darkknight25 commited on
Commit
8e57bab
·
verified ·
1 Parent(s): a66d057

Upload Malicious_file_trick_detection.jsonl

Browse files

# Malicious File Trick Detection Dataset

This dataset provides a structured collection of **file-based social engineering and obfuscation techniques** used by attackers to bypass user awareness, antivirus (AV) detection, and security filters. Each entry identifies a malicious or deceptive filename, the evasion technique used, and detection methodology.

The dataset is ideal for:
- 🧠 Training AI/ML models for malware detection
- 🚨 Building secure email gateways and filters
- 📚 Teaching social engineering and malware delivery tactics

---

## 📁 Dataset Format

Stored in `.jsonl` format (JSON Lines), with one structured object per line.

### Fields

| Field | Description |
|---------------|-----------------------------------------------------------------------------|
| `filename` | Example of a malicious or deceptive file name |
| `technique` | Obfuscation method used (e.g., `Double extension`, `Unicode trick`) |
| `category` | Context or delivery type (e.g., `Social Engineering`, `Malware Delivery`) |
| `detected_by` | Detection method or defense mechanism (e.g., `AV heuristic`, `Sandbox`) |

---

## 🔍 Example

```json
{
"filename": "report.pdf.exe",
"technique": "Double extension",
"category": "Social Engineering",
"detected_by": "AV heuristic"
}

Files changed (1) hide show
  1. Malicious_file_trick_detection.jsonl +341 -0
Malicious_file_trick_detection.jsonl ADDED
@@ -0,0 +1,341 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ {"filename":"report.pdf.exe","technique":"Double extension","category":"Social Engineering","detected_by":"AV heuristic"}
2
+ {"filename":"invoice.doc.scr","technique":"Double extension","category":"Malware Delivery","detected_by":"File signature"}
3
+ {"filename":"budget.xlsx.vbs","technique":"Double extension","category":"Social Engineering","detected_by":"AV heuristic"}
4
+ {"filename":"resume.pdf.bat","technique":"Double extension","category":"Malware Delivery","detected_by":"Sandbox analysis"}
5
+ {"filename":"contract.doc.pif","technique":"Double extension","category":"Social Engineering","detected_by":"File signature"}
6
+ {"filename":"image.jpg.com","technique":"Double extension","category":"Malware Delivery","detected_by":"AV heuristic"}
7
+ {"filename":"file.txt.lnk","technique":"Double extension","category":"Social Engineering","detected_by":"Sandbox analysis"}
8
+ {"filename":"doc.pdf‮exe","technique":"Right-to-left override","category":"Social Engineering","detected_by":"Unicode inspection"}
9
+ {"filename":"safe.docEXE","technique":"Unicode homoglyph","category":"Evasion","detected_by":"Unicode inspection"}
10
+ {"filename":"report .exe","technique":"Whitespace padding","category":"Social Engineering","detected_by":"AV heuristic"}
11
+ {"filename":"update.iso","technique":"Mimic legitimate extension","category":"Malware Delivery","detected_by":"Sandbox analysis"}
12
+ {"filename":"setup.msi.exe","technique":"Double extension","category":"Malware Delivery","detected_by":"File signature"}
13
+ {"filename":"readme.txt.js","technique":"Double extension","category":"Social Engineering","detected_by":"AV heuristic"}
14
+ {"filename":"photo.png.ps1","technique":"Double extension","category":"Malware Delivery","detected_by":"Sandbox analysis"}
15
+ {"filename":"docx.pdf‮xex","technique":"Right-to-left override","category":"Evasion","detected_by":"Unicode inspection"}
16
+ {"filename":"safe_file.SCR","technique":"Unicode homoglyph","category":"Social Engineering","detected_by":"Unicode inspection"}
17
+ {"filename":"file.pdf .exe","technique":"Whitespace padding","category":"Evasion","detected_by":"AV heuristic"}
18
+ {"filename":"system.dll","technique":"Mimic system file","category":"Malware Delivery","detected_by":"File signature"}
19
+ {"filename":"notes.txt.hta","technique":"Double extension","category":"Social Engineering","detected_by":"Sandbox analysis"}
20
+ {"filename":"backup.zip.exe","technique":"Double extension","category":"Malware Delivery","detected_by":"AV heuristic"}
21
+ {"filename":"report.pdf.b64","technique":"Base64 encoding","category":"Evasion","detected_by":"Content analysis"}
22
+ {"filename":"script.js.enc","technique":"Custom encoding","category":"Evasion","detected_by":"Sandbox analysis"}
23
+ {"filename":"data.csv.vbe","technique":"Double extension","category":"Social Engineering","detected_by":"File signature"}
24
+ {"filename":"file.exe.pdf","technique":"Reverse double extension","category":"Evasion","detected_by":"AV heuristic"}
25
+ {"filename":"safe.doc‮epj","technique":"Right-to-left override","category":"Social Engineering","detected_by":"Unicode inspection"}
26
+ {"filename":"update.JAR","technique":"Unicode homoglyph","category":"Malware Delivery","detected_by":"Unicode inspection"}
27
+ {"filename":"doc .pdf.exe","technique":"Whitespace padding","category":"Social Engineering","detected_by":"AV heuristic"}
28
+ {"filename":"win32.sys","technique":"Mimic system file","category":"Evasion","detected_by":"File signature"}
29
+ {"filename":"plan.docx.cmd","technique":"Double extension","category":"Malware Delivery","detected_by":"Sandbox analysis"}
30
+ {"filename":"image.gif.exe","technique":"Double extension","category":"Social Engineering","detected_by":"AV heuristic"}
31
+ {"filename":"payload.bin","technique":"Generic extension","category":"Malware Delivery","detected_by":"Content analysis"}
32
+ {"filename":"test.pdf.uue","technique":"UUencoding","category":"Evasion","detected_by":"Content analysis"}
33
+ {"filename":"file.txt‮xex","technique":"Right-to-left override","category":"Evasion","detected_by":"Unicode inspection"}
34
+ {"filename":"secure.PY","technique":"Unicode homoglyph","category":"Social Engineering","detected_by":"Unicode inspection"}
35
+ {"filename":"report..exe","technique":"Dot padding","category":"Evasion","detected_by":"AV heuristic"}
36
