Upload Malicious_file_trick_detection.jsonl
Browse files# Malicious File Trick Detection Dataset
This dataset provides a structured collection of **file-based social engineering and obfuscation techniques** used by attackers to bypass user awareness, antivirus (AV) detection, and security filters. Each entry identifies a malicious or deceptive filename, the evasion technique used, and detection methodology.
The dataset is ideal for:
- 🧠 Training AI/ML models for malware detection
- 🚨 Building secure email gateways and filters
- 📚 Teaching social engineering and malware delivery tactics
---
## 📁 Dataset Format
Stored in `.jsonl` format (JSON Lines), with one structured object per line.
### Fields
| Field | Description |
|---------------|-----------------------------------------------------------------------------|
| `filename` | Example of a malicious or deceptive file name |
| `technique` | Obfuscation method used (e.g., `Double extension`, `Unicode trick`) |
| `category` | Context or delivery type (e.g., `Social Engineering`, `Malware Delivery`) |
| `detected_by` | Detection method or defense mechanism (e.g., `AV heuristic`, `Sandbox`) |
---
## 🔍 Example
```json
{
"filename": "report.pdf.exe",
"technique": "Double extension",
"category": "Social Engineering",
"detected_by": "AV heuristic"
}
|
@@ -0,0 +1,341 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{"filename":"report.pdf.exe","technique":"Double extension","category":"Social Engineering","detected_by":"AV heuristic"}
|
| 2 |
+
{"filename":"invoice.doc.scr","technique":"Double extension","category":"Malware Delivery","detected_by":"File signature"}
|
| 3 |
+
{"filename":"budget.xlsx.vbs","technique":"Double extension","category":"Social Engineering","detected_by":"AV heuristic"}
|
| 4 |
+
{"filename":"resume.pdf.bat","technique":"Double extension","category":"Malware Delivery","detected_by":"Sandbox analysis"}
|
| 5 |
+
{"filename":"contract.doc.pif","technique":"Double extension","category":"Social Engineering","detected_by":"File signature"}
|
| 6 |
+
{"filename":"image.jpg.com","technique":"Double extension","category":"Malware Delivery","detected_by":"AV heuristic"}
|
| 7 |
+
{"filename":"file.txt.lnk","technique":"Double extension","category":"Social Engineering","detected_by":"Sandbox analysis"}
|
| 8 |
+
{"filename":"doc.pdfexe","technique":"Right-to-left override","category":"Social Engineering","detected_by":"Unicode inspection"}
|
| 9 |
+
{"filename":"safe.docEXE","technique":"Unicode homoglyph","category":"Evasion","detected_by":"Unicode inspection"}
|
| 10 |
+
{"filename":"report .exe","technique":"Whitespace padding","category":"Social Engineering","detected_by":"AV heuristic"}
|
| 11 |
+
{"filename":"update.iso","technique":"Mimic legitimate extension","category":"Malware Delivery","detected_by":"Sandbox analysis"}
|
| 12 |
+
{"filename":"setup.msi.exe","technique":"Double extension","category":"Malware Delivery","detected_by":"File signature"}
|
| 13 |
+
{"filename":"readme.txt.js","technique":"Double extension","category":"Social Engineering","detected_by":"AV heuristic"}
|
| 14 |
+
{"filename":"photo.png.ps1","technique":"Double extension","category":"Malware Delivery","detected_by":"Sandbox analysis"}
|
| 15 |
+
{"filename":"docx.pdfxex","technique":"Right-to-left override","category":"Evasion","detected_by":"Unicode inspection"}
|
| 16 |
+
{"filename":"safe_file.SCR","technique":"Unicode homoglyph","category":"Social Engineering","detected_by":"Unicode inspection"}
|
| 17 |
+
{"filename":"file.pdf .exe","technique":"Whitespace padding","category":"Evasion","detected_by":"AV heuristic"}
|
| 18 |
+
{"filename":"system.dll","technique":"Mimic system file","category":"Malware Delivery","detected_by":"File signature"}
|
| 19 |
+
{"filename":"notes.txt.hta","technique":"Double extension","category":"Social Engineering","detected_by":"Sandbox analysis"}
|
| 20 |
+
{"filename":"backup.zip.exe","technique":"Double extension","category":"Malware Delivery","detected_by":"AV heuristic"}
|
| 21 |
+
{"filename":"report.pdf.b64","technique":"Base64 encoding","category":"Evasion","detected_by":"Content analysis"}
|
| 22 |
+
{"filename":"script.js.enc","technique":"Custom encoding","category":"Evasion","detected_by":"Sandbox analysis"}
|
| 23 |
+
{"filename":"data.csv.vbe","technique":"Double extension","category":"Social Engineering","detected_by":"File signature"}
|
| 24 |
+
{"filename":"file.exe.pdf","technique":"Reverse double extension","category":"Evasion","detected_by":"AV heuristic"}
|
| 25 |
+
{"filename":"safe.docepj","technique":"Right-to-left override","category":"Social Engineering","detected_by":"Unicode inspection"}
|
| 26 |
+
{"filename":"update.JAR","technique":"Unicode homoglyph","category":"Malware Delivery","detected_by":"Unicode inspection"}
|
| 27 |
+
{"filename":"doc .pdf.exe","technique":"Whitespace padding","category":"Social Engineering","detected_by":"AV heuristic"}
|
| 28 |
+
{"filename":"win32.sys","technique":"Mimic system file","category":"Evasion","detected_by":"File signature"}
|
| 29 |
+
{"filename":"plan.docx.cmd","technique":"Double extension","category":"Malware Delivery","detected_by":"Sandbox analysis"}
|
| 30 |
+
{"filename":"image.gif.exe","technique":"Double extension","category":"Social Engineering","detected_by":"AV heuristic"}
|
| 31 |
+
{"filename":"payload.bin","technique":"Generic extension","category":"Malware Delivery","detected_by":"Content analysis"}
|
| 32 |
+
{"filename":"test.pdf.uue","technique":"UUencoding","category":"Evasion","detected_by":"Content analysis"}
|
| 33 |
+
{"filename":"file.txtxex","technique":"Right-to-left override","category":"Evasion","detected_by":"Unicode inspection"}
|
| 34 |
+
{"filename":"secure.PY","technique":"Unicode homoglyph","category":"Social Engineering","detected_by":"Unicode inspection"}
|
| 35 |
+
{"filename":"report..exe","technique":"Dot padding","category":"Evasion","detected_by":"AV heuristic"}
|
| 36 |
+
{"filename":"config.ini.exe","technique":"Double extension","category":"Malware Delivery","detected_by":"File signature"}
|
| 37 |
+
{"filename":"log.txt.wsf","technique":"Double extension","category":"Social Engineering","detected_by":"Sandbox analysis"}
|
