T1588.001 - Malware
Sub-technique
Tactics:
Resource Development
Resource Development
Platforms:
PRE
PRE
Detection:
Not specified
Not specified
Description:
Adversaries may buy, steal, or download malware that can be used during targeting. Malicious software can include payloads, droppers, post-compromise tools, backdoors, packers, and C2 protocols. Adversaries may acquire malware to support their operations, obtaining a means for maintaining control of remote machines, evading defenses, and executing post-compromise behaviors.
In addition to downloading free malware from the internet, adversaries may purchase these capabilities from third-party entities. Third-party entities can include technology companies that specialize in malware development, criminal marketplaces (including Malware-as-a-Service, or MaaS), or from individuals. In addition to purchasing malware, adversaries may steal and repurpose malware from third-party entities (including other adversaries).
In addition to downloading free malware from the internet, adversaries may purchase these capabilities from third-party entities. Third-party entities can include technology companies that specialize in malware development, criminal marketplaces (including Malware-as-a-Service, or MaaS), or from individuals. In addition to purchasing malware, adversaries may steal and repurpose malware from third-party entities (including other adversaries).
Used by Actors (15)
Metadata
| MITRE ID: | T1588.001 |
| STIX ID: | attack-pattern--7807d3a4-a885-... |
| Platforms: | PRE |
| Created: | 13/01/2026 17:48 |
| Updated: | 06/03/2026 16:00 |