← Back to Explore
T1588.001
Malware
Adversaries may buy, steal, or download malware that can be used during targeting. Malicious software can include payloads, droppers, post-compromise tools, backdoors, packers, and C2 protocols. Adversaries may acquire malware to support their operations, obtaining a means for maintaining control of remote machines, evading defenses, and executing post-compromise behaviors. In addition to downloading free malware from the internet, adversaries may purchase these capabilities from third-party en...
PRE
2
Detections
2
Sources
15
Threat Actors
BY SOURCE
1elastic1sigma
PROCEDURES (1)
General Monitoring2 detections
Auto-extracted: 2 detections for general monitoring