+ {"filename":"config.ini.exe","technique":"Double extension","category":"Malware Delivery","detected_by":"File signature"}
37
+ {"filename":"log.txt.wsf","technique":"Double extension","category":"Social Engineering","detected_by":"Sandbox analysis"}
38
+ {"filename":"file.pdf.hex","technique":"Hex encoding","category":"Evasion","detected_by":"Content analysis"}
39
+ {"filename":"script.vbs‮exe","technique":"Right-to-left override","category":"Social Engineering","detected_by":"Unicode inspection"}
40
+ {"filename":"app.APK","technique":"Unicode homoglyph","category":"Malware Delivery","detected_by":"Unicode inspection"}
41
+ {"filename":"data .doc.exe","technique":"Whitespace padding","category":"Evasion","detected_by":"AV heuristic"}
42
+ {"filename":"svchost.exe","technique":"Mimic system process","category":"Malware Delivery","detected_by":"File signature"}
43
+ {"filename":"memo.docx.msi","technique":"Double extension","category":"Social Engineering","detected_by":"Sandbox analysis"}
44
+ {"filename":"file.jpg.lnk","technique":"Double extension","category":"Social Engineering","detected_by":"AV heuristic"}
45
+ {"filename":"encoded.exe.b64","technique":"Base64 encoding","category":"Evasion","detected_by":"Content analysis"}
46
+ {"filename":"test.pdf‮tab","technique":"Right-to-left override","category":"Evasion","detected_by":"Unicode inspection"}
47
+ {"filename":"file.COM","technique":"Unicode homoglyph","category":"Malware Delivery","detected_by":"Unicode inspection"}
48
+ {"filename":"report...pdf.exe","technique":"Dot padding","category":"Social Engineering","detected_by":"AV heuristic"}
49
+ {"filename":"setup.cab.exe","technique":"Double extension","category":"Malware Delivery","detected_by":"File signature"}
50
+ {"filename":"notes.md.jse","technique":"Double extension","category":"Social Engineering","detected_by":"Sandbox analysis"}
51
+ {"filename":"document.pdf:malware.exe","technique":"Alternate data stream","category":"Evasion","detected_by":"ADS inspection"}
52
+ {"filename":"photo.jpg.ico.exe","technique":"Icon spoofing","category":"Social Engineering","detected_by":"File signature"}
53
+ {"filename":"invoice.doc.exe.scr","technique":"Triple extension","category":"Malware Delivery","detected_by":"AV heuristic"}
54
+ {"filename":"%TEMP%\\update.exe","technique":"Environment variable path","category":"Persistence","detected_by":"Behavioral analysis"}
55
+ {"filename":"readme.txt.gz.exe","technique":"Compressed file mimicry","category":"Evasion","detected_by":"Content analysis"}
56
+ {"filename":"script.ps1.obf","technique":"Script obfuscation","category":"Evasion","detected_by":"Entropy analysis"}
57
+ {"filename":"setup.msc","technique":"Control panel extension","category":"Malware Delivery","detected_by":"File signature"}
58
+ {"filename":"notes.pdf.cpl","technique":"Double extension","category":"Social Engineering","detected_by":"AV heuristic"}
59
+ {"filename":"safe.docⓔⓧⓔ","technique":"Unicode circled letters","category":"Evasion","detected_by":"Unicode inspection"}
60
+ {"filename":"file.pdf.....exe","technique":"Multiple dot padding","category":"Social Engineering","detected_by":"AV heuristic"}
61
+ {"filename":"kernel32.dll.exe","technique":"Mimic system DLL","category":"Persistence","detected_by":"File signature"}
62
+ {"filename":"report.docx:payload.vbs","technique":"Alternate data stream","category":"Malware Delivery","detected_by":"ADS inspection"}
63
+ {"filename":"image.png.rar.exe","technique":"Compressed file mimicry","category":"Evasion","detected_by":"Sandbox analysis"}
64
+ {"filename":"config.ini.ps2","technique":"Double extension","category":"Social Engineering","detected_by":"AV heuristic"}
65
+ {"filename":"update.exe‮fdp","technique":"Right-to-left override","category":"Evasion","detected_by":"Unicode inspection"}
66
+ {"filename":"file.𝔼𝕏𝔼","technique":"Unicode gothic letters","category":"Social Engineering","detected_by":"Unicode inspection"}
67
+ {"filename":"system.exe.lnk","technique":"Shortcut masquerade","category":"Malware Delivery","detected_by":"Sandbox analysis"}
68
+ {"filename":"data.csv:malware.exe","technique":"Alternate data stream","category":"Evasion","detected_by":"ADS inspection"}
69
+ {"filename":"doc.pdf.tar.gz.exe","technique":"Nested compression mimicry","category":"Malware Delivery","detected_by":"Content analysis"}
70
+ {"filename":"safe.vbs.enc","technique":"Encoded script","category":"Evasion","detected_by":"Entropy analysis"}
71
+ {"filename":"budget.xlsx.msh","technique":"Double extension","category":"Social Engineering","detected_by":"AV heuristic"}
72
+ {"filename":"file.doc .exe","technique":"Trailing whitespace","category":"Evasion","detected_by":"AV heuristic"}
73
+ {"filename":"explorer.exe.scr","technique":"Mimic system process","category":"Persistence","detected_by":"File signature"}
74
+ {"filename":"resume.pdf:backdoor.bat","technique":"Alternate data stream","category":"Malware Delivery","detected_by":"ADS inspection"}
75
+ {"filename":"file.exe.jpg","technique":"Reverse extension trick","category":"Social Engineering","detected_by":"AV heuristic"}
76
+ {"filename":"script.js‮exe","technique":"Right-to-left override","category":"Evasion","detected_by":"Unicode inspection"}
77
+ {"filename":"safe.𝐄𝐗𝐄","technique":"Unicode bold letters","category":"Social Engineering","detected_by":"Unicode inspection"}
78
+ {"filename":"log.txt.7z.exe","technique":"Compressed file mimicry","category":"Malware Delivery","detected_by":"Sandbox analysis"}
79
+ {"filename":"settings.reg.exe","technique":"Double extension","category":"Persistence","detected_by":"AV heuristic"}
80
+ {"filename":"file.pdf:trojan.ps1","technique":"Alternate data stream","category":"Evasion","detected_by":"ADS inspection"}
81
+ {"filename":"update.cab.scr","technique":"Double extension","category":"Malware Delivery","detected_by":"File signature"}
82
+ {"filename":"doc.docx.uu","technique":"UUencoding","category":"Evasion","detected_by":"Content analysis"}
83
