Detection of Malware

Technique Detected:  Malware | T1587.001

ID: DET0872
Domains: Enterprise
Analytics: AN2004
Version: 1.0
Created: 21 October 2025
Last Modified: 21 October 2025

Analytics

AN2004

Consider analyzing malware for features that may be associated with the adversary and/or their developers, such as compiler used, debugging artifacts, or code similarities. Malware repositories can also be used to identify additional samples associated with the adversary and identify development patterns over time.
Monitor for contextual data about a malicious payload, such as compilation times, file hashes, as well as watermarks or other identifiable configuration information. Much of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on post-compromise phases of the adversary lifecycle.

Log Sources
Data Component Name Channel
Malware Content (DC0011) Malware Repository None
Malware Metadata (DC0003) Malware Repository None