Common Information
Type Value
Value
Malware - T1587.001
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may develop malware and malware components that can be used during targeting. Building malicious software can include the development of payloads, droppers, post-compromise tools, backdoors (including backdoored images), packers, C2 protocols, and the creation of infected removable media. Adversaries may develop malware to support their operations, creating a means for maintaining control of remote machines, evading defenses, and executing post-compromise behaviors.(Citation: Mandiant APT1)(Citation: Kaspersky Sofacy)(Citation: ActiveMalwareEnergy)(Citation: FBI Flash FIN7 USB) As with legitimate development efforts, different skill sets may be required for developing malware. The skills needed may be located in-house, or may need to be contracted out. Use of a contractor may be considered an extension of that adversary's malware development capabilities, provided the adversary plays a role in shaping requirements and maintains a degree of exclusivity to the malware. Some aspects of malware development, such as C2 protocol development, may require adversaries to obtain additional infrastructure. For example, malware developed that will communicate with Twitter for C2, may require use of [Web Services](https://attack.mitre.org/techniques/T1583/006).(Citation: FireEye APT29)
Details Published Attributes CTI Title
Details Website 2024-11-17 0 Cybersecurity Myths Busted: What You Need to Know to Stay Safe
Details Website 2024-11-17 0 AI’s Game-Changing Impact on Mobile Security
Details Website 2024-11-17 2 Malware Analysis - Writing x64dbg unpacking scripts
Details Website 2024-11-17 0 SQL Injection vs. Cross-Site Scripting (XSS): Know the Difference!
Details Website 2024-11-17 0 Which Foreign Country is Cheapest to Travel? Top Budget Destinations!
Details Website 2024-11-17 0 Do Flight Prices Ever Go Down Day Of? Uncover Secrets!
Details Website 2024-11-17 0 How Far in Advance Should I Book a Flight to Europe?: Smart Timing Tips
Details Website 2024-11-17 0 What is the Cheapest Day to Book International Flights?: Insider Tips!
Details Website 2024-11-17 0 What Country Has the Lowest Prices? Uncover Global Bargains!
Details Website 2024-11-17 0 Which Country is Best for VPN? Top Picks Unveiled!
Details Website 2024-11-17 0 Where is the Cheapest International Place to Fly To?: Uncover Savings!
Details Website 2024-11-17 0 Which Country VPN is Cheapest for Flights? Uncover Savings!
Details Website 2024-11-17 0 Is Surfshark Legal to Use? Unveil the Truth Today!
Details Website 2024-11-17 0 Does Surfshark Track You? Unveiling the Truth!
Details Website 2024-11-17 0 Black Friday and Cyber Monday: A Hotspot for Cyber Crime | #cybercrime | #infosec | National Cyber Security Consulting
Details Website 2024-11-17 2 2024 Cloud Security Report -Checkpoint - Cybersecurity Insiders
Details Website 2024-11-17 0 🚨 Vietnamese Hackers Unleash PXA Stealer: Targeting Sensitive Data Across Europe and Asia 🌍🔓
Details Website 2024-11-17 1 🚨 DEEPDATA Malware Exploits Fortinet Flaw to Steal VPN Credentials 🔒
Details Website 2024-11-17 3 🚨 Botnet Exploits GeoVision Zero-Day to Install Mirai Malware 🚨
Details Website 2024-11-17 3 Top 10 Daily Cybercrime Brief by FCRF [17.11.2024]: Click here to Know More | #cybercrime | #infosec | National Cyber Security Consulting
Details Website 2024-11-17 1 NordVPN’s Black Friday deal review
Details Website 2024-11-17 1 Best Price On Top-rated VPN
Details Website 2024-11-17 1 Online Sale For Business VPN
Details Website 2024-11-17 0 ChatGPT Security Risks for Business: The Essential Checklist for Protection
Details Website 2024-11-17 3 LetsDefend SOC Walkthrough | SOC145 — Ransomware Detected