EXPLORE
← Back to Explore
T1588.001

Malware

Adversaries may buy, steal, or download malware that can be used during targeting. Malicious software can include payloads, droppers, post-compromise tools, backdoors, packers, and C2 protocols. Adversaries may acquire malware to support their operations, obtaining a means for maintaining control of remote machines, evading defenses, and executing post-compromise behaviors. In addition to downloading free malware from the internet, adversaries may purchase these capabilities from third-party en...

PRE
2
Detections
2
Sources
15
Threat Actors

BY SOURCE

1elastic1sigma

PROCEDURES (1)

General Monitoring2 detections

Auto-extracted: 2 detections for general monitoring

DETECTIONS (2)