Detection Method: YARA

YARA detection scans email messages, attachments, and extracted content for known malware, phishing patterns, or suspicious code. This detection method uses the YARA pattern matching language, which lets your security team create specific signatures based on known malicious patterns, both textual and binary.
YARA detection can identify:
  • Known malware families based on their distinctive code patterns
  • Obfuscated scripts or executables using encoding techniques
  • Common phishing templates with structural similarities
  • Suspicious binary patterns that may indicate malicious functionality
  • Custom threats targeting specific organizations with tailored YARA rules
Rule Name & Severity
Last Updated
Author
Types, Tactics & Capabilities
Attachment: Password-protected PDF with fake document indicators
2d ago
Jan 21st, 2026
Sublime Security
/feeds/core/detection-rules/attachment-password-protected-pdf-with-fake-document-indicators-b45e4440
Attachment: HTML file with reference to recipient and suspicious patterns
11d ago
Jan 12th, 2026
Sublime Security
/feeds/core/detection-rules/attachment-html-file-with-reference-to-recipient-and-suspicious-patterns-5333493d
Attachment: EML with Encrypted ZIP
11d ago
Jan 12th, 2026
Sublime Security
/feeds/core/detection-rules/attachment-eml-with-encrypted-zip-6897a8f7
Link to auto-downloaded disk image in encrypted zip
11d ago
Jan 12th, 2026
@ajpc500
/feeds/core/detection-rules/link-to-auto-downloaded-disk-image-in-encrypted-zip-b50f0cb1
Attachment: WinRAR CVE-2025-8088 exploitation
11d ago
Jan 12th, 2026
Sublime Security
/feeds/core/detection-rules/attachment-winrar-cve-2025-8088-exploitation-33b3a82b
Attachment: Malicious OneNote commands
11d ago
Jan 12th, 2026
@Kyle_Parrish_
/feeds/core/detection-rules/attachment-malicious-onenote-commands-7319f0eb
Attachment: HTML file with excessive padding and suspicious patterns
11d ago
Jan 12th, 2026
Sublime Security
/feeds/core/detection-rules/attachment-html-file-with-excessive-padding-and-suspicious-patterns-0a6aee1e
Link to auto-download of a suspicious file type (unsolicited)
11d ago
Jan 12th, 2026
Sublime Security
/feeds/core/detection-rules/link-to-auto-download-of-a-suspicious-file-type-unsolicited-67ae2152
Encrypted Microsoft Office files from untrusted sender
5mo ago
Aug 5th, 2025
Sublime Security
/feeds/core/detection-rules/encrypted-microsoft-office-files-from-untrusted-sender-eb7b26e7
Attachment: DocX embedded binary
5mo ago
Aug 5th, 2025
Sublime Security
/feeds/core/detection-rules/attachment-docx-embedded-binary-feff0241
Link to auto-downloaded DMG in encrypted zip
6mo ago
Jul 16th, 2025
Sublime Security
/feeds/core/detection-rules/link-to-auto-downloaded-dmg-in-encrypted-zip-43af98d3
Attachment with unscannable encrypted zip (unsolicited)
6mo ago
Jul 16th, 2025
Sublime Security
/feeds/core/detection-rules/attachment-with-unscannable-encrypted-zip-unsolicited-529d4a9a
Attachment: Malformed OLE file
2y ago
Nov 25th, 2024
Sublime Security
/feeds/core/detection-rules/attachment-malformed-ole-file-5aadc68f
Attachment: JavaScript file with suspicious base64-encoded executable
2y ago
Apr 1st, 2024
Sublime Security
/feeds/core/detection-rules/attachment-javascript-file-with-suspicious-base64-encoded-executable-b8db0cf3
Attachment: HTML smuggling with embedded base64-encoded executable
2y ago
Mar 25th, 2024
Sublime Security
/feeds/core/detection-rules/attachment-html-smuggling-with-embedded-base64-encoded-executable-b00c4527
Attachment: Archive with embedded EXE file
2y ago
Feb 27th, 2024
Sublime Security
/feeds/core/detection-rules/attachment-archive-with-embedded-exe-file-e2b0ad86
Attachment: RTF with embedded content
2y ago
Feb 26th, 2024
@amitchell516
/feeds/core/detection-rules/attachment-rtf-with-embedded-content-61dd2dd7
Attachment: Archive contains DLL-loading macro
3y ago
Dec 28th, 2023
Sublime Security
/feeds/core/detection-rules/attachment-archive-contains-dll-loading-macro-3a193f5f