Skip to content

DET0845 Detection of Malware

Item Value
ID DET0845
Version 1.0
Created 21 October 2025
Last Modified 21 October 2025

Technique Detected: T1588.001 (Malware)

Analytics

PRE

AN1977

Monitor for contextual data about a malicious payload, such as compilation times, file hashes, as well as watermarks or other identifiable configuration information. Much of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on post-compromise phases of the adversary lifecycle. Consider analyzing malware for features that may be associated with malware providers, such as compiler used, debugging artifacts, code similarities, or even group identifiers associated with specific MaaS offerings. Malware repositories can also be used to identify additional samples associated with the developers and the adversary utilizing their services. Identifying overlaps in malware use by different adversaries may indicate malware was obtained by the adversary rather than developed by them. In some cases, identifying overlapping characteristics in malware used by different adversaries may point to a shared quartermaster.(Citation: FireEyeSupplyChain)

Log Sources
Data Component Name Channel
Malware Metadata (DC0003) Malware Repository None
Malware Content (DC0011) Malware Repository None
Mutable Elements
Field Description