+ {"filename":"safe_file.🅴🅇🄴","technique":"Unicode square letters","category":"Social Engineering","detected_by":"Unicode inspection"}
84
+ {"filename":"file...doc.exe","technique":"Dot padding","category":"Evasion","detected_by":"AV heuristic"}
85
+ {"filename":"svchost.exe:malware.dll","technique":"Alternate data stream","category":"Persistence","detected_by":"ADS inspection"}
86
+ {"filename":"photo.gif.cpl","technique":"Double extension","category":"Social Engineering","detected_by":"AV heuristic"}
87
+ {"filename":"payload.exe.xz","technique":"Compressed file mimicry","category":"Malware Delivery","detected_by":"Content analysis"}
88
+ {"filename":"script.bat.obf","technique":"Script obfuscation","category":"Evasion","detected_by":"Entropy analysis"}
89
+ {"filename":"file.pdf‮tab.scr","technique":"Right-to-left override","category":"Social Engineering","detected_by":"Unicode inspection"}
90
+ {"filename":"safe.𝗘𝗫𝗘","technique":"Unicode serif bold","category":"Evasion","detected_by":"Unicode inspection"}
91
+ {"filename":"data.xlsx:payload.exe","technique":"Alternate data stream","category":"Malware Delivery","detected_by":"ADS inspection"}
92
+ {"filename":"install.msi.scr","technique":"Double extension","category":"Social Engineering","detected_by":"File signature"}
93
+ {"filename":"file.txt.hex.exe","technique":"Hex encoding","category":"Evasion","detected_by":"Content analysis"}
94
+ {"filename":"system.ini.lnk","technique":"Shortcut masquerade","category":"Persistence","detected_by":"Sandbox analysis"}
95
+ {"filename":"report.pdf....exe","technique":"Multiple dot padding","category":"Social Engineering","detected_by":"AV heuristic"}
96
+ {"filename":"winlogon.exe.vbs","technique":"Mimic system process","category":"Malware Delivery","detected_by":"File signature"}
97
+ {"filename":"file.doc:malware.js","technique":"Alternate data stream","category":"Evasion","detected_by":"ADS inspection"}
98
+ {"filename":"image.jpg.zip.exe","technique":"Compressed file mimicry","category":"Social Engineering","detected_by":"Sandbox analysis"}
99
+ {"filename":"safe_file.𝙴𝚇𝙴","technique":"Unicode monospace","category":"Evasion","detected_by":"Unicode inspection"}
100
+ {"filename":"file.exe‮fdp.txt","technique":"Right-to-left override","category":"Social Engineering","detected_by":"Unicode inspection"}
101
+ {"filename":"config.xml.ws","technique":"Double extension","category":"Malware Delivery","detected_by":"AV heuristic"}
102
+ {"filename":"doc.pdf:trojan.vbe","technique":"Alternate data stream","category":"Evasion","detected_by":"ADS inspection"}
103
+ {"filename":"setup.exe.b64","technique":"Base64 encoding","category":"Malware Delivery","detected_by":"Content analysis"}
104
+ {"filename":"file....txt.exe","technique":"Dot padding","category":"Social Engineering","detected_by":"AV heuristic"}
105
+ {"filename":"taskmgr.exe.hta","technique":"Mimic system process","category":"Persistence","detected_by":"File signature"}
106
+ {"filename":"data.csv.tar.exe","technique":"Compressed file mimicry","category":"Malware Delivery","detected_by":"Sandbox analysis"}
107
+ {"filename":"script.ps1‮exe","technique":"Right-to-left override","category":"Evasion","detected_by":"Unicode inspection"}
108
+ {"filename":"safe.EXE","technique":"Unicode full-width","category":"Social Engineering","detected_by":"Unicode inspection"}
109
+ {"filename":"file.doc:payload.scr","technique":"Alternate data stream","category":"Malware Delivery","detected_by":"ADS inspection"}
110
+ {"filename":"update.msc.exe","technique":"Double extension","category":"Social Engineering","detected_by":"AV heuristic"}
111
+ {"filename":"payload.bin.enc","technique":"Custom encoding","category":"Evasion","detected_by":"Entropy analysis"}
112
+ {"filename":"file.txt....exe","technique":"Multiple dot padding","category":"Social Engineering","detected_by":"AV heuristic"}
113
+ {"filename":"rundll32.exe.lnk","technique":"Shortcut masquerade","category":"Persistence","detected_by":"Sandbox analysis"}
114
+ {"filename":"image.png:malware.exe","technique":"Alternate data stream","category":"Evasion","detected_by":"ADS inspection"}
115
+ {"filename":"doc.docx.b64.exe","technique":"Base64 encoding","category":"Malware Delivery","detected_by":"Content analysis"}
116
+ {"filename":"safe_file.ᴇxᴇ","technique":"Unicode small letters","category":"Social Engineering","detected_by":"Unicode inspection"}
117
+ {"filename":"file.exe‮xet.pdf","technique":"Right-to-left override","category":"Evasion","detected_by":"Unicode inspection"}
118
+ {"filename":"config.yaml.pif","technique":"Double extension","category":"Social Engineering","detected_by":"AV heuristic"}
119
+ {"filename":"system.dll:trojan.exe","technique":"Alternate data stream","category":"Persistence","detected_by":"ADS inspection"}
120
+ {"filename":"setup.iso.exe","technique":"Double extension","category":"Malware Delivery","detected_by":"File signature"}
121
+ {"filename":"image.png:stego.exe","technique":"Steganography in ADS","category":"Evasion","detected_by":"Steganalysis"}
122
+ {"filename":"doc.pdf..[U+200B]..exe","technique":"Invisible Unicode separator","category":"Social Engineering","detected_by":"Unicode inspection"}
123
+ {"filename":"update.wasm.exe","technique":"WebAssembly mimicry","category":"Malware Delivery","detected_by":"File signature"}
124
+ {"filename":"file.docx:$DATA:malware.vbs","technique":"NTFS attribute manipulation","category":"Persistence","detected_by":"ADS inspection"}
125
+ {"filename":"safe.🅴🆇🅴","technique":"Unicode emoji homoglyph","category":"Evasion","detected_by":"Unicode inspection"}
126
+ {"filename":"report.pdf.quic","technique":"QUIC protocol extension","category":"Data Exfiltration","detected_by":"Network analysis"}
127
+ {"filename":"config.yaml:poly.exe","technique":"Polymorphic extension cycling","category":"Evasion","detected_by":"Behavioral analysis"}
128
+ {"filename":"system.dev/zero.exe","technique":"Linux device file mimicry","category":"Persistence","detected_by":"File signature"}
