Threat Intelligence

The Warranty Form With a Windows Executable Hidden Inside a GIF

Written by Audian Paxson | May 21, 2026 11:00:00 AM
TL;DR A food quality company sent a warranty renewal email from sleafordqf[.]com with full SPF, DKIM, and DMARC pass (p=reject policy). The message included a clean PDF, a clean DOCX form template, and several branding images. Static scanners cleared every attachment. However, binary analysis of image189059.gif (141,951 bytes) revealed a Windows PE header sequence (MZ) embedded at byte offset 80761, meaning a portable executable was hidden inside the GIF container using steganographic techniques. No macros, no malicious links. The GIF was the sole attack vector. Themis flagged the first-time external sender and quarantined the message across multiple mailboxes.
Severity: High Malware Delivery Steganography Supply Chain MITRE: {'id': 'T1027.003', 'name': 'Obfuscated Files or Information: Steganography'} MITRE: {'id': 'T1566.001', 'name': 'Phishing: Spearphishing Attachment'} MITRE: {'id': 'T1204.002', 'name': 'User Execution: Malicious File'}

The email looked like a routine supplier request. A UK-based food quality company asked the recipient to complete a "Free From Warranty renewal" form. The PDF was clean. The DOCX was clean. The branding images looked normal. SPF, DKIM, and DMARC all passed under a p=reject policy. Every automated check said this was a legitimate business communication.

Buried 80,761 bytes into one of those branding images was a Windows executable.

A Legitimate Supplier, a Legitimate Request, a Hidden Payload

The sender domain sleafordqf[.]com is a long-established UK corporate domain belonging to a food quality company. The email was routed through Exclaimer (a signature management proxy) and Microsoft Office 365 protection relays. Authentication was flawless. The message carried a PDF supplier form, a DOCX template for the warranty renewal, and several image files used for corporate branding.

Static attachment scanners evaluated each file independently. The PDF contained no embedded JavaScript or launch actions. The DOCX had no macros. The images rendered as expected. Every file passed.

But image189059.gif, a 141,951-byte GIF file, contained something that format-specific scanning never reached. Binary analysis revealed an MZ header sequence, the magic bytes that identify a Windows Portable Executable, at byte offset ~80761. An executable payload was embedded inside the image container using steganographic techniques. The GIF rendered normally as a branding image. The PE sat silently past the boundary where image parsers stop reading.

Why Static Scanners Missed It

This is MITRE ATT&CK T1027.003 (Steganography) in practice. File-type scanners classify an attachment by its header bytes or extension, then apply format-specific rules. A GIF file gets GIF inspection. If the outer container is a valid image, the scan returns clean. The executable payload hidden deeper in the binary stream falls outside the inspection window.

The attack required no macros, no exploit code in the document, and no malicious URLs. The DOCX and PDF served as legitimate cover, lowering the aggregate risk score for the entire message. The real weapon was the one file that looked like a logo.

This is also what makes supply chain delivery effective. The sender was a first-time external contact, but the domain had years of registration history and a strict DMARC policy. Reputation-based systems had no signal to act on.

See Your Risk: Calculate how many threats your SEG is missing

Behavioral Detection Where Binary Inspection Failed

Themis, the IRONSCALES Adaptive AI engine, flagged the message through behavioral signals that authentication and static scanning could not evaluate. The sender had never communicated with the recipient organization before. A first-time external sender delivering multiple attachments, including images with anomalous binary characteristics, triggered quarantine across multiple mailboxes.

The detection gap here is structural. Organizations relying on gateway-level attachment scanning that stops at file-type boundaries will miss payloads embedded deeper in the binary stream. The GIF was valid. The executable inside it was invisible to any scanner that trusted the container format.

Indicators of Compromise

TypeIndicatorContext
Sender Domainsleafordqf[.]comLegitimate UK food quality domain (DMARC p=reject)
Malicious Fileimage189059.gif141,951 bytes, valid GIF with embedded PE payload
PE OffsetByte ~80761MZ header sequence indicating Windows executable
AttachmentsPDF + DOCX (clean)Legitimate supplier forms serving as cover
Sender TypeFirst-time externalNo prior communication with recipient org

MITRE ATT&CK Mapping

TechniqueIDRelevance
Obfuscated Files: SteganographyT1027.003PE executable hidden inside GIF image container
Phishing: Spearphishing AttachmentT1566.001Email delivery with malicious image attachment
User Execution: Malicious FileT1204.002Payload requires extraction and execution from GIF
Email Attack of the Day is a daily series from IRONSCALES spotlighting real phishing attacks caught by Adaptive AI and our community of 30,000+ security professionals. Each post breaks down one attack — what it looked like, why it worked, and what you can do about it.