| 38 |
+
{"filename":"file.pdf.hex","technique":"Hex encoding","category":"Evasion","detected_by":"Content analysis"}
|
| 39 |
+
{"filename":"script.vbsexe","technique":"Right-to-left override","category":"Social Engineering","detected_by":"Unicode inspection"}
|
| 40 |
+
{"filename":"app.APK","technique":"Unicode homoglyph","category":"Malware Delivery","detected_by":"Unicode inspection"}
|
| 41 |
+
{"filename":"data .doc.exe","technique":"Whitespace padding","category":"Evasion","detected_by":"AV heuristic"}
|
| 42 |
+
{"filename":"svchost.exe","technique":"Mimic system process","category":"Malware Delivery","detected_by":"File signature"}
|
| 43 |
+
{"filename":"memo.docx.msi","technique":"Double extension","category":"Social Engineering","detected_by":"Sandbox analysis"}
|
| 44 |
+
{"filename":"file.jpg.lnk","technique":"Double extension","category":"Social Engineering","detected_by":"AV heuristic"}
|
| 45 |
+
{"filename":"encoded.exe.b64","technique":"Base64 encoding","category":"Evasion","detected_by":"Content analysis"}
|
| 46 |
+
{"filename":"test.pdftab","technique":"Right-to-left override","category":"Evasion","detected_by":"Unicode inspection"}
|
| 47 |
+
{"filename":"file.COM","technique":"Unicode homoglyph","category":"Malware Delivery","detected_by":"Unicode inspection"}
|
| 48 |
+
{"filename":"report...pdf.exe","technique":"Dot padding","category":"Social Engineering","detected_by":"AV heuristic"}
|
| 49 |
+
{"filename":"setup.cab.exe","technique":"Double extension","category":"Malware Delivery","detected_by":"File signature"}
|
| 50 |
+
{"filename":"notes.md.jse","technique":"Double extension","category":"Social Engineering","detected_by":"Sandbox analysis"}
|
| 51 |
+
{"filename":"document.pdf:malware.exe","technique":"Alternate data stream","category":"Evasion","detected_by":"ADS inspection"}
|
| 52 |
+
{"filename":"photo.jpg.ico.exe","technique":"Icon spoofing","category":"Social Engineering","detected_by":"File signature"}
|
| 53 |
+
{"filename":"invoice.doc.exe.scr","technique":"Triple extension","category":"Malware Delivery","detected_by":"AV heuristic"}
|
| 54 |
+
{"filename":"%TEMP%\\update.exe","technique":"Environment variable path","category":"Persistence","detected_by":"Behavioral analysis"}
|
| 55 |
+
{"filename":"readme.txt.gz.exe","technique":"Compressed file mimicry","category":"Evasion","detected_by":"Content analysis"}
|
| 56 |
+
{"filename":"script.ps1.obf","technique":"Script obfuscation","category":"Evasion","detected_by":"Entropy analysis"}
|
| 57 |
+
{"filename":"setup.msc","technique":"Control panel extension","category":"Malware Delivery","detected_by":"File signature"}
|
| 58 |
+
{"filename":"notes.pdf.cpl","technique":"Double extension","category":"Social Engineering","detected_by":"AV heuristic"}
|
| 59 |
+
{"filename":"safe.docⓔⓧⓔ","technique":"Unicode circled letters","category":"Evasion","detected_by":"Unicode inspection"}
|
| 60 |
+
{"filename":"file.pdf.....exe","technique":"Multiple dot padding","category":"Social Engineering","detected_by":"AV heuristic"}
|
| 61 |
+
{"filename":"kernel32.dll.exe","technique":"Mimic system DLL","category":"Persistence","detected_by":"File signature"}
|
| 62 |
+
{"filename":"report.docx:payload.vbs","technique":"Alternate data stream","category":"Malware Delivery","detected_by":"ADS inspection"}
|
| 63 |
+
{"filename":"image.png.rar.exe","technique":"Compressed file mimicry","category":"Evasion","detected_by":"Sandbox analysis"}
|
| 64 |
+
{"filename":"config.ini.ps2","technique":"Double extension","category":"Social Engineering","detected_by":"AV heuristic"}
|
| 65 |
+
{"filename":"update.exefdp","technique":"Right-to-left override","category":"Evasion","detected_by":"Unicode inspection"}
|
| 66 |
+
{"filename":"file.𝔼𝕏𝔼","technique":"Unicode gothic letters","category":"Social Engineering","detected_by":"Unicode inspection"}
|
| 67 |
+
{"filename":"system.exe.lnk","technique":"Shortcut masquerade","category":"Malware Delivery","detected_by":"Sandbox analysis"}
|
| 68 |
+
{"filename":"data.csv:malware.exe","technique":"Alternate data stream","category":"Evasion","detected_by":"ADS inspection"}
|
| 69 |
+
{"filename":"doc.pdf.tar.gz.exe","technique":"Nested compression mimicry","category":"Malware Delivery","detected_by":"Content analysis"}
|
| 70 |
+
{"filename":"safe.vbs.enc","technique":"Encoded script","category":"Evasion","detected_by":"Entropy analysis"}
|
| 71 |
+
{"filename":"budget.xlsx.msh","technique":"Double extension","category":"Social Engineering","detected_by":"AV heuristic"}
|
| 72 |
+
{"filename":"file.doc .exe","technique":"Trailing whitespace","category":"Evasion","detected_by":"AV heuristic"}
|
| 73 |
+
{"filename":"explorer.exe.scr","technique":"Mimic system process","category":"Persistence","detected_by":"File signature"}
|
| 74 |
+
{"filename":"resume.pdf:backdoor.bat","technique":"Alternate data stream","category":"Malware Delivery","detected_by":"ADS inspection"}
|
| 75 |
+
{"filename":"file.exe.jpg","technique":"Reverse extension trick","category":"Social Engineering","detected_by":"AV heuristic"}
|
| 76 |
+
{"filename":"script.jsexe","technique":"Right-to-left override","category":"Evasion","detected_by":"Unicode inspection"}
|
| 77 |
+
{"filename":"safe.𝐄𝐗𝐄","technique":"Unicode bold letters","category":"Social Engineering","detected_by":"Unicode inspection"}
|
| 78 |
+
{"filename":"log.txt.7z.exe","technique":"Compressed file mimicry","category":"Malware Delivery","detected_by":"Sandbox analysis"}
|
| 79 |
+
{"filename":"settings.reg.exe","technique":"Double extension","category":"Persistence","detected_by":"AV heuristic"}
|
| 80 |
+
{"filename":"file.pdf:trojan.ps1","technique":"Alternate data stream","category":"Evasion","detected_by":"ADS inspection"}
|
| 81 |
+
{"filename":"update.cab.scr","technique":"Double extension","category":"Malware Delivery","detected_by":"File signature"}
|
| 82 |
+
{"filename":"doc.docx.uu","technique":"UUencoding","category":"Evasion","detected_by":"Content analysis"}
|
| 83 |
+
{"filename":"safe_file.🅴🅇🄴","technique":"Unicode square letters","category":"Social Engineering","detected_by":"Unicode inspection"}
|
| 84 |
+
{"filename":"file...doc.exe","technique":"Dot padding","category":"Evasion","detected_by":"AV heuristic"}