129
+ {"filename":"invoice.docx.appx","technique":"Windows AppX spoofing","category":"Malware Delivery","detected_by":"Sandbox analysis"}
130
+ {"filename":"file.txt[U+2063].exe","technique":"Invisible Unicode joiner","category":"Social Engineering","detected_by":"Unicode inspection"}
131
+ {"filename":"payload.qr.enc","technique":"QR code encoding","category":"Evasion","detected_by":"Content analysis"}
132
+ {"filename":"setup.msi:trojan.dll","technique":"Alternate data stream","category":"Persistence","detected_by":"ADS inspection"}
133
+ {"filename":"safe_file.𝙴𝚇𝙴","technique":"Unicode monospace homoglyph","category":"Social Engineering","detected_by":"Unicode inspection"}
134
+ {"filename":"doc.pdf...[U+200E]...exe","technique":"Unicode left-to-right mark","category":"Evasion","detected_by":"Unicode inspection"}
135
+ {"filename":"update.ipfs.exe","technique":"IPFS file mimicry","category":"Data Exfiltration","detected_by":"Network analysis"}
136
+ {"filename":"file.docx:quantum.b64","technique":"Quantum-resistant encoding","category":"Evasion","detected_by":"Entropy analysis"}
137
+ {"filename":"kernel.sys:malware.exe","technique":"NTFS reserved name","category":"Persistence","detected_by":"File signature"}
138
+ {"filename":"photo.jpg.wsf.lnk","technique":"Nested shortcut extension","category":"Social Engineering","detected_by":"Sandbox analysis"}
139
+ {"filename":"data.csv😈.exe","technique":"Emoji-based extension","category":"Evasion","detected_by":"Unicode inspection"}
140
+ {"filename":"report.pdf:stego.ps1","technique":"Steganography in ADS","category":"Malware Delivery","detected_by":"Steganalysis"}
141
+ {"filename":"file.txt[U+FEFF].exe","technique":"Unicode BOM marker","category":"Social Engineering","detected_by":"Unicode inspection"}
142
+ {"filename":"install.snap.exe","technique":"Linux snap package mimicry","category":"Malware Delivery","detected_by":"File signature"}
143
+ {"filename":"config.ini:poly.vbs","technique":"Polymorphic extension cycling","category":"Evasion","detected_by":"Behavioral analysis"}
144
+ {"filename":"safe.𝐄𝐗𝐄","technique":"Unicode bold serif homoglyph","category":"Social Engineering","detected_by":"Unicode inspection"}
145
+ {"filename":"doc.docx.webm.exe","technique":"Web media mimicry","category":"Malware Delivery","detected_by":"Content analysis"}
146
+ {"filename":"file.pdf:ml.exe","technique":"ML model embedding","category":"Evasion","detected_by":"Memory forensics"}
147
+ {"filename":"update.torrent.exe","technique":"Torrent file mimicry","category":"Data Exfiltration","detected_by":"Network analysis"}
148
+ {"filename":"system.con:payload.exe","technique":"NTFS reserved name","category":"Persistence","detected_by":"File signature"}
149
+ {"filename":"image.gif[U+200D].scr","technique":"Unicode zero-width joiner","category":"Evasion","detected_by":"Unicode inspection"}
150
+ {"filename":"setup.flatpak.exe","technique":"Linux flatpak mimicry","category":"Malware Delivery","detected_by":"Sandbox analysis"}
151
+ {"filename":"file.docx:obf.js","technique":"Script obfuscation in ADS","category":"Evasion","detected_by":"Entropy analysis"}
152
+ {"filename":"safe_file.🅴🆇🅴","technique":"Unicode square emoji homoglyph","category":"Social Engineering","detected_by":"Unicode inspection"}
153
+ {"filename":"report.pdf.arweave","technique":"Arweave blockchain mimicry","category":"Data Exfiltration","detected_by":"Network analysis"}
154
+ {"filename":"data.xlsx:poly.bat","technique":"Polymorphic extension cycling","category":"Persistence","detected_by":"Behavioral analysis"}
155
+ {"filename":"file.txt....[U+202F]....exe","technique":"Unicode narrow no-break space","category":"Evasion","detected_by":"Unicode inspection"}
156
+ {"filename":"install.appimage.exe","technique":"Linux AppImage mimicry","category":"Malware Delivery","detected_by":"File signature"}
157
+ {"filename":"config.yaml:stego.exe","technique":"Steganography in ADS","category":"Evasion","detected_by":"Steganalysis"}
158
+ {"filename":"safe.𝙴𝚇𝙴","technique":"Unicode monospace bold homoglyph","category":"Social Engineering","detected_by":"Unicode inspection"}
159
+ {"filename":"doc.pdf.hls.exe","technique":"HLS streaming mimicry","category":"Malware Delivery","detected_by":"Content analysis"}
160
+ {"filename":"file.exe:ml.model","technique":"ML model embedding in ADS","category":"Evasion","detected_by":"Memory forensics"}
161
+ {"filename":"update.dweb.exe","technique":"Decentralized web mimicry","category":"Data Exfiltration","detected_by":"Network analysis"}
162
+ {"filename":"system.aux:trojan.exe","technique":"NTFS reserved name","category":"Persistence","detected_by":"File signature"}
163
+ {"filename":"photo.png[U+2060].vbs","technique":"Unicode word joiner","category":"Social Engineering","detected_by":"Unicode inspection"}
164
+ {"filename":"setup.uwp.exe","technique":"Windows UWP app spoofing","category":"Malware Delivery","detected_by":"Sandbox analysis"}
165
+ {"filename":"file.docx:qr.ps1","technique":"QR code encoding in ADS","category":"Evasion","detected_by":"Content analysis"}
166
+ {"filename":"safe_file.𝐄𝐗𝐄","technique":"Unicode italic homoglyph","category":"Evasion","detected_by":"Unicode inspection"}
167
+ {"filename":"report.pdf.dash.exe","technique":"DASH streaming mimicry","category":"Malware Delivery","detected_by":"Content analysis"}
168
+ {"filename":"data.csv:poly.scr","technique":"Polymorphic extension cycling","category":"Persistence","detected_by":"Behavioral analysis"}
169
+ {"filename":"file.txt[U+200C].exe","technique":"Unicode zero-width non-joiner","category":"Social Engineering","detected_by":"Unicode inspection"}
170
+ {"filename":"install.container.exe","technique":"Container image mimicry","category":"Malware Delivery","detected_by":"File signature"}
171
+ {"filename":"config.ini:stego.vbe","technique":"Steganography in ADS","category":"Evasion","detected_by":"Steganalysis"}
172
