Information obtained (via shared or submitted samples) regarding malicious software (droppers, backdoors, etc.) used by adversaries