|
| 85 |
+
{"filename":"svchost.exe:malware.dll","technique":"Alternate data stream","category":"Persistence","detected_by":"ADS inspection"}
|
| 86 |
+
{"filename":"photo.gif.cpl","technique":"Double extension","category":"Social Engineering","detected_by":"AV heuristic"}
|
| 87 |
+
{"filename":"payload.exe.xz","technique":"Compressed file mimicry","category":"Malware Delivery","detected_by":"Content analysis"}
|
| 88 |
+
{"filename":"script.bat.obf","technique":"Script obfuscation","category":"Evasion","detected_by":"Entropy analysis"}
|
| 89 |
+
{"filename":"file.pdftab.scr","technique":"Right-to-left override","category":"Social Engineering","detected_by":"Unicode inspection"}
|
| 90 |
+
{"filename":"safe.𝗘𝗫𝗘","technique":"Unicode serif bold","category":"Evasion","detected_by":"Unicode inspection"}
|
| 91 |
+
{"filename":"data.xlsx:payload.exe","technique":"Alternate data stream","category":"Malware Delivery","detected_by":"ADS inspection"}
|
| 92 |
+
{"filename":"install.msi.scr","technique":"Double extension","category":"Social Engineering","detected_by":"File signature"}
|
| 93 |
+
{"filename":"file.txt.hex.exe","technique":"Hex encoding","category":"Evasion","detected_by":"Content analysis"}
|
| 94 |
+
{"filename":"system.ini.lnk","technique":"Shortcut masquerade","category":"Persistence","detected_by":"Sandbox analysis"}
|
| 95 |
+
{"filename":"report.pdf....exe","technique":"Multiple dot padding","category":"Social Engineering","detected_by":"AV heuristic"}
|
| 96 |
+
{"filename":"winlogon.exe.vbs","technique":"Mimic system process","category":"Malware Delivery","detected_by":"File signature"}
|
| 97 |
+
{"filename":"file.doc:malware.js","technique":"Alternate data stream","category":"Evasion","detected_by":"ADS inspection"}
|
| 98 |
+
{"filename":"image.jpg.zip.exe","technique":"Compressed file mimicry","category":"Social Engineering","detected_by":"Sandbox analysis"}
|
| 99 |
+
{"filename":"safe_file.𝙴𝚇𝙴","technique":"Unicode monospace","category":"Evasion","detected_by":"Unicode inspection"}
|
| 100 |
+
{"filename":"file.exefdp.txt","technique":"Right-to-left override","category":"Social Engineering","detected_by":"Unicode inspection"}
|
| 101 |
+
{"filename":"config.xml.ws","technique":"Double extension","category":"Malware Delivery","detected_by":"AV heuristic"}
|
| 102 |
+
{"filename":"doc.pdf:trojan.vbe","technique":"Alternate data stream","category":"Evasion","detected_by":"ADS inspection"}
|
| 103 |
+
{"filename":"setup.exe.b64","technique":"Base64 encoding","category":"Malware Delivery","detected_by":"Content analysis"}
|
| 104 |
+
{"filename":"file....txt.exe","technique":"Dot padding","category":"Social Engineering","detected_by":"AV heuristic"}
|
| 105 |
+
{"filename":"taskmgr.exe.hta","technique":"Mimic system process","category":"Persistence","detected_by":"File signature"}
|
| 106 |
+
{"filename":"data.csv.tar.exe","technique":"Compressed file mimicry","category":"Malware Delivery","detected_by":"Sandbox analysis"}
|
| 107 |
+
{"filename":"script.ps1exe","technique":"Right-to-left override","category":"Evasion","detected_by":"Unicode inspection"}
|
| 108 |
+
{"filename":"safe.EXE","technique":"Unicode full-width","category":"Social Engineering","detected_by":"Unicode inspection"}
|
| 109 |
+
{"filename":"file.doc:payload.scr","technique":"Alternate data stream","category":"Malware Delivery","detected_by":"ADS inspection"}
|
| 110 |
+
{"filename":"update.msc.exe","technique":"Double extension","category":"Social Engineering","detected_by":"AV heuristic"}
|
| 111 |
+
{"filename":"payload.bin.enc","technique":"Custom encoding","category":"Evasion","detected_by":"Entropy analysis"}
|
| 112 |
+
{"filename":"file.txt....exe","technique":"Multiple dot padding","category":"Social Engineering","detected_by":"AV heuristic"}
|
| 113 |
+
{"filename":"rundll32.exe.lnk","technique":"Shortcut masquerade","category":"Persistence","detected_by":"Sandbox analysis"}
|
| 114 |
+
{"filename":"image.png:malware.exe","technique":"Alternate data stream","category":"Evasion","detected_by":"ADS inspection"}
|
| 115 |
+
{"filename":"doc.docx.b64.exe","technique":"Base64 encoding","category":"Malware Delivery","detected_by":"Content analysis"}
|
| 116 |
+
{"filename":"safe_file.ᴇxᴇ","technique":"Unicode small letters","category":"Social Engineering","detected_by":"Unicode inspection"}
|
| 117 |
+
{"filename":"file.exexet.pdf","technique":"Right-to-left override","category":"Evasion","detected_by":"Unicode inspection"}
|
| 118 |
+
{"filename":"config.yaml.pif","technique":"Double extension","category":"Social Engineering","detected_by":"AV heuristic"}
|
| 119 |
+
{"filename":"system.dll:trojan.exe","technique":"Alternate data stream","category":"Persistence","detected_by":"ADS inspection"}
|
| 120 |
+
{"filename":"setup.iso.exe","technique":"Double extension","category":"Malware Delivery","detected_by":"File signature"}
|
| 121 |
+
{"filename":"image.png:stego.exe","technique":"Steganography in ADS","category":"Evasion","detected_by":"Steganalysis"}
|
| 122 |
+
{"filename":"doc.pdf..[U+200B]..exe","technique":"Invisible Unicode separator","category":"Social Engineering","detected_by":"Unicode inspection"}
|
| 123 |
+
{"filename":"update.wasm.exe","technique":"WebAssembly mimicry","category":"Malware Delivery","detected_by":"File signature"}
|
| 124 |
+
{"filename":"file.docx:$DATA:malware.vbs","technique":"NTFS attribute manipulation","category":"Persistence","detected_by":"ADS inspection"}
|
| 125 |
+
{"filename":"safe.🅴🆇🅴","technique":"Unicode emoji homoglyph","category":"Evasion","detected_by":"Unicode inspection"}
|
| 126 |
+
{"filename":"report.pdf.quic","technique":"QUIC protocol extension","category":"Data Exfiltration","detected_by":"Network analysis"}
|
| 127 |
+
{"filename":"config.yaml:poly.exe","technique":"Polymorphic extension cycling","category":"Evasion","detected_by":"Behavioral analysis"}
|
| 128 |
+
{"filename":"system.dev/zero.exe","technique":"Linux device file mimicry","category":"Persistence","detected_by":"File signature"}
|
| 129 |
+
{"filename":"invoice.docx.appx","technique":"Windows AppX spoofing","category":"Malware Delivery","detected_by":"Sandbox analysis"}