+ {"filename":"safe.🅴🆇🅴","technique":"Unicode circled emoji homoglyph","category":"Social Engineering","detected_by":"Unicode inspection"}
173
+ {"filename":"doc.pdf.ipns.exe","technique":"IPNS file mimicry","category":"Data Exfiltration","detected_by":"Network analysis"}
174
+ {"filename":"file.exe:quantum.enc","technique":"Quantum-resistant encoding in ADS","category":"Evasion","detected_by":"Entropy analysis"}
175
+ {"filename":"system.lpt1:malware.exe","technique":"NTFS reserved name","category":"Persistence","detected_by":"File signature"}
176
+ {"filename":"image.jpg[U+2064].hta","technique":"Unicode invisible plus","category":"Evasion","detected_by":"Unicode inspection"}
177
+ {"filename":"setup.msix.exe","technique":"Windows MSIX app spoofing","category":"Malware Delivery","detected_by":"Sandbox analysis"}
178
+ {"filename":"file.docx:obf.ps2","technique":"Script obfuscation in ADS","category":"Evasion","detected_by":"Entropy analysis"}
179
+ {"filename":"safe_file.𝙴𝚇𝙴","technique":"Unicode serif monospace homoglyph","category":"Social Engineering","detected_by":"Unicode inspection"}
180
+ {"filename":"report.pdf.web3.exe","technique":"Web3 storage mimicry","category":"Data Exfiltration","detected_by":"Network analysis"}
181
+ {"filename":"data.xlsx:poly.msh","technique":"Polymorphic extension cycling","category":"Persistence","detected_by":"Behavioral analysis"}
182
+ {"filename":"file.txt....[U+205F]....exe","technique":"Unicode medium mathematical space","category":"Evasion","detected_by":"Unicode inspection"}
183
+ {"filename":"install.oci.exe","technique":"OCI container mimicry","category":"Malware Delivery","detected_by":"File signature"}
184
+ {"filename":"config.yaml:qr.exe","technique":"QR code encoding in ADS","category":"Evasion","detected_by":"Content analysis"}
185
+ {"filename":"safe.𝐄𝐗𝐄","technique":"Unicode bold italic homoglyph","category":"Social Engineering","detected_by":"Unicode inspection"}
186
+ {"filename":"doc.pdf.m3u8.exe","technique":"M3U8 playlist mimicry","category":"Malware Delivery","detected_by":"Content analysis"}
187
+ {"filename":"file.exe:stego.dll","technique":"Steganography in ADS","category":"Persistence","detected_by":"Steganalysis"}
188
+ {"filename":"system.nul:trojan.exe","technique":"NTFS reserved name","category":"Evasion","detected_by":"File signature"}
189
+ {"filename":"photo.png[U+2061].vbs","technique":"Unicode function application","category":"Social Engineering","detected_by":"Unicode inspection"}
190
+ {"filename":"setup.pod.exe","technique":"Podman container mimicry","category":"Malware Delivery","detected_by":"Sandbox analysis"}
191
+ {"filename":"file.docx:poly.js","technique":"Polymorphic extension cycling","category":"Evasion","detected_by":"Behavioral analysis"}
192
+ {"filename":"safe_file.🅴🆇🅴","technique":"Unicode boxed emoji homoglyph","category":"Social Engineering","detected_by":"Unicode inspection"}
193
+ {"filename":"report.pdf.sia.exe","technique":"Sia blockchain mimicry","category":"Data Exfiltration","detected_by":"Network analysis"}
194
+ {"filename":"data.csv:obf.vbs","technique":"Script obfuscation in ADS","category":"Evasion","detected_by":"Entropy analysis"}
195
+ {"filename":"file.txt[U+2062].exe","technique":"Unicode invisible times","category":"Evasion","detected_by":"Unicode inspection"}
196
+ {"filename":"install.k8s.exe","technique":"Kubernetes manifest mimicry","category":"Malware Delivery","detected_by":"File signature"}
197
+ {"filename":"config.ini:ml.exe","technique":"ML model embedding in ADS","category":"Persistence","detected_by":"Memory forensics"}
198
+ {"filename":"safe.𝙴𝚇𝙴","technique":"Unicode sans-serif homoglyph","category":"Social Engineering","detected_by":"Unicode inspection"}
199
+ {"filename":"doc.pdf.storj.exe","technique":"Storj storage mimicry","category":"Data Exfiltration","detected_by":"Network analysis"}
200
+ {"filename":"file.exe:poly.bat","technique":"Polymorphic extension cycling","category":"Evasion","detected_by":"Behavioral analysis"}
201
+ {"filename":"invoice.pdf.exe","technique":"Double extension disguise","category":"Evasion","detected_by":"Signature-based detection"}
202
+ {"filename":"report.docx.scr","technique":"Script disguised as document","category":"Evasion","detected_by":"Heuristic analysis"}
203
+ {"filename":"update.jpg.pif","technique":"Image file with executable extension","category":"Evasion","detected_by":"Behavioral analysis"}
204
+ {"filename":"setup.tar.gz.exe","technique":"Compressed archive with executable suffix","category":"Evasion","detected_by":"Sandboxing"}
205
+ {"filename":"readme.txt.{9006}","technique":"Alternate data stream hiding","category":"Evasion","detected_by":"File system monitoring"}
206
+ {"filename":"backup.zip.exe","technique":"Archive with executable extension","category":"Evasion","detected_by":"Signature-based detection"}
207
+ {"filename":"photo.png.exe","technique":"Image file masquerading","category":"Evasion","detected_by":"Heuristic analysis"}
208
+ {"filename":"document.pdf.{hidden}","technique":"Hidden file extension using NTFS streams","category":"Evasion","detected_by":"File system monitoring"}
209
+ {"filename":"install.exe:Zone.Identifier","technique":"Zone identifier ADS to bypass security","category":"Evasion","detected_by":"Behavioral analysis"}
210
+ {"filename":"script.js.exe","technique":"JavaScript file disguised as executable","category":"Evasion","detected_by":"Heuristic analysis"}
211
+ {"filename":"invoice.pdf.exe","technique":"Double extension disguise","category":"Evasion","detected_by":"Signature-based detection"}
212
+ {"filename":"report.docx.scr","technique":"Script disguised as document","category":"Evasion","detected_by":"Heuristic analysis"}
213
+ {"filename":"update.jpg.pif","technique":"Image file with executable extension","category":"Evasion","detected_by":"Behavioral analysis"}
214
+ {"filename":"setup.tar.gz.exe","technique":"Compressed archive with executable suffix","category":"Evasion","detected_by":"Sandboxing"}
215
