EXPLORE
← Back to Explore
T1608.001

Upload Malware

Adversaries may upload malware to third-party or adversary controlled infrastructure to make it accessible during targeting. Malicious software can include payloads, droppers, post-compromise tools, backdoors, and a variety of other malicious content. Adversaries may upload malware to support their operations, such as making a payload available to a victim network to enable [Ingress Tool Transfer](https://attack.mitre.org/techniques/T1105) by placing it on an Internet accessible web server. Mal...

PRE
2
Detections
1
Sources
25
Threat Actors

BY SOURCE

2elastic

PROCEDURES (1)

General Monitoring2 detections

Auto-extracted: 2 detections for general monitoring

DETECTIONS (2)