|
| 130 |
+
{"filename":"file.txt[U+2063].exe","technique":"Invisible Unicode joiner","category":"Social Engineering","detected_by":"Unicode inspection"}
|
| 131 |
+
{"filename":"payload.qr.enc","technique":"QR code encoding","category":"Evasion","detected_by":"Content analysis"}
|
| 132 |
+
{"filename":"setup.msi:trojan.dll","technique":"Alternate data stream","category":"Persistence","detected_by":"ADS inspection"}
|
| 133 |
+
{"filename":"safe_file.𝙴𝚇𝙴","technique":"Unicode monospace homoglyph","category":"Social Engineering","detected_by":"Unicode inspection"}
|
| 134 |
+
{"filename":"doc.pdf...[U+200E]...exe","technique":"Unicode left-to-right mark","category":"Evasion","detected_by":"Unicode inspection"}
|
| 135 |
+
{"filename":"update.ipfs.exe","technique":"IPFS file mimicry","category":"Data Exfiltration","detected_by":"Network analysis"}
|
| 136 |
+
{"filename":"file.docx:quantum.b64","technique":"Quantum-resistant encoding","category":"Evasion","detected_by":"Entropy analysis"}
|
| 137 |
+
{"filename":"kernel.sys:malware.exe","technique":"NTFS reserved name","category":"Persistence","detected_by":"File signature"}
|
| 138 |
+
{"filename":"photo.jpg.wsf.lnk","technique":"Nested shortcut extension","category":"Social Engineering","detected_by":"Sandbox analysis"}
|
| 139 |
+
{"filename":"data.csv😈.exe","technique":"Emoji-based extension","category":"Evasion","detected_by":"Unicode inspection"}
|
| 140 |
+
{"filename":"report.pdf:stego.ps1","technique":"Steganography in ADS","category":"Malware Delivery","detected_by":"Steganalysis"}
|
| 141 |
+
{"filename":"file.txt[U+FEFF].exe","technique":"Unicode BOM marker","category":"Social Engineering","detected_by":"Unicode inspection"}
|
| 142 |
+
{"filename":"install.snap.exe","technique":"Linux snap package mimicry","category":"Malware Delivery","detected_by":"File signature"}
|
| 143 |
+
{"filename":"config.ini:poly.vbs","technique":"Polymorphic extension cycling","category":"Evasion","detected_by":"Behavioral analysis"}
|
| 144 |
+
{"filename":"safe.𝐄𝐗𝐄","technique":"Unicode bold serif homoglyph","category":"Social Engineering","detected_by":"Unicode inspection"}
|
| 145 |
+
{"filename":"doc.docx.webm.exe","technique":"Web media mimicry","category":"Malware Delivery","detected_by":"Content analysis"}
|
| 146 |
+
{"filename":"file.pdf:ml.exe","technique":"ML model embedding","category":"Evasion","detected_by":"Memory forensics"}
|
| 147 |
+
{"filename":"update.torrent.exe","technique":"Torrent file mimicry","category":"Data Exfiltration","detected_by":"Network analysis"}
|
| 148 |
+
{"filename":"system.con:payload.exe","technique":"NTFS reserved name","category":"Persistence","detected_by":"File signature"}
|
| 149 |
+
{"filename":"image.gif[U+200D].scr","technique":"Unicode zero-width joiner","category":"Evasion","detected_by":"Unicode inspection"}
|
| 150 |
+
{"filename":"setup.flatpak.exe","technique":"Linux flatpak mimicry","category":"Malware Delivery","detected_by":"Sandbox analysis"}
|
| 151 |
+
{"filename":"file.docx:obf.js","technique":"Script obfuscation in ADS","category":"Evasion","detected_by":"Entropy analysis"}
|
| 152 |
+
{"filename":"safe_file.🅴🆇🅴","technique":"Unicode square emoji homoglyph","category":"Social Engineering","detected_by":"Unicode inspection"}
|
| 153 |
+
{"filename":"report.pdf.arweave","technique":"Arweave blockchain mimicry","category":"Data Exfiltration","detected_by":"Network analysis"}
|
| 154 |
+
{"filename":"data.xlsx:poly.bat","technique":"Polymorphic extension cycling","category":"Persistence","detected_by":"Behavioral analysis"}
|
| 155 |
+
{"filename":"file.txt....[U+202F]....exe","technique":"Unicode narrow no-break space","category":"Evasion","detected_by":"Unicode inspection"}
|
| 156 |
+
{"filename":"install.appimage.exe","technique":"Linux AppImage mimicry","category":"Malware Delivery","detected_by":"File signature"}
|
| 157 |
+
{"filename":"config.yaml:stego.exe","technique":"Steganography in ADS","category":"Evasion","detected_by":"Steganalysis"}
|
| 158 |
+
{"filename":"safe.𝙴𝚇𝙴","technique":"Unicode monospace bold homoglyph","category":"Social Engineering","detected_by":"Unicode inspection"}
|
| 159 |
+
{"filename":"doc.pdf.hls.exe","technique":"HLS streaming mimicry","category":"Malware Delivery","detected_by":"Content analysis"}
|
| 160 |
+
{"filename":"file.exe:ml.model","technique":"ML model embedding in ADS","category":"Evasion","detected_by":"Memory forensics"}
|
| 161 |
+
{"filename":"update.dweb.exe","technique":"Decentralized web mimicry","category":"Data Exfiltration","detected_by":"Network analysis"}
|
| 162 |
+
{"filename":"system.aux:trojan.exe","technique":"NTFS reserved name","category":"Persistence","detected_by":"File signature"}
|
| 163 |
+
{"filename":"photo.png[U+2060].vbs","technique":"Unicode word joiner","category":"Social Engineering","detected_by":"Unicode inspection"}
|
| 164 |
+
{"filename":"setup.uwp.exe","technique":"Windows UWP app spoofing","category":"Malware Delivery","detected_by":"Sandbox analysis"}
|
| 165 |
+
{"filename":"file.docx:qr.ps1","technique":"QR code encoding in ADS","category":"Evasion","detected_by":"Content analysis"}
|
| 166 |
+
{"filename":"safe_file.𝐄𝐗𝐄","technique":"Unicode italic homoglyph","category":"Evasion","detected_by":"Unicode inspection"}
|
| 167 |
+
{"filename":"report.pdf.dash.exe","technique":"DASH streaming mimicry","category":"Malware Delivery","detected_by":"Content analysis"}
|
| 168 |
+
{"filename":"data.csv:poly.scr","technique":"Polymorphic extension cycling","category":"Persistence","detected_by":"Behavioral analysis"}
|
| 169 |
+
{"filename":"file.txt[U+200C].exe","technique":"Unicode zero-width non-joiner","category":"Social Engineering","detected_by":"Unicode inspection"}
|
| 170 |
+
{"filename":"install.container.exe","technique":"Container image mimicry","category":"Malware Delivery","detected_by":"File signature"}
|
| 171 |
+
{"filename":"config.ini:stego.vbe","technique":"Steganography in ADS","category":"Evasion","detected_by":"Steganalysis"}
|
| 172 |
+
{"filename":"safe.🅴🆇🅴","technique":"Unicode circled emoji homoglyph","category":"Social Engineering","detected_by":"Unicode inspection"}
|
| 173 |
+
