EXPLORE
← Back to Explore
T1036.008

Masquerade File Type

Adversaries may masquerade malicious payloads as legitimate files through changes to the payload's formatting, including the file’s signature, extension, icon, and contents. Various file types have a typical standard format, including how they are encoded and organized. For example, a file’s signature (also known as header or magic bytes) is the beginning bytes of a file and is often used to identify the file’s type. For example, the header of a JPEG file, is <code> 0xFF 0xD8</code> and the fil...

LinuxmacOSWindows
4
Detections
2
Sources
3
Threat Actors

BY SOURCE

3splunk_escu1elastic

PROCEDURES (3)

General Monitoring2 detections

Auto-extracted: 2 detections for general monitoring

Email Security1 detections

Auto-extracted: 1 detections for email security

Script Execution Monitoring1 detections

Auto-extracted: 1 detections for script execution monitoring

DETECTIONS (4)