T1140 - Deobfuscate/Decode Files or Information
Tactics:
Defense Evasion
Defense Evasion
Platforms:
ESXi Linux macOS Windows
ESXi Linux macOS Windows
Detection:
Not specified
Not specified
Description:
Adversaries may use [Obfuscated Files or Information](https://attack.mitre.org/techniques/T1027) to hide artifacts of an intrusion from analysis. They may require separate mechanisms to decode or deobfuscate that information depending on how they intend to use it. Methods for doing that include built-in functionality of malware or by using utilities present on the system.
One such example is the use of [certutil](https://attack.mitre.org/software/S0160) to decode a remote access tool portable executable file that has been hidden inside a certificate file.(Citation: Malwarebytes Targeted Attack against Saudi Arabia) Another example is using the Windows <code>copy /b</code> or <code>type</code> command to reassemble binary fragments into a malicious payload.(Citation: Carbon Black Obfuscation Sept 2016)(Citation: Sentinel One Tainted Love 2023)
Sometimes a user's action may be required to open it for deobfuscation or decryption as part of [User Execution](https://attack.mitre.org/techniques/T1204). The user may also be required to input a password to open a password protected compressed/encrypted file that was provided by the adversary.(Citation: Volexity PowerDuke November 2016)
One such example is the use of [certutil](https://attack.mitre.org/software/S0160) to decode a remote access tool portable executable file that has been hidden inside a certificate file.(Citation: Malwarebytes Targeted Attack against Saudi Arabia) Another example is using the Windows <code>copy /b</code> or <code>type</code> command to reassemble binary fragments into a malicious payload.(Citation: Carbon Black Obfuscation Sept 2016)(Citation: Sentinel One Tainted Love 2023)
Sometimes a user's action may be required to open it for deobfuscation or decryption as part of [User Execution](https://attack.mitre.org/techniques/T1204). The user may also be required to input a password to open a password protected compressed/encrypted file that was provided by the adversary.(Citation: Volexity PowerDuke November 2016)
Used by Actors (20)
DarkHotel
Nation-state
Nation-state
APT19
Nation-state
Nation-state
APT28
Nation-state
Nation-state
Turla
Nation-state
Nation-state
FIN7
Criminal
Criminal
Lazarus Group
Nation-state
Nation-state
OilRig
Nation-state
Nation-state
Molerats
Nation-state
Nation-state
Gamaredon Group
Unknown
Unknown
Kimsuky
Nation-state
Nation-state
MuddyWater
Nation-state
Nation-state
MUSTANG PANDA
Nation-state
Nation-state
TA505
Unknown
Unknown
APT39
Unknown
Unknown
Rocke
Unknown
Unknown
Higaisa
Nation-state
Nation-state
TeamTNT
Unknown
Unknown
FIN13
Unknown
Unknown
Earth Lusca
Unknown
Unknown
Malteiro
Unknown
Unknown
Malware (20)
TrickBot other
BLINDINGCAN other
Ninja other
Pikabot other
Spark other
Bumblebee other
Amadey other
Torisma other
NOKKI other
Stuxnet other
RotaJakiro other
AvosLocker other
Chinoxy other
SharpStage other
COATHANGER other
Sardonic other
Smoke Loader other
WindTail other
Exaramel for Linux other
PS1 other
Metadata
| MITRE ID: | T1140 |
| STIX ID: | attack-pattern--3ccef7ae-cb5e-... |
| Platforms: | ESXi, Linux, macOS, Windows |
| Created: | 13/01/2026 17:48 |
| Updated: | 06/03/2026 16:00 |