The Anatomy of HTML Attachment Phishing

d96e5c5dcea235e9c09c0888e599ec65

d24f61d477b1316c6def56884c37e2b8

ce7f2eae6ff89583701190617f793ee6

ca932194d4b07951469d1edd61121781

ad30bcf6b4810a164a94e20eeff5baa3

9d43f9a6b6c300dfa27fd5323bbed60e

735951849ba066a36758e88df07a0340

6566752f8346445cb3c1866fa340e322

3656c01ce5f8cc2e2d3f727c19575480

1bedb92af8650aa0313893fb0cdc671c

83bfd80edf2e092d9d5d7756abcc624e

86c78d6ed2fb2b04741a232bb24e5a82

7d43031c91bcaab993df375d3a47d114

c96fb3ec71f00bac34d106b832cf30d4

64efa7e5d18c73ec9dae63c4efac197f

962a7b5661e81cd3462181a65b664436

92d58240601c8807e8eda8d2477dda6a

c40ab475570d8913724b23e3c520be60

4d992e66aac3d0b81910c7a2726106df

52e7c55329436499921a946fe72b2376

abe0b0079a242387e5b3a8b8426a7529

3dff9b0c904647920e973ab51c3f5d9b

b080fdcf422750467c5987ee24ad7e0a

805aeb114220d1753e1cd2415bf9aa86

86e65eeb38870b086844e3d84779a6a0

abc2580647f8ed60f377b924d8808050

53b0a816113e47d666c32752584ea818

967dcc52ced38d05bed89ddc45b74627

ac2b3e3e06c6fc7ec62b2c1167b4f499

cb2f0b3f97a28bb6ecf15f3354c70fd0

f9afd7559538e4cf687a0d52bfc1b694

7b29e71ff9e278a436786ad6af5fcc01

4f3ce8ec6a45364ea73b68fe4573853e

f4a390d23d4fd03a665f3bcd2be957cb

675ec70065d13710bb40f82b1e28a9a7

d2d8806d7477b590ff364ca28c5c69ac

db3d5e9ff6103b584afef2cdd9184ce0

fd3a5edbdc33ca5e7a08893f82070c7b

9e636130b641183b9710183586a97079

7c1971c557a613708fd60928091a9c59

279f96beee54968500f7ef3971252e7a

cc9781d1480106249abeaf4e522accfa

45b940ae7617afb4bd7dce6fae870c90

c6277045498542a232ceba8abee99223

dde98bd04562ecfa0b90477c060d8a9c

41e57e23156a64a9d8ddbc514e317000

c899a0a561ea3a8fb7eb7687bde05da8

40fbc6662a306bf142d7019ddaeac7b5

73d4c7ba717423f44345340f309a8990

c6fcc1fca35cef0be981bad42a485aab

142a48f90c60d8553cf2b9fe11e3af22

d9f2fb38f9432526dd978dbc306f4e8a

f111b336e29e4ab019e0d9e549a20bfa

0fe8c873ada4bbe9bbb84c019ca25780

15de0b72f3263ef052b2aa3fdf7ccc5a

4289e249328ff40b6b964cd4dcb0c257

30b972c81e092bddbd66f1373e5c67a5

30190af9969914693c5da00d24efccb2

b655c416a6a395a28a934894260adf70

f30430554f1eebeffbf4b0a6c9da16ce

0bb00fd7b6acbe024d0a5cfacef65d02

bb93f7c4f449d7b4ceb69a624a5da721

f75bbabc887d1ef4a9b3e28d921c90a8

b9b6251f872d599437e08be2a6d61619

d13e3e448aea9f12b099255b8b5da0ce

1d72f4838603d4812a7865e69b24cd10

9c6601b8af57f2536b3dc34f63a9bf7e

755edc95125ec4cbbff4cd3859a03050

978b6fe89366b35d01340a183cac9894

bce84588ad7778157326f856a4f2f235

cba0b485cde78df1ca38cb7557294d1a

d59c8fee6f99185d4e4e57a465635fa1

1e921ed48263d7b1076b06a777cec3f2

2cf1252f2966c23759fbd38eaaa8648e

2846e281e165221fa52d9970266ce2f2

b5e05e93f0246f328bdabf8b3c6fb6cd

7a4dd6388d2792991286915baa9a8788

9b406af8bed6bffac8d3a5f2f7f7f6ed

3982f8fddf4e36d16cf6891357cf1b39

a52277aa2779e13a62a35688afed8949

cfe18d98355d586e8e5ebac5dc71899b

3b76c708955fbae140759536ec56cf18

d3a9878c9670ebfca4e2c650111e2055

a4374458883f532b43f26076b23b2d1e

88064803236433ff644725ebf6d740d7

9e10802468e485b61b6f80a6fbea2dd5

5550931e322c6165b22fe3085d8dc8ba