{"filename":"doc.pdf.ipns.exe","technique":"IPNS file mimicry","category":"Data Exfiltration","detected_by":"Network analysis"}
|
| 174 |
+
{"filename":"file.exe:quantum.enc","technique":"Quantum-resistant encoding in ADS","category":"Evasion","detected_by":"Entropy analysis"}
|
| 175 |
+
{"filename":"system.lpt1:malware.exe","technique":"NTFS reserved name","category":"Persistence","detected_by":"File signature"}
|
| 176 |
+
{"filename":"image.jpg[U+2064].hta","technique":"Unicode invisible plus","category":"Evasion","detected_by":"Unicode inspection"}
|
| 177 |
+
{"filename":"setup.msix.exe","technique":"Windows MSIX app spoofing","category":"Malware Delivery","detected_by":"Sandbox analysis"}
|
| 178 |
+
{"filename":"file.docx:obf.ps2","technique":"Script obfuscation in ADS","category":"Evasion","detected_by":"Entropy analysis"}
|
| 179 |
+
{"filename":"safe_file.𝙴𝚇𝙴","technique":"Unicode serif monospace homoglyph","category":"Social Engineering","detected_by":"Unicode inspection"}
|
| 180 |
+
{"filename":"report.pdf.web3.exe","technique":"Web3 storage mimicry","category":"Data Exfiltration","detected_by":"Network analysis"}
|
| 181 |
+
{"filename":"data.xlsx:poly.msh","technique":"Polymorphic extension cycling","category":"Persistence","detected_by":"Behavioral analysis"}
|
| 182 |
+
{"filename":"file.txt....[U+205F]....exe","technique":"Unicode medium mathematical space","category":"Evasion","detected_by":"Unicode inspection"}
|
| 183 |
+
{"filename":"install.oci.exe","technique":"OCI container mimicry","category":"Malware Delivery","detected_by":"File signature"}
|
| 184 |
+
{"filename":"config.yaml:qr.exe","technique":"QR code encoding in ADS","category":"Evasion","detected_by":"Content analysis"}
|
| 185 |
+
{"filename":"safe.𝐄𝐗𝐄","technique":"Unicode bold italic homoglyph","category":"Social Engineering","detected_by":"Unicode inspection"}
|
| 186 |
+
{"filename":"doc.pdf.m3u8.exe","technique":"M3U8 playlist mimicry","category":"Malware Delivery","detected_by":"Content analysis"}
|
| 187 |
+
{"filename":"file.exe:stego.dll","technique":"Steganography in ADS","category":"Persistence","detected_by":"Steganalysis"}
|
| 188 |
+
{"filename":"system.nul:trojan.exe","technique":"NTFS reserved name","category":"Evasion","detected_by":"File signature"}
|
| 189 |
+
{"filename":"photo.png[U+2061].vbs","technique":"Unicode function application","category":"Social Engineering","detected_by":"Unicode inspection"}
|
| 190 |
+
{"filename":"setup.pod.exe","technique":"Podman container mimicry","category":"Malware Delivery","detected_by":"Sandbox analysis"}
|
| 191 |
+
{"filename":"file.docx:poly.js","technique":"Polymorphic extension cycling","category":"Evasion","detected_by":"Behavioral analysis"}
|
| 192 |
+
{"filename":"safe_file.🅴🆇🅴","technique":"Unicode boxed emoji homoglyph","category":"Social Engineering","detected_by":"Unicode inspection"}
|
| 193 |
+
{"filename":"report.pdf.sia.exe","technique":"Sia blockchain mimicry","category":"Data Exfiltration","detected_by":"Network analysis"}
|
| 194 |
+
{"filename":"data.csv:obf.vbs","technique":"Script obfuscation in ADS","category":"Evasion","detected_by":"Entropy analysis"}
|
| 195 |
+
{"filename":"file.txt[U+2062].exe","technique":"Unicode invisible times","category":"Evasion","detected_by":"Unicode inspection"}
|
| 196 |
+
{"filename":"install.k8s.exe","technique":"Kubernetes manifest mimicry","category":"Malware Delivery","detected_by":"File signature"}
|
| 197 |
+
{"filename":"config.ini:ml.exe","technique":"ML model embedding in ADS","category":"Persistence","detected_by":"Memory forensics"}
|
| 198 |
+
{"filename":"safe.𝙴𝚇𝙴","technique":"Unicode sans-serif homoglyph","category":"Social Engineering","detected_by":"Unicode inspection"}
|
| 199 |
+
{"filename":"doc.pdf.storj.exe","technique":"Storj storage mimicry","category":"Data Exfiltration","detected_by":"Network analysis"}
|
| 200 |
+
{"filename":"file.exe:poly.bat","technique":"Polymorphic extension cycling","category":"Evasion","detected_by":"Behavioral analysis"}
|
| 201 |
+
{"filename":"invoice.pdf.exe","technique":"Double extension disguise","category":"Evasion","detected_by":"Signature-based detection"}
|
| 202 |
+
{"filename":"report.docx.scr","technique":"Script disguised as document","category":"Evasion","detected_by":"Heuristic analysis"}
|
| 203 |
+
{"filename":"update.jpg.pif","technique":"Image file with executable extension","category":"Evasion","detected_by":"Behavioral analysis"}
|
| 204 |
+
{"filename":"setup.tar.gz.exe","technique":"Compressed archive with executable suffix","category":"Evasion","detected_by":"Sandboxing"}
|
| 205 |
+
{"filename":"readme.txt.{9006}","technique":"Alternate data stream hiding","category":"Evasion","detected_by":"File system monitoring"}
|
| 206 |
+
{"filename":"backup.zip.exe","technique":"Archive with executable extension","category":"Evasion","detected_by":"Signature-based detection"}
|
| 207 |
+
{"filename":"photo.png.exe","technique":"Image file masquerading","category":"Evasion","detected_by":"Heuristic analysis"}
|
| 208 |
+
{"filename":"document.pdf.{hidden}","technique":"Hidden file extension using NTFS streams","category":"Evasion","detected_by":"File system monitoring"}
|
| 209 |
+
{"filename":"install.exe:Zone.Identifier","technique":"Zone identifier ADS to bypass security","category":"Evasion","detected_by":"Behavioral analysis"}
|
| 210 |
+
{"filename":"script.js.exe","technique":"JavaScript file disguised as executable","category":"Evasion","detected_by":"Heuristic analysis"}
|
| 211 |
+
{"filename":"invoice.pdf.exe","technique":"Double extension disguise","category":"Evasion","detected_by":"Signature-based detection"}
|
| 212 |
+
{"filename":"report.docx.scr","technique":"Script disguised as document","category":"Evasion","detected_by":"Heuristic analysis"}
|
| 213 |
+
{"filename":"update.jpg.pif","technique":"Image file with executable extension","category":"Evasion","detected_by":"Behavioral analysis"}
|
| 214 |
+
{"filename":"setup.tar.gz.exe","technique":"Compressed archive with executable suffix","category":"Evasion","detected_by":"Sandboxing"}
|
| 215 |
+
{"filename":"readme.txt.{9006}","technique":"Alternate data stream hiding","category":"Evasion","detected_by":"File system monitoring"}