+ {"filename":"readme.txt.{9006}","technique":"Alternate data stream hiding","category":"Evasion","detected_by":"File system monitoring"}
216
+ {"filename":"backup.zip.exe","technique":"Archive with executable extension","category":"Evasion","detected_by":"Signature-based detection"}
217
+ {"filename":"photo.png.exe","technique":"Image file masquerading","category":"Evasion","detected_by":"Heuristic analysis"}
218
+ {"filename":"document.pdf.{hidden}","technique":"Hidden file extension using NTFS streams","category":"Evasion","detected_by":"File system monitoring"}
219
+ {"filename":"install.exe:Zone.Identifier","technique":"Zone identifier ADS to bypass security","category":"Evasion","detected_by":"Behavioral analysis"}
220
+ {"filename":"script.js.exe","technique":"JavaScript file disguised as executable","category":"Evasion","detected_by":"Heuristic analysis"}
221
+ {"filename":"archive.rar.{0000}","technique":"Alternate data stream with null byte","category":"Evasion","detected_by":"File system monitoring"}
222
+ {"filename":"music.mp3.exe","technique":"Audio file with executable extension","category":"Evasion","detected_by":"Signature-based detection"}
223
+ {"filename":"video.mp4.scr","technique":"Video file disguised as script","category":"Evasion","detected_by":"Heuristic analysis"}
224
+ {"filename":"presentation.pptx.bat","technique":"Batch script disguised as presentation","category":"Evasion","detected_by":"Behavioral analysis"}
225
+ {"filename":"document.docx.{hidden}","technique":"Hidden extension using NTFS streams","category":"Evasion","detected_by":"File system monitoring"}
226
+ {"filename":"installer.msi.exe","technique":"Installer file with executable suffix","category":"Evasion","detected_by":"Sandboxing"}
227
+ {"filename":"photo.jpg:evil.txt","technique":"Alternate data stream with malicious payload","category":"Evasion","detected_by":"File system monitoring"}
228
+ {"filename":"readme.txt.exe","technique":"Text file with executable extension","category":"Evasion","detected_by":"Signature-based detection"}
229
+ {"filename":"config.json.scr","technique":"Config file disguised as script","category":"Evasion","detected_by":"Heuristic analysis"}
230
+ {"filename":"data.csv.bat","technique":"Batch script disguised as data file","category":"Evasion","detected_by":"Behavioral analysis"}
231
+ {"filename":"notes.txt.{hidden}","technique":"Hidden extension using NTFS streams","category":"Evasion","detected_by":"File system monitoring"}
232
+ {"filename":"setup.exe:evil","technique":"Alternate data stream with malicious code","category":"Evasion","detected_by":"Behavioral analysis"}
233
+ {"filename":"image.bmp.exe","technique":"Bitmap image with executable extension","category":"Evasion","detected_by":"Signature-based detection"}
234
+ {"filename":"script.vbs.exe","technique":"VBScript disguised as executable","category":"Evasion","detected_by":"Heuristic analysis"}
235
+ {"filename":"document.pdf.exe","technique":"PDF file with executable extension","category":"Evasion","detected_by":"Signature-based detection"}
236
+ {"filename":"archive.zip.{hidden}","technique":"Hidden extension using NTFS streams","category":"Evasion","detected_by":"File system monitoring"}
237
+ {"filename":"video.avi.scr","technique":"AVI video disguised as script","category":"Evasion","detected_by":"Heuristic analysis"}
238
+ {"filename":"music.wav.bat","technique":"Batch script disguised as audio file","category":"Evasion","detected_by":"Behavioral analysis"}
239
+ {"filename":"file.txt:evil.exe","technique":"Alternate data stream with executable payload","category":"Evasion","detected_by":"File system monitoring"}
240
+ {"filename":"installer.exe.{hidden}","technique":"Hidden extension using NTFS streams","category":"Evasion","detected_by":"File system monitoring"}
241
+ {"filename":"photo.gif.exe","technique":"GIF image with executable extension","category":"Evasion","detected_by":"Signature-based detection"}
242
+ {"filename":"script.ps1.exe","technique":"PowerShell script disguised as executable","category":"Evasion","detected_by":"Heuristic analysis"}
243
+ {"filename":"document.doc.exe","technique":"Word document with executable extension","category":"Evasion","detected_by":"Signature-based detection"}
244
+ {"filename":"archive.7z.bat","technique":"Batch script disguised as archive","category":"Evasion","detected_by":"Behavioral analysis"}
245
+ {"filename":"readme.md.exe","technique":"Markdown file with executable extension","category":"Evasion","detected_by":"Signature-based detection"}
246
+ {"filename":"config.xml.scr","technique":"XML config disguised as script","category":"Evasion","detected_by":"Heuristic analysis"}
247
+ {"filename":"data.json.bat","technique":"Batch script disguised as JSON data","category":"Evasion","detected_by":"Behavioral analysis"}
248
+ {"filename":"notes.rtf.exe","technique":"RTF file with executable extension","category":"Evasion","detected_by":"Signature-based detection"}
249
+ {"filename":"setup.msi.scr","technique":"MSI installer disguised as script","category":"Evasion","detected_by":"Heuristic analysis"}
250
+ {"filename":"image.tiff.bat","technique":"Batch script disguised as TIFF image","category":"Evasion","detected_by":"Behavioral analysis"}
251
+ {"filename":"file.log.exe","technique":"Log file with executable extension","category":"Evasion","detected_by":"Signature-based detection"}
252
+ {"filename":"script.sh.exe","technique":"Shell script disguised as executable","category":"Evasion","detected_by":"Heuristic analysis"}
253
+ {"filename":"document.odt.bat","technique":"Batch script disguised as OpenDocument text","category":"Evasion","detected_by":"Behavioral analysis"}
254
+ {"filename":"invoice.pdf.exe","technique":"Double extension disguise","category":"Evasion","detected_by":"Signature-based detection"}
255
+ {"filename":"report.docx.scr","technique":"Script disguised as document","category":"Evasion","detected_by":"Heuristic analysis"}
256
