Threat Intelligence

The Spreadsheet That Arrived Twice: CR/LF Filename Obfuscation and a Base64 Shadow Payload

Written by Audian Paxson | May 18, 2026 11:00:00 AM
TL;DR A phishing email claiming to deliver an organization-wide clinical data report contained an .xlsx attachment with embedded CR/LF control characters in its filename. Automated scanning detected a zero-byte file with an incorrect hash, while a companion .b64 base64-encoded file containing the actual payload sat alongside it in the analysis environment. Authentication passed at the first relay hop (SPF, DKIM, DMARC via SocketLabs) but failed at every subsequent hop after the message was rewritten through a Cisco IronPort gateway, causing ARC chain failure. The sender address could not be verified in public directories. Themis flagged the message on behavioral and structural signals. The mailbox was quarantined automatically.
Severity: High Malware Delivery Social Engineering MITRE: {'id': 'T1566.001', 'name': 'Phishing: Spearphishing Attachment'} MITRE: {'id': 'T1027', 'name': 'Obfuscated Files or Information'} MITRE: {'id': 'T1036', 'name': 'Masquerading'}

The email said: "Please find the attached Organization-Wide User History Report." The body was professional. The tone was neutral. There was no urgency, no credential request, no link to click. Just an attachment to open.

The attachment was the weapon. And most scanners never saw it.

The File That Wasn't There

The attached spreadsheet arrived with a filename that contained embedded CR/LF control characters: GS-US-695-6509\r\n Organization-Wide User History Report_2026-04-27-16-00-44.xlsx. Those invisible characters, a carriage return and line feed injected into the filename string, caused the file extraction pipeline to produce a zero-byte artifact. The automated scanner examined that empty file, computed its hash (d41d8cd98f00b204e9800998ecf8427e, the MD5 of nothing), and returned a verdict of "clean."

The actual payload was 557,952 bytes. It existed as a companion .b64 file in the same analysis directory, base64-encoded and waiting for a decoding step that the standard scanning pipeline never performed. The reported hash from the original incident metadata (8bd593c18c151bc6abcfddbdd6aef249) did not match the zero-byte artifact the scanner inspected. Two different files, two different hashes, one verdict that applied to the wrong one.

Authentication That Dissolved in Transit

The message originated from bo4@mdsol[.]com via SocketLabs (s1-ba68.socketlabs.email-od[.]com). At that first hop, SPF passed, DKIM passed, and DMARC passed for mdsol[.]com. The ARC seal at i=1 recorded all three as valid.

Then the message hit a Cisco IronPort gateway (esa1.hc3244-53.iphmx[.]com). The gateway rewrote the envelope, and the Return-Path shifted to a bounce address at gileadconnect.onmicrosoft[.]com. By the time the message reached the recipient's tenant, SPF failed, DKIM failed, DMARC failed, and ARC validation at i=2 recorded the breakdown. Every authentication signal that passed at the origin was gone by delivery.

The Sender Nobody Could Verify

The sender address bo4@mdsol[.]com returned no results in public directories. The clinical data management context in the body suggested a pharmaceutical or research organization, but the combination of an unverifiable sender, an envelope rewritten through a third-party gateway, and a broken authentication chain left no trustworthy identity signal for the recipient's mail system to evaluate.

Themis, the IRONSCALES Adaptive AI engine, flagged the message on structural anomalies: the authentication chain failure across relay hops, the unverifiable sender identity, and the attachment metadata inconsistencies. The mailbox was quarantined before the attachment was opened.

See Your Risk: Calculate how many threats your SEG is missing

Indicators of Compromise

TypeIndicatorContext
Sender Addressbo4@mdsol[.]comUnverifiable in public directories
Return-Path (rewritten)bounces+SRS=...@gileadconnect.onmicrosoft[.]comEnvelope rewritten by forwarding gateway
Sending Relays1-ba68.socketlabs.email-od[.]comSocketLabs ESP, initial auth passed
Gatewayesa1.hc3244-53.iphmx[.]comCisco IronPort, caused SPF/DKIM/DMARC failure
Attachment.xlsx with CR/LF in filename557,952 bytes (reported), zero bytes (scanned)
Companion File.b64 base64-encoded payloadReal workbook content, not inspected by pipeline
Hash (reported)8bd593c18c151bc6abcfddbdd6aef249Did not match the artifact the scanner examined

MITRE ATT&CK Mapping

TechniqueIDRelevance
Phishing: Spearphishing AttachmentT1566.001Malicious spreadsheet as primary delivery vector
Obfuscated Files or InformationT1027CR/LF filename obfuscation and base64 encoding
MasqueradingT1036Clinical data report pretext from unverifiable sender
Email Attack of the Day is a daily series from IRONSCALES spotlighting real phishing attacks caught by Adaptive AI and our community of 30,000+ security professionals. Each post breaks down one attack — what it looked like, why it worked, and what you can do about it.