EXPLORE

EXPLORE DETECTIONS

🔍
8,011 detections found

Attachment: HTML smuggling with high entropy and other signals

Recursively scans files and archives to detect HTML smuggling techniques.

T1566.001T1204.002T1486T1036T1027+1
Sublimehigh

Attachment: HTML smuggling with raw array buffer

Recursively scans files and archives to detect HTML smuggling techniques.

T1566T1566.001T1566.002T1598T1204.002+3
Sublimehigh

Attachment: HTML smuggling with RC4 decryption

Potential HTML smuggling. The RC4 algorithm is used within inline JavaScript to decrypt the payload on-the-fly.

T1566T1566.001T1566.002T1598T1204.002+5
Sublimehigh

Attachment: HTML smuggling with ROT13

Potential HTML obfuscation attack based on suspicious JavaScript identifiers. Some attackers may use obfuscation techniques such as ROT13 to bypass email security filters. This rule may be expanded to inspect HTML attachments for other suspicious identifiers.

T1566T1566.001T1566.002T1598T1204.002+5
Sublimehigh

Attachment: HTML smuggling with setTimeout

Recursively scans files and archives to detect HTML smuggling techniques.

T1566T1566.001T1566.002T1598T1204.002+4
Sublimehigh

Attachment: HTML smuggling with unescape

Recursively scans files and archives to detect HTML smuggling techniques.

T1566T1566.001T1566.002T1598T1204.002+4
Sublimehigh

Attachment: HTML with emoji-to-character map

Detects inbound messages containing HTML attachments with an unusually high number of emojis in a list, sent from untrusted or suspicious senders who lack an established sending history or have previous malicious behavior.

T1566T1566.001T1566.002T1598T1036+3
Sublimehigh

Attachment: HTML with hidden body

This rule identifies HTML attachments which begin directly with a hidden body element. This has been observed in phishing campaigns to hide the content of an otherwise benign HTML attachment that then has remote content injected into the body.

T1566T1566.001T1566.002T1598T1036+2
Sublimehigh

Attachment: HTML with JavaScript functions for HTTP requests

This rule identifies HTML attachments which contain multiple references to JavaScript functions that support making HTTP requests. This has been observed in phishing campaigns to load remote payloads into otherwise benign HTML attachments.

T1566T1566.001T1566.002T1598T1036+2
Sublimehigh

Attachment: HTML with obfuscation and recipient's email in JavaScript strings

Attached HTML file contains JavaScript code with suspicious identifiers like 'atob' or 'decrypt', as well as the recipient's email address embedded within the JavaScript

T1566T1566.001T1566.002T1598T1059
Sublimehigh

Attachment: ICS calendar with embedded file from internal sender with SPF failure

Detects calendar invitations (ICS files) from internal domains that fail SPF authentication and contain embedded attachments, with single attendee and organizer both from organizational domains.

T1566T1566.001T1566.002T1598T1036+1
Sublimehigh

Attachment: ICS file with AWS Lambda URL

Detects ICS calendar files that contain references to AWS Lambda URLs, which may be used to deliver malicious content or redirect users to suspicious resources.

T1566T1566.001T1566.002T1598T1204.002+3
Sublimemedium

Attachment: ICS file with excessive custom properties

ICS calendar attachment contains an unusually high number of custom X- properties, which may indicate attempts to hide malicious content or exploit calendar parsing vulnerabilities.

T1566.001T1204.002T1486T1036T1027
Sublimemedium

Attachment: ICS file with meeting prefix

Detects incoming messages with a single ICS calendar file attachment that has a filename starting with 'meeting_'.

T1566.002T1534T1656T1566T1566.001+1
Sublimehigh

Attachment: ICS file with non-Gregorian calendar scale

Detects ICS calendar attachments that use a non-standard calendar scale other than GREGORIAN, which may indicate malicious calendar files attempting to exploit calendar parsing vulnerabilities or bypass security filters.

T1566T1566.001T1566.002T1598T1036+1
Sublimemedium

Attachment: ICS with embedded document

ICS invite contains an embedded document.

T1566.001T1204.002T1486T1036T1027
Sublimelow

Attachment: ICS with embedded Javascript in SVG file

Detects incoming messages containing ICS attachments with embedded SVG files that contain malicious JavaScript code, including base64-encoded content and potentially harmful event handlers. The rule specifically watches for onload events, location redirects, error handlers, and iframe elements with base64 data URIs.

T1566T1566.001T1566.002T1598T1204.002+4
Sublimehigh

Attachment: ICS with employee policy review lure

Detects ICS calendar attachments containing references to 'policy review' and 'secure access' terminology, which may be used in social engineering attacks to prompt users to take action under the guise of compliance or security requirements.

T1566T1566.001T1566.002T1598T1534+3
Sublimehigh

Attachment: Invoice and W-9 PDFs with suspicious creators

Detects messages containing two PDF attachments where one has invoice-related naming patterns and another contains W-9 tax form indicators, with at least one PDF generated by Chrome or wkhtmltopdf tools, commonly used in business email compromise attacks targeting financial processes.

T1566.002T1534T1656T1566T1598+1
Sublimehigh

Attachment: JavaScript file with suspicious base64-encoded executable

JavaScript attachment or compressed JavaScript file containing a base64 encoded executable.

T1566.001T1204.002T1486T1036T1027+1
Sublimehigh

Attachment: Legal themed message or PDF with suspicious indicators

Detects messages with short body content or emoji containing PDF attachments from suspicious creators that include legal and compliance language with embedded malicious links, URL shorteners, or newly registered domains.

T1566T1566.001T1566.002T1598T1486+5
Sublimemedium

Attachment: Link file with UNC path

Attached link file contains a UNC path. This can be used to relay NTLM password hashes; Windows will attempt to authenticate against the path even without the file being opened.

T1566T1566.001T1566.002T1598T1036+1
Sublimemedium

Attachment: Link to Doubleclick.net open redirect

Doubleclick.net link in a document leveraging an open redirect from a new or outlier sender.

T1566.002T1534T1656T1566T1566.001+3
Sublimemedium

Attachment: LNK file

Recursively scans files and archives to detect LNK connection files. LNK files can be weaponised to execute arbitrary commands including unpacking and running executable content embedded within the file itself.

T1566.001T1204.002T1486
Sublimehigh
PreviousPage 15 of 334Next