+ {"filename":"update.jpg.pif","technique":"Image file with executable extension","category":"Evasion","detected_by":"Behavioral analysis"}
257
+ {"filename":"setup.tar.gz.exe","technique":"Compressed archive with executable suffix","category":"Evasion","detected_by":"Sandboxing"}
258
+ {"filename":"readme.txt.{9006}","technique":"Alternate data stream hiding","category":"Evasion","detected_by":"File system monitoring"}
259
+ {"filename":"backup.zip.exe","technique":"Archive with executable extension","category":"Evasion","detected_by":"Signature-based detection"}
260
+ {"filename":"photo.png.exe","technique":"Image file masquerading","category":"Evasion","detected_by":"Heuristic analysis"}
261
+ {"filename":"document.pdf.{hidden}","technique":"Hidden file extension using NTFS streams","category":"Evasion","detected_by":"File system monitoring"}
262
+ {"filename":"install.exe:Zone.Identifier","technique":"Zone identifier ADS to bypass security","category":"Evasion","detected_by":"Behavioral analysis"}
263
+ {"filename":"script.js.exe","technique":"JavaScript file disguised as executable","category":"Evasion","detected_by":"Heuristic analysis"}
264
+ {"filename":"archive.rar.{0000}","technique":"Alternate data stream with null byte","category":"Evasion","detected_by":"File system monitoring"}
265
+ {"filename":"music.mp3.exe","technique":"Audio file with executable extension","category":"Evasion","detected_by":"Signature-based detection"}
266
+ {"filename":"video.mp4.scr","technique":"Video file disguised as script","category":"Evasion","detected_by":"Heuristic analysis"}
267
+ {"filename":"presentation.pptx.bat","technique":"Batch script disguised as presentation","category":"Evasion","detected_by":"Behavioral analysis"}
268
+ {"filename":"document.docx.{hidden}","technique":"Hidden extension using NTFS streams","category":"Evasion","detected_by":"File system monitoring"}
269
+ {"filename":"installer.msi.exe","technique":"Installer file with executable suffix","category":"Evasion","detected_by":"Sandboxing"}
270
+ {"filename":"photo.jpg:evil.txt","technique":"Alternate data stream with malicious payload","category":"Evasion","detected_by":"File system monitoring"}
271
+ {"filename":"readme.txt.exe","technique":"Text file with executable extension","category":"Evasion","detected_by":"Signature-based detection"}
272
+ {"filename":"config.json.scr","technique":"Config file disguised as script","category":"Evasion","detected_by":"Heuristic analysis"}
273
+ {"filename":"data.csv.bat","technique":"Batch script disguised as data file","category":"Evasion","detected_by":"Behavioral analysis"}
274
+ {"filename":"notes.txt.{hidden}","technique":"Hidden extension using NTFS streams","category":"Evasion","detected_by":"File system monitoring"}
275
+ {"filename":"setup.exe:evil","technique":"Alternate data stream with malicious code","category":"Evasion","detected_by":"Behavioral analysis"}
276
+ {"filename":"image.bmp.exe","technique":"Bitmap image with executable extension","category":"Evasion","detected_by":"Signature-based detection"}
277
+ {"filename":"script.vbs.exe","technique":"VBScript disguised as executable","category":"Evasion","detected_by":"Heuristic analysis"}
278
+ {"filename":"document.pdf.exe","technique":"PDF file with executable extension","category":"Evasion","detected_by":"Signature-based detection"}
279
+ {"filename":"archive.zip.{hidden}","technique":"Hidden extension using NTFS streams","category":"Evasion","detected_by":"File system monitoring"}
280
+ {"filename":"video.avi.scr","technique":"AVI video disguised as script","category":"Evasion","detected_by":"Heuristic analysis"}
281
+ {"filename":"music.wav.bat","technique":"Batch script disguised as audio file","category":"Evasion","detected_by":"Behavioral analysis"}
282
+ {"filename":"file.txt:evil.exe","technique":"Alternate data stream with executable payload","category":"Evasion","detected_by":"File system monitoring"}
283
+ {"filename":"installer.exe.{hidden}","technique":"Hidden extension using NTFS streams","category":"Evasion","detected_by":"File system monitoring"}
284
+ {"filename":"photo.gif.exe","technique":"GIF image with executable extension","category":"Evasion","detected_by":"Signature-based detection"}
285
+ {"filename":"script.ps1.exe","technique":"PowerShell script disguised as executable","category":"Evasion","detected_by":"Heuristic analysis"}
286
+ {"filename":"document.doc.exe","technique":"Word document with executable extension","category":"Evasion","detected_by":"Signature-based detection"}
287
+ {"filename":"archive.7z.bat","technique":"Batch script disguised as archive","category":"Evasion","detected_by":"Behavioral analysis"}
288
+ {"filename":"readme.md.exe","technique":"Markdown file with executable extension","category":"Evasion","detected_by":"Signature-based detection"}
289
+ {"filename":"config.xml.scr","technique":"XML config disguised as script","category":"Evasion","detected_by":"Heuristic analysis"}
290
+ {"filename":"data.json.bat","technique":"Batch script disguised as JSON data","category":"Evasion","detected_by":"Behavioral analysis"}
291
+ {"filename":"notes.rtf.exe","technique":"RTF file with executable extension","category":"Evasion","detected_by":"Signature-based detection"}
292
+ {"filename":"setup.msi.scr","technique":"MSI installer disguised as script","category":"Evasion","detected_by":"Heuristic analysis"}
293
+ {"filename":"image.tiff.bat","technique":"Batch script disguised as TIFF image","category":"Evasion","detected_by":"Behavioral analysis"}
294
+ {"filename":"file.log.exe","technique":"Log file with executable extension","category":"Evasion","detected_by":"Signature-based detection"}
295
+ {"filename":"script.sh.exe","technique":"Shell script disguised as executable","category":"Evasion","detected_by":"Heuristic analysis"}
296
+ {"filename":"document.odt.bat","technique":"Batch script disguised as OpenDocument text","category":"Evasion","detected_by":"Behavioral analysis"}
297
