Common Information
Type | Value |
---|---|
Value |
Malware - T1587.001 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may develop malware and malware components that can be used during targeting. Building malicious software can include the development of payloads, droppers, post-compromise tools, backdoors (including backdoored images), packers, C2 protocols, and the creation of infected removable media. Adversaries may develop malware to support their operations, creating a means for maintaining control of remote machines, evading defenses, and executing post-compromise behaviors.(Citation: Mandiant APT1)(Citation: Kaspersky Sofacy)(Citation: ActiveMalwareEnergy)(Citation: FBI Flash FIN7 USB) As with legitimate development efforts, different skill sets may be required for developing malware. The skills needed may be located in-house, or may need to be contracted out. Use of a contractor may be considered an extension of that adversary's malware development capabilities, provided the adversary plays a role in shaping requirements and maintains a degree of exclusivity to the malware. Some aspects of malware development, such as C2 protocol development, may require adversaries to obtain additional infrastructure. For example, malware developed that will communicate with Twitter for C2, may require use of [Web Services](https://attack.mitre.org/techniques/T1583/006).(Citation: FireEye APT29) |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2005-02-01 | 1 | New Trojan for Symbian-based mobile phones | ||
Details | Website | 2005-01-25 | 5 | Trojaned build of DC++ found in the wild | ||
Details | Website | 2005-01-20 | 1 | Trojans masquerade as Microsoft AntiSpyware | ||
Details | Website | 2005-01-05 | 11 | Windows Rootkit Detection | ||
Details | Website | 2004-11-05 | 2 | More on malware classification | ||
Details | Website | 2004-09-15 | 1 | General Chat Forum | ||
Details | Website | 2004-09-10 | 19 | How Malware hides and is installed as a Service | ||
Details | Website | 2003-01-01 | 0 | Group-IB report: "RedCurl. The pentest you didn’t know about" | ||
Details | Website | 2002-01-01 | 0 | Protection from targeted attacks (anti-apt) | ||
Details | Website | 2002-01-01 | 0 | Penetration Testing | ||
Details | Website | 2000-01-01 | 21 | Automated Malware Analysis Report for m8XMnec4Vb.elf - Generated by Joe Sandbox | ||
Details | Website | 1970-01-01 | 0 | — | ||
Details | Website | — | 1 | New Malware Set Identified Used by the SolarWinds Attackers - IBM X-Force Collection | ||
Details | Website | — | 0 | z0Miner Exploiting ElasticSearch and Jenkins Vulnerabilities - IBM X-Force Collection | ||
Details | Website | — | 0 | Bazar Anchor and Cobalt Strike - IBM X-Force Collection | ||
Details | Website | — | 0 | A New Sophisticated ZLoader Invoice Scam Arises - IBM X-Force Collection | ||
Details | Website | — | 0 | Clast82 Dropper - IBM X-Force Collection | ||
Details | Website | — | 0 | Renewed SideWinder Activity in South Asia - IBM X-Force Collection | ||
Details | Website | — | 0 | Intezer Discovers New Linux Backdoor Named RedXOR - IBM X-Force Collection | ||
Details | Website | — | 0 | FBI FLASH Alert CP-000142-MW and PYSA Ransomware - IBM X-Force Collection | ||
Details | Website | — | 0 | NimzaLoader Malware - IBM X-Force Collection | ||
Details | Website | — | 0 | Metamorfo/Mekotio Banking Trojan Uses AutoHotKey Scripting - IBM X-Force Collection | ||
Details | Website | — | 0 | macOS Adware in Rust - IBM X-Force Collection | ||
Details | Website | — | 2 | ITG14 Shift To Ransomware With New TTPs - IBM X-Force Collection | ||
Details | Website | — | 0 | Windows Safe Mode Unsafe From REvil - IBM X-Force Collection |