EXPLORE

EXPLORE DETECTIONS

🔍
986 detections found

Attachment: Excel file with document sharing lure created by Go Excelize

Detects Excel macro files created with the Go Excelize library containing document sharing language such as 'sent document', 'shared file', or 'REVIEW DOCUMENT'. These files are often used as lures to trick users into enabling macros or downloading malicious content.

T1566T1566.001T1566.002T1598T1204.002+1
Sublimehigh

Attachment: Excel file with suspicious template identifier

Detects Excel attachments containing a specific template identifier (TM16390866) in the EXIF metadata, which may indicate malicious or suspicious document templates being used to distribute harmful content.

T1566T1566.001T1566.002T1598T1036+3
Sublimehigh

Attachment: Excel Web Query File (IQY)

Recursively scans files and archives to detect IQY files. Coercing a target user into providing credentials to an attacker-controlled web server, or for SMB relaying.

T1566T1566.001T1566.002T1598T1204.002+3
Sublimehigh

Attachment: Fake attachment image lure

Message (or attached message) contains an image impersonating an Outlook attachment button.

T1566T1566.001T1566.002T1598T1204.002+3
Sublimemedium

Attachment: Fake lawyer & sports agent identities

Detects messages containing attachments or content that reference known fake identities used in FC Barcelona scams, including fake lawyer Michael Gerardus Hermanus Demon and sports agents with the surname Giuffrida. The rule examines EXIF metadata, OCR text from attachments, and message body content for these specific identity markers.

T1566.002T1534T1656T1566T1598
Sublimehigh

Attachment: Fake scan-to-email

Message and attachment resemble an email from a scan-to-email service or device with credential theft language.

T1566T1566.001T1566.002T1598
Sublimemedium

Attachment: Fake secure message and suspicious indicators

Body contains language resembling credential theft, and an attached "secure message" from an untrusted sender.

T1566T1566.001T1566.002T1598T1598.003
Sublimemedium

Attachment: Fake Slack installer

HTML attachment contains a Slack logo, request language, and a link to an executable. Observed in the wild.

T1566.001T1204.002T1486T1036T1027+5
Sublimehigh

Attachment: Fake voicemail via PDF

Identifies inbound messages containing a single-page PDF attachment related to voicemail or missed call notifications that includes either a URL or QR code.

T1566T1566.001T1566.002T1598
Sublimemedium

Attachment: Fake Zoom installer

HTML attachment contains a Zoom logo, request language, and a link to an executable. Observed in the wild.

T1566.001T1204.002T1486T1036T1027+5
Sublimehigh

Attachment: Fictitious invoice using LinkedIn's address

Detects PDF attachments created with wkhtmltopdf or Qt that contain LinkedIn's headquarters address (1000 W Maude Ave) in financial communications context, but do not mention LinkedIn itself.

T1566.002T1534T1656T1566T1598
Sublimemedium

Attachment: File execution via Javascript

Javascript contains identifiers or strings that may attempt to execute files.

T1566.001T1204.002T1486T1036T1027+1
Sublimemedium

Attachment: Filename containing Unicode braille pattern blank character

Recursively identifies attachments that attempt to conceal their true file extension by using Braille Pattern Blank characters

T1566.001T1204.002T1486T1036T1027
Sublimehigh

Attachment: Filename containing Unicode right-to-left override character

Recursively identifies attachments that attempt to conceal their true file extension by using right-to-left override characters

T1566.001T1204.002T1486T1036T1027
Sublimehigh

Attachment: Finance themed PDF with observed phishing template

Detects PDF attachments containing a specific rectangular coordinate pattern at position [249.75 560 407.25 599.75], which may indicate a templated or malicious document structure.

T1566T1566.001T1566.002T1598T1036+1
Sublimemedium

Attachment: HTML attachment with Javascript location

Recursively scans files and archives to detect HTML smuggling techniques.

T1566T1566.001T1566.002T1598T1204.002+4
Sublimehigh

Attachment: HTML attachment with login portal indicators

Recursively scans files and archives to detect indicators of login portals implemented in HTML files. This is a known credential theft technique used by threat actors.

T1566T1566.001T1566.002T1598T1059
Sublimemedium

Attachment: HTML file contains exclusively Javascript

Attached HTML file does not contain any HTML other than a <script> block.

T1566T1566.001T1566.002T1598T1204.002+4
Sublimemedium

Attachment: HTML file with excessive 'const' declarations and abnormally long timeouts

Detects messages with HTML attachments containing multiple 'const' declarations while excluding legitimate Gmail messages. This is evidence of potential code injection or obfuscation techniques.

T1566.001T1204.002T1486T1566T1566.002+4
Sublimehigh

Attachment: HTML file with excessive padding and suspicious patterns

Attached HTML file contains excessive line breaks and suspicious Javascript patterns.

T1566T1566.001T1566.002T1598T1204.002+3
Sublimehigh

Attachment: HTML file with reference to recipient and suspicious patterns

Attached HTML file (or HTML file within an attached email) contains references to the recipients email address, indicative of credential phishing, and suspicious Javascript patterns.

T1566T1566.001T1566.002T1598T1059
Sublimehigh

Attachment: HTML smuggling - QR Code with suspicious links

This rule detects messages with HTML attachments containing QR codes

T1566T1566.001T1566.002T1598
Sublimehigh

Attachment: HTML smuggling 'body onload' linking to suspicious destination

Potential HTML Smuggling. This rule inspects HTML attachments that contain a single link and leveraging an HTML body onload event. The linked domain must be in the URLhaus trusted repoters list, or have a suspicious TLD.

T1566T1566.001T1566.002T1598T1204.002+4
Sublimehigh

Attachment: HTML smuggling 'body onload' with high entropy and suspicious text

Potential HTML Smuggling. This rule inspects HTML attachments that contain "body unload", high entropy, and suspicious text.

T1566T1566.001T1566.002T1598T1204.002+4
Sublimehigh
PreviousPage 4 of 42Next