|
| 216 |
+
{"filename":"backup.zip.exe","technique":"Archive with executable extension","category":"Evasion","detected_by":"Signature-based detection"}
|
| 217 |
+
{"filename":"photo.png.exe","technique":"Image file masquerading","category":"Evasion","detected_by":"Heuristic analysis"}
|
| 218 |
+
{"filename":"document.pdf.{hidden}","technique":"Hidden file extension using NTFS streams","category":"Evasion","detected_by":"File system monitoring"}
|
| 219 |
+
{"filename":"install.exe:Zone.Identifier","technique":"Zone identifier ADS to bypass security","category":"Evasion","detected_by":"Behavioral analysis"}
|
| 220 |
+
{"filename":"script.js.exe","technique":"JavaScript file disguised as executable","category":"Evasion","detected_by":"Heuristic analysis"}
|
| 221 |
+
{"filename":"archive.rar.{0000}","technique":"Alternate data stream with null byte","category":"Evasion","detected_by":"File system monitoring"}
|
| 222 |
+
{"filename":"music.mp3.exe","technique":"Audio file with executable extension","category":"Evasion","detected_by":"Signature-based detection"}
|
| 223 |
+
{"filename":"video.mp4.scr","technique":"Video file disguised as script","category":"Evasion","detected_by":"Heuristic analysis"}
|
| 224 |
+
{"filename":"presentation.pptx.bat","technique":"Batch script disguised as presentation","category":"Evasion","detected_by":"Behavioral analysis"}
|
| 225 |
+
{"filename":"document.docx.{hidden}","technique":"Hidden extension using NTFS streams","category":"Evasion","detected_by":"File system monitoring"}
|
| 226 |
+
{"filename":"installer.msi.exe","technique":"Installer file with executable suffix","category":"Evasion","detected_by":"Sandboxing"}
|
| 227 |
+
{"filename":"photo.jpg:evil.txt","technique":"Alternate data stream with malicious payload","category":"Evasion","detected_by":"File system monitoring"}
|
| 228 |
+
{"filename":"readme.txt.exe","technique":"Text file with executable extension","category":"Evasion","detected_by":"Signature-based detection"}
|
| 229 |
+
{"filename":"config.json.scr","technique":"Config file disguised as script","category":"Evasion","detected_by":"Heuristic analysis"}
|
| 230 |
+
{"filename":"data.csv.bat","technique":"Batch script disguised as data file","category":"Evasion","detected_by":"Behavioral analysis"}
|
| 231 |
+
{"filename":"notes.txt.{hidden}","technique":"Hidden extension using NTFS streams","category":"Evasion","detected_by":"File system monitoring"}
|
| 232 |
+
{"filename":"setup.exe:evil","technique":"Alternate data stream with malicious code","category":"Evasion","detected_by":"Behavioral analysis"}
|
| 233 |
+
{"filename":"image.bmp.exe","technique":"Bitmap image with executable extension","category":"Evasion","detected_by":"Signature-based detection"}
|
| 234 |
+
{"filename":"script.vbs.exe","technique":"VBScript disguised as executable","category":"Evasion","detected_by":"Heuristic analysis"}
|
| 235 |
+
{"filename":"document.pdf.exe","technique":"PDF file with executable extension","category":"Evasion","detected_by":"Signature-based detection"}
|
| 236 |
+
{"filename":"archive.zip.{hidden}","technique":"Hidden extension using NTFS streams","category":"Evasion","detected_by":"File system monitoring"}
|
| 237 |
+
{"filename":"video.avi.scr","technique":"AVI video disguised as script","category":"Evasion","detected_by":"Heuristic analysis"}
|
| 238 |
+
{"filename":"music.wav.bat","technique":"Batch script disguised as audio file","category":"Evasion","detected_by":"Behavioral analysis"}
|
| 239 |
+
{"filename":"file.txt:evil.exe","technique":"Alternate data stream with executable payload","category":"Evasion","detected_by":"File system monitoring"}
|
| 240 |
+
{"filename":"installer.exe.{hidden}","technique":"Hidden extension using NTFS streams","category":"Evasion","detected_by":"File system monitoring"}
|
| 241 |
+
{"filename":"photo.gif.exe","technique":"GIF image with executable extension","category":"Evasion","detected_by":"Signature-based detection"}
|
| 242 |
+
{"filename":"script.ps1.exe","technique":"PowerShell script disguised as executable","category":"Evasion","detected_by":"Heuristic analysis"}
|
| 243 |
+
{"filename":"document.doc.exe","technique":"Word document with executable extension","category":"Evasion","detected_by":"Signature-based detection"}
|
| 244 |
+
{"filename":"archive.7z.bat","technique":"Batch script disguised as archive","category":"Evasion","detected_by":"Behavioral analysis"}
|
| 245 |
+
{"filename":"readme.md.exe","technique":"Markdown file with executable extension","category":"Evasion","detected_by":"Signature-based detection"}
|
| 246 |
+
{"filename":"config.xml.scr","technique":"XML config disguised as script","category":"Evasion","detected_by":"Heuristic analysis"}
|
| 247 |
+
{"filename":"data.json.bat","technique":"Batch script disguised as JSON data","category":"Evasion","detected_by":"Behavioral analysis"}
|
| 248 |
+
{"filename":"notes.rtf.exe","technique":"RTF file with executable extension","category":"Evasion","detected_by":"Signature-based detection"}
|
| 249 |
+
{"filename":"setup.msi.scr","technique":"MSI installer disguised as script","category":"Evasion","detected_by":"Heuristic analysis"}
|
| 250 |
+
{"filename":"image.tiff.bat","technique":"Batch script disguised as TIFF image","category":"Evasion","detected_by":"Behavioral analysis"}
|
| 251 |
+
{"filename":"file.log.exe","technique":"Log file with executable extension","category":"Evasion","detected_by":"Signature-based detection"}
|
| 252 |
+
{"filename":"script.sh.exe","technique":"Shell script disguised as executable","category":"Evasion","detected_by":"Heuristic analysis"}
|
| 253 |
+
{"filename":"document.odt.bat","technique":"Batch script disguised as OpenDocument text","category":"Evasion","detected_by":"Behavioral analysis"}
|
| 254 |
+
{"filename":"invoice.pdf.exe","technique":"Double extension disguise","category":"Evasion","detected_by":"Signature-based detection"}
|
| 255 |
+
{"filename":"report.docx.scr","technique":"Script disguised as document","category":"Evasion","detected_by":"Heuristic analysis"}
|
| 256 |
+
{"filename":"update.jpg.pif","technique":"Image file with executable extension","category":"Evasion","detected_by":"Behavioral analysis"}