+ {"filename":"archive.zip:encrypted","technique":"Encrypted alternate data stream","category":"Evasion","detected_by":"File system monitoring"}
298
+ {"filename":"video.mp4:payload","technique":"Payload hidden in ADS","category":"Evasion","detected_by":"Behavioral analysis"}
299
+ {"filename":"image.jpg:steg","technique":"Steganography in alternate data stream","category":"Evasion","detected_by":"Advanced forensic analysis"}
300
+ {"filename":"document.pdf:macro","technique":"Macro hidden in ADS","category":"Evasion","detected_by":"Behavioral analysis"}
301
+ {"filename":"setup.exe:comspec","technique":"Command shell payload in ADS","category":"Evasion","detected_by":"File system monitoring"}
302
+ {"filename":"readme.txt:evil","technique":"Malicious code in ADS","category":"Evasion","detected_by":"Behavioral analysis"}
303
+ {"filename":"config.ini:payload","technique":"Config file with hidden payload","category":"Evasion","detected_by":"File system monitoring"}
304
+ {"filename":"script.js:exploit","technique":"Exploit code in ADS","category":"Evasion","detected_by":"Heuristic analysis"}
305
+ {"filename":"data.csv:malware","technique":"Malware hidden in ADS","category":"Evasion","detected_by":"Behavioral analysis"}
306
+ {"filename":"notes.txt:trojan","technique":"Trojan code in ADS","category":"Evasion","detected_by":"File system monitoring"}
307
+ {"filename":"installer.msi:payload","technique":"Installer with hidden payload","category":"Evasion","detected_by":"Sandboxing"}
308
+ {"filename":"photo.png:exploit","technique":"Exploit code in ADS","category":"Evasion","detected_by":"Heuristic analysis"}
309
+ {"filename":"video.avi:trojan","technique":"Trojan in ADS","category":"Evasion","detected_by":"Behavioral analysis"}
310
+ {"filename":"music.mp3:payload","technique":"Payload hidden in ADS","category":"Evasion","detected_by":"File system monitoring"}
311
+ {"filename":"archive.rar:exploit","technique":"Exploit code in ADS","category":"Evasion","detected_by":"Heuristic analysis"},
312
+ {"filename":"document.docx:macro","technique":"Macro hidden in ADS","category":"Evasion","detected_by":"Behavioral analysis"},
313
+ {"filename":"script.ps1:trojan","technique":"Trojan code in ADS","category":"Evasion","detected_by":"File system monitoring"},
314
+ {"filename":"file.exe:poly.bat","technique":"Polymorphic extension cycling","category":"Evasion","detected_by":"Behavioral analysis"}
315
+ {"filename":"setup.exe:encrypted","technique":"Encrypted payload in ADS","category":"Evasion","detected_by":"File system monitoring"}
316
+ {"filename":"readme.md:exploit","technique":"Exploit code in ADS","category":"Evasion","detected_by":"Heuristic analysis"}
317
+ {"filename":"config.xml:trojan","technique":"Trojan code in ADS","category":"Evasion","detected_by":"Behavioral analysis"}
318
+ {"filename":"data.json:payload","technique":"Payload hidden in ADS","category":"Evasion","detected_by":"File system monitoring"}
319
+ {"filename":"notes.rtf:exploit","technique":"Exploit code in ADS","category":"Evasion","detected_by":"Heuristic analysis"}
320
+ {"filename":"setup.msi:trojan","technique":"Trojan code in ADS","category":"Evasion","detected_by":"Behavioral analysis"}
321
+ {"filename":"image.tiff:payload","technique":"Payload hidden in ADS","category":"Evasion","detected_by":"File system monitoring"}
322
+ {"filename":"file.log:exploit","technique":"Exploit code in ADS","category":"Evasion","detected_by":"Heuristic analysis"}
323
+ {"filename":"script.sh:trojan","technique":"Trojan code in ADS","category":"Evasion","detected_by":"Behavioral analysis"}
324
+ {"filename":"document.odt:payload","technique":"Payload hidden in ADS","category":"Evasion","detected_by":"File system monitoring"}
325
+ {"filename":"archive.zip:poly.bat","technique":"Polymorphic extension cycling","category":"Evasion","detected_by":"Behavioral analysis"}
326
+ {"filename":"video.mp4:encrypted","technique":"Encrypted payload in ADS","category":"Evasion","detected_by":"File system monitoring"}
327
+ {"filename":"image.jpg:exploit","technique":"Exploit code in ADS","category":"Evasion","detected_by":"Heuristic analysis"}
328
+ {"filename":"document.pdf:trojan","technique":"Trojan code in ADS","category":"Evasion","detected_by":"Behavioral analysis"}
329
+ {"filename":"setup.exe:payload","technique":"Payload hidden in ADS","category":"Evasion","detected_by":"File system monitoring"}
330
+ {"filename":"readme.txt:encrypted","technique":"Encrypted payload in ADS","category":"Evasion","detected_by":"Behavioral analysis"}
331
+ {"filename":"config.ini:exploit","technique":"Exploit code in ADS","category":"Evasion","detected_by":"Heuristic analysis"}
332
+ {"filename":"script.js:trojan","technique":"Trojan code in ADS","category":"Evasion","detected_by":"Behavioral analysis"}
333
+ {"filename":"data.csv:payload","technique":"Payload hidden in ADS","category":"Evasion","detected_by":"File system monitoring"}
334
+ {"filename":"notes.txt:encrypted","technique":"Encrypted payload in ADS","category":"Evasion","detected_by":"Behavioral analysis"}
335
+ {"filename":"installer.msi:exploit","technique":"Exploit code in ADS","category":"Evasion","detected_by":"Heuristic analysis"}
336
+ {"filename":"photo.png:trojan","technique":"Trojan code in ADS","category":"Evasion","detected_by":"Behavioral analysis"}
337
+ {"filename":"video.avi:payload","technique":"Payload hidden in ADS","category":"Evasion","detected_by":"File system monitoring"}
338
+ {"filename":"music.mp3:encrypted","technique":"Encrypted payload in ADS","category":"Evasion","detected_by":"Behavioral analysis"}
339
+ {"filename":"archive.rar:trojan","technique":"Trojan code in ADS","category":"Evasion","detected_by":"Heuristic analysis"}
340
+ {"filename":"document.docx:payload","technique":"Payload hidden in ADS","category":"Evasion","detected_by":"Behavioral analysis"}
341
+ {"filename":"script.ps1:encrypted","technique":"Encrypted payload in ADS","category":"Evasion","detected_by":"File system monitoring"}