompt
5d ago
Feb 12th, 2026
Sublime Security
/feeds/core/detection-rules/attachment-self-sender-pdf-with-minimal-content-and-view-prompt-07670a8c
Brand impersonation: Dropbox
5d ago
Feb 12th, 2026
Sublime Security
/feeds/core/detection-rules/brand-impersonation-dropbox-61f11d12
Attachment: QR code with recipient targeting and special characters
8d ago
Feb 9th, 2026
Sublime Security
/feeds/core/detection-rules/attachment-qr-code-with-recipient-targeting-and-special-characters-fc9e1c09
Attachment: cmd file extension
8d ago
Feb 9th, 2026
Sublime Security
/feeds/core/detection-rules/attachment-cmd-file-extension-a902b8ed
Attachment: Legal themed message or PDF with suspicious indicators
12d ago
Feb 5th, 2026
Sublime Security
/feeds/core/detection-rules/attachment-legal-themed-message-or-pdf-with-suspicious-indicators-19133301
macOS malware: Compiled AppleScript with document double-extension
12d ago
Feb 5th, 2026
Sublime Security
/feeds/core/detection-rules/macos-malware-compiled-applescript-with-document-double-extension-9669c169
Attachment: PDF contains W9 or invoice YARA signatures
13d ago
Feb 4th, 2026
Sublime Security
/feeds/core/detection-rules/attachment-pdf-contains-w9-or-invoice-yara-signatures-9a8e8a98
Attachment: QR code with encoded recipient targeting and redirect indicators
18d ago
Jan 30th, 2026
Sublime Security
/feeds/core/detection-rules/attachment-qr-code-with-encoded-recipient-targeting-and-redirect-indicators-5d51e565
Attachment: ICS with embedded Javascript in SVG file
19d ago
Jan 29th, 2026
Sublime Security
/feeds/core/detection-rules/attachment-ics-with-embedded-javascript-in-svg-file-d5201a19
Attachment: Excel file with document sharing lure created by Go Excelize
19d ago
Jan 29th, 2026
Sublime Security
/feeds/core/detection-rules/attachment-excel-file-with-document-sharing-lure-created-by-go-excelize-dfaf267f
Attachment: Office file with document sharing and browser instruction lures
19d ago
Jan 29th, 2026
Sublime Security
/feeds/core/detection-rules/attachment-office-file-with-document-sharing-and-browser-instruction-lures-b1250a4b
Attachment: Employment contract update with suspicious file naming
20d ago
Jan 28th, 2026
Sublime Security
/feeds/core/detection-rules/attachment-employment-contract-update-with-suspicious-file-naming-8bdcd2da
Attachment: MS Office or RTF file with Shell.Explorer.1 com object with embedded LNK
20d ago
Jan 28th, 2026
Sublime Security
/feeds/core/detection-rules/attachment-ms-office-or-rtf-file-with-shellexplorer1-com-object-with-embedded-lnk-53a29f61
Link: Microsoft Dynamics 365 form phishing
21d ago
Jan 27th, 2026
Sublime Security
/feeds/core/detection-rules/link-microsoft-dynamics-365-form-phishing-f72b9085
Attachment: Fake lawyer & sports agent identities
22d ago
Jan 26th, 2026
Sublime Security
/feeds/core/detection-rules/attachment-fake-lawyer-and-sports-agent-identities-7d3a2478
Attachment: ICS file with meeting prefix
22d ago
Jan 26th, 2026
Sublime Security
/feeds/core/detection-rules/attachment-ics-file-with-meeting-prefix-383a5810
Callback phishing in body or attachment (untrusted sender)
26d ago
Jan 22nd, 2026
Sublime Security
/feeds/core/detection-rules/callback-phishing-in-body-or-attachment-untrusted-sender-b93c6f94
Callback phishing via calendar invite
26d ago
Jan 22nd, 2026
Sublime Security
/feeds/core/detection-rules/callback-phishing-via-calendar-invite-95c84360
Attachment: PDF with recipient email in link
27d ago
Jan 21st, 2026
Sublime Security
/feeds/core/detection-rules/attachment-pdf-with-recipient-email-in-link-0399d08f