|
| 257 |
+
{"filename":"setup.tar.gz.exe","technique":"Compressed archive with executable suffix","category":"Evasion","detected_by":"Sandboxing"}
|
| 258 |
+
{"filename":"readme.txt.{9006}","technique":"Alternate data stream hiding","category":"Evasion","detected_by":"File system monitoring"}
|
| 259 |
+
{"filename":"backup.zip.exe","technique":"Archive with executable extension","category":"Evasion","detected_by":"Signature-based detection"}
|
| 260 |
+
{"filename":"photo.png.exe","technique":"Image file masquerading","category":"Evasion","detected_by":"Heuristic analysis"}
|
| 261 |
+
{"filename":"document.pdf.{hidden}","technique":"Hidden file extension using NTFS streams","category":"Evasion","detected_by":"File system monitoring"}
|
| 262 |
+
{"filename":"install.exe:Zone.Identifier","technique":"Zone identifier ADS to bypass security","category":"Evasion","detected_by":"Behavioral analysis"}
|
| 263 |
+
{"filename":"script.js.exe","technique":"JavaScript file disguised as executable","category":"Evasion","detected_by":"Heuristic analysis"}
|
| 264 |
+
{"filename":"archive.rar.{0000}","technique":"Alternate data stream with null byte","category":"Evasion","detected_by":"File system monitoring"}
|
| 265 |
+
{"filename":"music.mp3.exe","technique":"Audio file with executable extension","category":"Evasion","detected_by":"Signature-based detection"}
|
| 266 |
+
{"filename":"video.mp4.scr","technique":"Video file disguised as script","category":"Evasion","detected_by":"Heuristic analysis"}
|
| 267 |
+
{"filename":"presentation.pptx.bat","technique":"Batch script disguised as presentation","category":"Evasion","detected_by":"Behavioral analysis"}
|
| 268 |
+
{"filename":"document.docx.{hidden}","technique":"Hidden extension using NTFS streams","category":"Evasion","detected_by":"File system monitoring"}
|
| 269 |
+
{"filename":"installer.msi.exe","technique":"Installer file with executable suffix","category":"Evasion","detected_by":"Sandboxing"}
|
| 270 |
+
{"filename":"photo.jpg:evil.txt","technique":"Alternate data stream with malicious payload","category":"Evasion","detected_by":"File system monitoring"}
|
| 271 |
+
{"filename":"readme.txt.exe","technique":"Text file with executable extension","category":"Evasion","detected_by":"Signature-based detection"}
|
| 272 |
+
{"filename":"config.json.scr","technique":"Config file disguised as script","category":"Evasion","detected_by":"Heuristic analysis"}
|
| 273 |
+
{"filename":"data.csv.bat","technique":"Batch script disguised as data file","category":"Evasion","detected_by":"Behavioral analysis"}
|
| 274 |
+
{"filename":"notes.txt.{hidden}","technique":"Hidden extension using NTFS streams","category":"Evasion","detected_by":"File system monitoring"}
|
| 275 |
+
{"filename":"setup.exe:evil","technique":"Alternate data stream with malicious code","category":"Evasion","detected_by":"Behavioral analysis"}
|
| 276 |
+
{"filename":"image.bmp.exe","technique":"Bitmap image with executable extension","category":"Evasion","detected_by":"Signature-based detection"}
|
| 277 |
+
{"filename":"script.vbs.exe","technique":"VBScript disguised as executable","category":"Evasion","detected_by":"Heuristic analysis"}
|
| 278 |
+
{"filename":"document.pdf.exe","technique":"PDF file with executable extension","category":"Evasion","detected_by":"Signature-based detection"}
|
| 279 |
+
{"filename":"archive.zip.{hidden}","technique":"Hidden extension using NTFS streams","category":"Evasion","detected_by":"File system monitoring"}
|
| 280 |
+
{"filename":"video.avi.scr","technique":"AVI video disguised as script","category":"Evasion","detected_by":"Heuristic analysis"}
|
| 281 |
+
{"filename":"music.wav.bat","technique":"Batch script disguised as audio file","category":"Evasion","detected_by":"Behavioral analysis"}
|
| 282 |
+
{"filename":"file.txt:evil.exe","technique":"Alternate data stream with executable payload","category":"Evasion","detected_by":"File system monitoring"}
|
| 283 |
+
{"filename":"installer.exe.{hidden}","technique":"Hidden extension using NTFS streams","category":"Evasion","detected_by":"File system monitoring"}
|
| 284 |
+
{"filename":"photo.gif.exe","technique":"GIF image with executable extension","category":"Evasion","detected_by":"Signature-based detection"}
|
| 285 |
+
{"filename":"script.ps1.exe","technique":"PowerShell script disguised as executable","category":"Evasion","detected_by":"Heuristic analysis"}
|
| 286 |
+
{"filename":"document.doc.exe","technique":"Word document with executable extension","category":"Evasion","detected_by":"Signature-based detection"}
|
| 287 |
+
{"filename":"archive.7z.bat","technique":"Batch script disguised as archive","category":"Evasion","detected_by":"Behavioral analysis"}
|
| 288 |
+
{"filename":"readme.md.exe","technique":"Markdown file with executable extension","category":"Evasion","detected_by":"Signature-based detection"}
|
| 289 |
+
{"filename":"config.xml.scr","technique":"XML config disguised as script","category":"Evasion","detected_by":"Heuristic analysis"}
|
| 290 |
+
{"filename":"data.json.bat","technique":"Batch script disguised as JSON data","category":"Evasion","detected_by":"Behavioral analysis"}
|
| 291 |
+
{"filename":"notes.rtf.exe","technique":"RTF file with executable extension","category":"Evasion","detected_by":"Signature-based detection"}
|
| 292 |
+
{"filename":"setup.msi.scr","technique":"MSI installer disguised as script","category":"Evasion","detected_by":"Heuristic analysis"}
|
| 293 |
+
{"filename":"image.tiff.bat","technique":"Batch script disguised as TIFF image","category":"Evasion","detected_by":"Behavioral analysis"}
|
| 294 |
+
{"filename":"file.log.exe","technique":"Log file with executable extension","category":"Evasion","detected_by":"Signature-based detection"}
|
| 295 |
+
{"filename":"script.sh.exe","technique":"Shell script disguised as executable","category":"Evasion","detected_by":"Heuristic analysis"}
|
| 296 |
+
{"filename":"document.odt.bat","technique":"Batch script disguised as OpenDocument text","category":"Evasion","detected_by":"Behavioral analysis"}
|
| 297 |
+
