T1560.001 - Archive via Utility
Sub-technique
Tactics:
Collection
Collection
Platforms:
Linux macOS Windows
Linux macOS Windows
Detection:
Not specified
Not specified
Description:
Adversaries may use utilities to compress and/or encrypt collected data prior to exfiltration. Many utilities include functionalities to compress, encrypt, or otherwise package data into a format that is easier/more secure to transport.
Adversaries may abuse various utilities to compress or encrypt data before exfiltration. Some third party utilities may be preinstalled, such as <code>tar</code> on Linux and macOS or <code>zip</code> on Windows systems.
On Windows, <code>diantz</code> or <code> makecab</code> may be used to package collected files into a cabinet (.cab) file. <code>diantz</code> may also be used to download and compress files from remote locations (i.e. [Remote Data Staging](https://attack.mitre.org/techniques/T1074/002)).(Citation: diantz.exe_lolbas) <code>xcopy</code> on Windows can copy files and directories with a variety of options. Additionally, adversaries may use [certutil](https://attack.mitre.org/software/S0160) to Base64 encode collected data before exfiltration.
Adversaries may use also third party utilities, such as 7-Zip, WinRAR, and WinZip, to perform similar activities.(Citation: 7zip Homepage)(Citation: WinRAR Homepage)(Citation: WinZip Homepage)
Adversaries may abuse various utilities to compress or encrypt data before exfiltration. Some third party utilities may be preinstalled, such as <code>tar</code> on Linux and macOS or <code>zip</code> on Windows systems.
On Windows, <code>diantz</code> or <code> makecab</code> may be used to package collected files into a cabinet (.cab) file. <code>diantz</code> may also be used to download and compress files from remote locations (i.e. [Remote Data Staging](https://attack.mitre.org/techniques/T1074/002)).(Citation: diantz.exe_lolbas) <code>xcopy</code> on Windows can copy files and directories with a variety of options. Additionally, adversaries may use [certutil](https://attack.mitre.org/software/S0160) to Base64 encode collected data before exfiltration.
Adversaries may use also third party utilities, such as 7-Zip, WinRAR, and WinZip, to perform similar activities.(Citation: 7zip Homepage)(Citation: WinRAR Homepage)(Citation: WinZip Homepage)
Used by Actors (20)
APT1
Nation-state
Nation-state
APT3
Nation-state
Nation-state
APT33
Nation-state
Nation-state
APT28
Nation-state
Nation-state
Turla
Nation-state
Nation-state
FIN8
Unknown
Unknown
APT5
Unknown
Unknown
CopyKittens
Nation-state
Nation-state
Kimsuky
Nation-state
Nation-state
Sowbug
Nation-state
Nation-state
MuddyWater
Nation-state
Nation-state
MUSTANG PANDA
Nation-state
Nation-state
WIZARD SPIDER
Nation-state
Nation-state
APT39
Unknown
Unknown
Gallmaker
Unknown
Unknown
Sea Turtle
Unknown
Unknown
APT41
Nation-state
Nation-state
GALLIUM
Unknown
Unknown
Fox Kitten
Unknown
Unknown
HAFNIUM
Unknown
Unknown
Malware (20)
WindTail other
InvisibleFerret other
TONESHELL other
AppleSeed other
iKitten other
Turian other
PUBLOAD other
InvisiMole other
Okrum other
PowerShower other
PUNCHBUGGY other
BeaverTail other
DustySky other
Sagerunex other
CORALDECK other
Micropsia other
OopsIE other
Crutch other
ccf32 other
SampleCheck5000 other
Metadata
| MITRE ID: | T1560.001 |
| STIX ID: | attack-pattern--00f90846-cbd1-... |
| Platforms: | Linux, macOS, Windows |
| Created: | 13/01/2026 17:48 |
| Updated: | 06/03/2026 16:00 |