← Back to Explore
T1608.001
Upload Malware
Adversaries may upload malware to third-party or adversary controlled infrastructure to make it accessible during targeting. Malicious software can include payloads, droppers, post-compromise tools, backdoors, and a variety of other malicious content. Adversaries may upload malware to support their operations, such as making a payload available to a victim network to enable [Ingress Tool Transfer](https://attack.mitre.org/techniques/T1105) by placing it on an Internet accessible web server. Mal...
PRE
2
Detections
1
Sources
25
Threat Actors
BY SOURCE
2elastic
PROCEDURES (1)
General Monitoring2 detections
Auto-extracted: 2 detections for general monitoring