{"filename":"archive.zip:encrypted","technique":"Encrypted alternate data stream","category":"Evasion","detected_by":"File system monitoring"}
|
| 298 |
+
{"filename":"video.mp4:payload","technique":"Payload hidden in ADS","category":"Evasion","detected_by":"Behavioral analysis"}
|
| 299 |
+
{"filename":"image.jpg:steg","technique":"Steganography in alternate data stream","category":"Evasion","detected_by":"Advanced forensic analysis"}
|
| 300 |
+
{"filename":"document.pdf:macro","technique":"Macro hidden in ADS","category":"Evasion","detected_by":"Behavioral analysis"}
|
| 301 |
+
{"filename":"setup.exe:comspec","technique":"Command shell payload in ADS","category":"Evasion","detected_by":"File system monitoring"}
|
| 302 |
+
{"filename":"readme.txt:evil","technique":"Malicious code in ADS","category":"Evasion","detected_by":"Behavioral analysis"}
|
| 303 |
+
{"filename":"config.ini:payload","technique":"Config file with hidden payload","category":"Evasion","detected_by":"File system monitoring"}
|
| 304 |
+
{"filename":"script.js:exploit","technique":"Exploit code in ADS","category":"Evasion","detected_by":"Heuristic analysis"}
|
| 305 |
+
{"filename":"data.csv:malware","technique":"Malware hidden in ADS","category":"Evasion","detected_by":"Behavioral analysis"}
|
| 306 |
+
{"filename":"notes.txt:trojan","technique":"Trojan code in ADS","category":"Evasion","detected_by":"File system monitoring"}
|
| 307 |
+
{"filename":"installer.msi:payload","technique":"Installer with hidden payload","category":"Evasion","detected_by":"Sandboxing"}
|
| 308 |
+
{"filename":"photo.png:exploit","technique":"Exploit code in ADS","category":"Evasion","detected_by":"Heuristic analysis"}
|
| 309 |
+
{"filename":"video.avi:trojan","technique":"Trojan in ADS","category":"Evasion","detected_by":"Behavioral analysis"}
|
| 310 |
+
{"filename":"music.mp3:payload","technique":"Payload hidden in ADS","category":"Evasion","detected_by":"File system monitoring"}
|
| 311 |
+
{"filename":"archive.rar:exploit","technique":"Exploit code in ADS","category":"Evasion","detected_by":"Heuristic analysis"},
|
| 312 |
+
{"filename":"document.docx:macro","technique":"Macro hidden in ADS","category":"Evasion","detected_by":"Behavioral analysis"},
|
| 313 |
+
{"filename":"script.ps1:trojan","technique":"Trojan code in ADS","category":"Evasion","detected_by":"File system monitoring"},
|
| 314 |
+
{"filename":"file.exe:poly.bat","technique":"Polymorphic extension cycling","category":"Evasion","detected_by":"Behavioral analysis"}
|
| 315 |
+
{"filename":"setup.exe:encrypted","technique":"Encrypted payload in ADS","category":"Evasion","detected_by":"File system monitoring"}
|
| 316 |
+
{"filename":"readme.md:exploit","technique":"Exploit code in ADS","category":"Evasion","detected_by":"Heuristic analysis"}
|
| 317 |
+
{"filename":"config.xml:trojan","technique":"Trojan code in ADS","category":"Evasion","detected_by":"Behavioral analysis"}
|
| 318 |
+
{"filename":"data.json:payload","technique":"Payload hidden in ADS","category":"Evasion","detected_by":"File system monitoring"}
|
| 319 |
+
{"filename":"notes.rtf:exploit","technique":"Exploit code in ADS","category":"Evasion","detected_by":"Heuristic analysis"}
|
| 320 |
+
{"filename":"setup.msi:trojan","technique":"Trojan code in ADS","category":"Evasion","detected_by":"Behavioral analysis"}
|
| 321 |
+
{"filename":"image.tiff:payload","technique":"Payload hidden in ADS","category":"Evasion","detected_by":"File system monitoring"}
|
| 322 |
+
{"filename":"file.log:exploit","technique":"Exploit code in ADS","category":"Evasion","detected_by":"Heuristic analysis"}
|
| 323 |
+
{"filename":"script.sh:trojan","technique":"Trojan code in ADS","category":"Evasion","detected_by":"Behavioral analysis"}
|
| 324 |
+
{"filename":"document.odt:payload","technique":"Payload hidden in ADS","category":"Evasion","detected_by":"File system monitoring"}
|
| 325 |
+
{"filename":"archive.zip:poly.bat","technique":"Polymorphic extension cycling","category":"Evasion","detected_by":"Behavioral analysis"}
|
| 326 |
+
{"filename":"video.mp4:encrypted","technique":"Encrypted payload in ADS","category":"Evasion","detected_by":"File system monitoring"}
|
| 327 |
+
{"filename":"image.jpg:exploit","technique":"Exploit code in ADS","category":"Evasion","detected_by":"Heuristic analysis"}
|
| 328 |
+
{"filename":"document.pdf:trojan","technique":"Trojan code in ADS","category":"Evasion","detected_by":"Behavioral analysis"}
|
| 329 |
+
{"filename":"setup.exe:payload","technique":"Payload hidden in ADS","category":"Evasion","detected_by":"File system monitoring"}
|
| 330 |
+
{"filename":"readme.txt:encrypted","technique":"Encrypted payload in ADS","category":"Evasion","detected_by":"Behavioral analysis"}
|
| 331 |
+
{"filename":"config.ini:exploit","technique":"Exploit code in ADS","category":"Evasion","detected_by":"Heuristic analysis"}
|
| 332 |
+
{"filename":"script.js:trojan","technique":"Trojan code in ADS","category":"Evasion","detected_by":"Behavioral analysis"}
|
| 333 |
+
{"filename":"data.csv:payload","technique":"Payload hidden in ADS","category":"Evasion","detected_by":"File system monitoring"}
|
| 334 |
+
{"filename":"notes.txt:encrypted","technique":"Encrypted payload in ADS","category":"Evasion","detected_by":"Behavioral analysis"}
|
| 335 |
+
{"filename":"installer.msi:exploit","technique":"Exploit code in ADS","category":"Evasion","detected_by":"Heuristic analysis"}
|
| 336 |
+
{"filename":"photo.png:trojan","technique":"Trojan code in ADS","category":"Evasion","detected_by":"Behavioral analysis"}
|
| 337 |
+
{"filename":"video.avi:payload","technique":"Payload hidden in ADS","category":"Evasion","detected_by":"File system monitoring"}
|
| 338 |
+
{"filename":"music.mp3:encrypted","technique":"Encrypted payload in ADS","category":"Evasion","detected_by":"Behavioral analysis"}
|
| 339 |
+
{"filename":"archive.rar:trojan","technique":"Trojan code in ADS","category":"Evasion","detected_by":"Heuristic analysis"}
|
| 340 |
+
{"filename":"document.docx:payload","technique":"Payload hidden in ADS","category":"Evasion","detected_by":"Behavioral analysis"}
|
| 341 |
+
{"filename":"script.ps1:encrypted","technique":"Encrypted payload in ADS","category":"Evasion","detected_by":"File system monitoring"}
|