Upload Malware - T1608.001 (3ee16395-03f0-4690-a32e-69ce9ada0f9e)
Adversaries may upload malware to third-party or adversary controlled infrastructure to make it accessible during targeting. Malicious software can include payloads, droppers, post-compromise tools, backdoors, and a variety of other malicious content. Adversaries may upload malware to support their operations, such as making a payload available to a victim network to enable Ingress Tool Transfer by placing it on an Internet accessible web server.
Malware may be placed on infrastructure that was previously purchased/rented by the adversary (Acquire Infrastructure) or was otherwise compromised by them (Compromise Infrastructure). Malware can also be staged on web services, such as GitHub or Pastebin, or hosted on the InterPlanetary File System (IPFS), where decentralized content storage makes the removal of malicious files difficult.(Citation: Volexity Ocean Lotus November 2020)(Citation: Talos IPFS 2022)
Adversaries may upload backdoored files, such as application binaries, virtual machine images, or container images, to third-party software stores or repositories (ex: GitHub, CNET, AWS Community AMIs, Docker Hub). By chance encounter, victims may directly download/install these backdoored files via User Execution. Masquerading may increase the chance of users mistakenly executing these files.
Cluster A | Galaxy A | Cluster B | Galaxy B | Level |
---|---|---|---|---|
Upload Malware - T1608.001 (3ee16395-03f0-4690-a32e-69ce9ada0f9e) | Attack Pattern | Stage Capabilities - T1608 (84771bc3-f6a0-403e-b144-01af70e5fda0) | Attack Pattern | 1 |