Common Information
Type | Value |
---|---|
Value |
Malware - T1587.001 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may develop malware and malware components that can be used during targeting. Building malicious software can include the development of payloads, droppers, post-compromise tools, backdoors (including backdoored images), packers, C2 protocols, and the creation of infected removable media. Adversaries may develop malware to support their operations, creating a means for maintaining control of remote machines, evading defenses, and executing post-compromise behaviors.(Citation: Mandiant APT1)(Citation: Kaspersky Sofacy)(Citation: ActiveMalwareEnergy)(Citation: FBI Flash FIN7 USB) As with legitimate development efforts, different skill sets may be required for developing malware. The skills needed may be located in-house, or may need to be contracted out. Use of a contractor may be considered an extension of that adversary's malware development capabilities, provided the adversary plays a role in shaping requirements and maintains a degree of exclusivity to the malware. Some aspects of malware development, such as C2 protocol development, may require adversaries to obtain additional infrastructure. For example, malware developed that will communicate with Twitter for C2, may require use of [Web Services](https://attack.mitre.org/techniques/T1583/006).(Citation: FireEye APT29) |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2008-11-19 | 0 | Under Worm Assault, Military Bans Disks, USB Drives | ||
Details | Website | 2008-11-17 | 0 | McColo - Who Was Behind It? | ||
Details | Website | 2008-11-11 | 7 | Microsoft Reveals Malware and Spam Trends | ||
Details | Website | 2008-11-06 | 26 | Yesterday's Obama Spammer Now Imitates Colonial Bank | ||
Details | Website | 2008-10-30 | 3 | White Paper on the MS08-067 vulnerability and the associated malware | ||
Details | Website | 2008-10-28 | 26 | Update on Snort and ClamAV for ms08-067 | ||
Details | Website | 2008-10-26 | 42 | Phishing Clue Needed in Ecuador | ||
Details | Website | 2008-10-16 | 0 | Virus Bulletin :: Researchers urge anti-phishing companies to share data | ||
Details | Website | 2008-10-04 | 0 | IDA Pro Enhances Hostile Code Analysis Support | ||
Details | Website | 2008-09-29 | 8 | Improving Binary Comparison (and it's implication for malware classification) | ||
Details | Website | 2008-09-23 | 32 | Digital Certificate Spammer Goes for Google Adwords | ||
Details | Website | 2008-09-13 | 7 | Internet Landfills: Praise for Brian Krebs | ||
Details | Website | 2008-09-11 | 15 | Runtime Packers - hold the cheese :: malicious.link — welcome | ||
Details | Website | 2008-09-09 | 2 | Logical signatures in ClamAV 0.94 | ||
Details | Website | 2008-08-24 | 2 | The Demented Musings of an Incident Responder | ||
Details | Website | 2008-08-22 | 12 | Shadow Botnet case may yield spammer Leni Neto | ||
Details | Website | 2008-08-19 | 38 | Evidence that Georgia DDOS attacks are "populist" in nature | ||
Details | Website | 2008-08-16 | 0 | Volatility 1.3 is out! | ||
Details | Website | 2008-08-14 | 145 | Can You Pick the Real MSNBC.Com Breaking News? | ||
Details | Website | 2008-08-08 | 0 | TJX Update: The Boston Indictments | ||
Details | Website | 2008-07-17 | 4 | Russian Cybercrooks, CoreFlood, and the Amazing Joe Stewart | ||
Details | Website | 2008-07-11 | 32 | Verisign, McAfee and Symantec sites can be used for phishing due to XSS | ||
Details | Website | 2008-06-30 | 0 | Virus Bulletin :: Macs under attack from trojan double whammy | ||
Details | Website | 2008-06-20 | 9 | CartellaUnicaTasse Trojan | ||
Details | Website | 2008-06-13 | 0 | Scripting bugs blight security giants' websites |