Common Information
Type Value
Value
Malware - T1588.001
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may buy, steal, or download malware that can be used during targeting. Malicious software can include payloads, droppers, post-compromise tools, backdoors, packers, and C2 protocols. Adversaries may acquire malware to support their operations, obtaining a means for maintaining control of remote machines, evading defenses, and executing post-compromise behaviors. In addition to downloading free malware from the internet, adversaries may purchase these capabilities from third-party entities. Third-party entities can include technology companies that specialize in malware development, criminal marketplaces (including Malware-as-a-Service, or MaaS), or from individuals. In addition to purchasing malware, adversaries may steal and repurpose malware from third-party entities (including other adversaries).
Details Published Attributes CTI Title
Details Website 2754-08-03 37 Virus Bulletin :: VB2018 paper: Unpacking the packed unpacker: reversing an Android anti-analysis native library
Details Website 2574-01-02 0 Editors Picks, Apps We Recommend | TechSpot
Details Website 2061-05-15 4 Flash Notice: Critical Linux Kernel Vulnerability Can Lead to Remote Code Execution
Details Website 2050-08-03 29 Kiddoware Kids Place Parental Control Android App 3.8.49 XSS / CSRF / File Upload - CXSecurity.com
Details Website 2044-04-01 13 Attackers Repurposing existing Python-based Malware for Distribution on NPM
Details Website 2035-08-05 23 Inside Jahoo (Otlard.A ?) - A spam Botnet
Details Website 2035-01-01 216 UNKNOWN
Details Website 2030-03-02 20 APT QUARTERLY HIGHLIGHTS - Q3 : 2023 - CYFIRMA
Details Website 2028-10-24 0 MIT Technology Review Insights Survey on Zero Trust in Cybersecurity
Details Website 2028-02-03 0 Zemana Anti Malware: Best Premium & Free Malware Removal Software
Details Website 2025-11-07 1 Vault7 - Home
Details Website 2025-09-05 0 New LevelBlue Threat Trends Report gives critical insights…
Details Website 2025-09-01 0 How ThreatConnect and Polarity Empower Teams to Combat Phishing Threats | ThreatConnect
Details Website 2025-07-02 13 Inside a Malware Campaign: A Nigerian Hacker’s Perspective – CyberArmor
Details Website 2025-04-05 15 Shellcode Encoded in UUIDs - SANS Internet Storm Center
Details Website 2025-04-05 22 Python Bot Delivered Through DLL Side-Loading - SANS Internet Storm Center
Details Website 2025-03-24 5 FBI warnings are true—fake file converters do push malware - PRSOL:CC
Details Website 2025-03-24 1 Oracle Sale Claims Found on Hacker Forums, Crypto Wallet Service, and Empik Data Leak - SOCRadar® Cyber Intelligence Inc.
Details Website 2025-03-24 3 Oracle Sale Claims Found on Hacker Forums, Crypto Wallet Service, and Empik Data Leak
Details Website 2025-03-24 2 SvcStealer Malware Strikes, Harvesting Sensitive Data from Browsers and Applications
Details Website 2025-03-24 0 A week in security (March 17 – March 23)
Details Website 2025-03-24 4 HackTool:Win64/GameHack!rfn – Easy Malware Removal Guide
Details Website 2025-03-24 0 Weaver Ant, the Web Shell Whisperer: Tracking a Live China-nexus Operation
Details Website 2025-03-24 0 Sygnia Discovers New Active China-Nexus Threat Actor Weaver Ant
Details Website 2025-03-24 0 A week in security (March 17 - March 23)