2cd6294d0b06e605033f089c1ca7f875

4ecbbbd4ab5ee837f97cd0ff76e1d89a

6c76973166555650cb631fdc2569ac70

8aa4a2d553c4dc323d349a46d7caad6d

457fbb3ff1a7fe0187988eea1a2e9fc9

d2c638b88c71b02dd596759e86cdc829

7b79cd9fe6e662a2021958d0db42522a

8c6b3c7c743d2cefe07b3bdb545338f6

168d2d263607abfc273171ab5af2cb62

44574424ad95a36e71f4a4e3f900c51c

127484f819d2ee4d3cd148b83bb9436b

768165bfc4c00012bfef3368a4985122

b44411afb06a6de63df6367382d120f5

f1d8bab2b9c827176f5ffb1c802d2826

0b67c02c51c1d50cf5e01803beed8060

ce1a59c3ea32749e0a2295cec8ffcbae

0707c7baa96ada6db316e83d3bc12888

3de3a6297e7057c7baf570390cb9d1fb

7fb7b8623e9a7419d2420e407096fd1a

77fea63af13b83e196c8332ca16fb77f

6266a4fefec6f8a96624f3643eab8903

1405113d7a4ee555af923ecc55f4ede3

93703df53e5ec8d038283441358b42d9

6a34741672895cac3d14e2f95a0152fc

331f415cd1c7986577912763c1940ed9

fb75fe28b9edc83d2b91b8436ff3cfc3

234beae64b562bb94338e209d8a96a78

809dbc9cd1493b3a6e222241477609e4

a6a68f4763eb9deefbf27b30a444de69

ff4a93d8a695f63b3626fbe0b8430156

2f6a00c04c6e09b8857cc99a7f94619e

6af6a355cc54d74d3edf22fe0ebc8102

7a3aa92d70349b73bdc98db72be20049

54152826cbc5f5bbfe6bb49963c0bdba

e47b3e89a7026f579377be7c6ea8d5fd

3484ffc5d34cb55a7c75e06b8a0869bc

bd26e92f91c1f7daeeeae06a36d8ed7b

d02d0fc3378734cd7208505e12704b6d

8623f472c59fe873c4f4eee019bb1be0

ef49340924f783c54b979b3abdd0bc33

613a57a0e10dcb6d2dd25a27901b8fe5

a55114019ec824b21f0474658c2ce9c7

18ba0bc8af26c5c47477700145dfcc63

f73015c873e19860afcdca5e129e2e5b

7fc7fe70813787aebbe1c1bcfd1b85c6

210441349458f57375a661d5e7fa71fe

b6827a772b09ad9f99ddef2aaeee129a

1333aba4d073ca570e228f553eeb11f2

87f6be16e59f37b27449121e53c017ca

52dab9d79be01bcf8f51281c4b469089

3e93a6b9bd12f520be389fd27cfd9390

8e1459288da4a48b2e39994fcdac206c

331262b151205851747464a5c0d75699

f5f8770dbcad6b1bbfd480b259e7db7e

7dbaaceb735bec4e8a54a6d1d2146396

ad4bfffff0ea91d2fde7099d2b104f11

c55aa8da3c68f9ad8b4198142db5d996

27df775d0c11538e4570ab0e61ccf315

3653f2c22d285d1cd36a5d7a4a35762e

20c927ae0d2cf48f88909e9d18324998

429c2c539e29b0a66f10c08998cefd39

e12f16891ab0c4d4203bca3377d4e3de

1a0a81cf0f9b719014768d36062c8414

de58e5b6571c78f4090b549d5131835f

13b28e771ad85f4b03667bb3d47f56a4

5507a8c0279b17a1793ae6fc5487b4c3

4b97f81aee5c2f592bbcec507f971dd3

244f485f9ad7d27a2976bc928bd76d51

44bf454eda2bdecf130d6b46a8ccb108

2446951faaab65095f137818a3bba4e8

a094da476fd8241de202d80df41b8103

2d77191715f8af8c496d8094aa20cb8f

70922fbea28d6d8ee1cacec63b0543d9

52b6fe417449548946da25922a84adf0

05f8ea8d95e689ef4c8fbb5a27c9dbb3

581f72429222243151dd9bad3c34ccaf

c539b37904e1c36d72fde533ff56cf67

4b1c110f622f5d16cf762d86aaf41ca7

8d051b4ee368cf632f6522e5d7b1a906

3458c29c51a0d0070af8d6bbd57bebe4

521221f4dadd6478560e03ef48d2543a

8c28cefb554887ec4e32332c3de6e8f6

929b7c3558c0d0d5b9856f7ded22a5a4

1940983b7ddecdc4c2ff3402f4e1abf4

a331b32161dd7dd4aba45fb2b7a037f9

Source: https://www.trellix.com/en-us/about/newsroom/stories/research/the-anatomy-of-html-attachment-phishing.html