Adversaries may transfer tools or other files from an external system into a compromised environment. Tools or files may be copied from an external adversary-controlled system to the victim network through the command and control channel or through alternate protocols such as ftp. Once present, adversaries may also transfer/spread tools between victim devices within a compromised environment (i.e. Lateral Tool Transfer).
On Windows, adversaries may use various utilities to download tools, such as copy
, finger
, certutil, and PowerShell commands such as <code>IEX(New-Object Net.WebClient).downloadString()</code> and <code>Invoke-WebRequest</code>. On Linux and macOS systems, a variety of utilities also exist, such as curl
, scp
, sftp
, tftp
, rsync
, finger
, and wget
.(Citation: t1105_lolbas)
Adversaries may also abuse installers and package managers, such as yum
or winget
, to download tools to victim hosts.
Files can also be transferred using various Web Services as well as native or otherwise present tools on the victim system.(Citation: PTSecurity Cobalt Dec 2016) In some cases, adversaries may be able to leverage services that sync between a web-based and an on-premises client, such as Dropbox or OneDrive, to transfer files onto victim systems. For example, by compromising a cloud account and logging into the service's web portal, an adversary may be able to trigger an automatic syncing process that transfers the file onto the victim's machine.(Citation: Dropbox Malware Sync)
View in MITRE ATT&CK®Capability ID | Capability Description | Mapping Type | ATT&CK ID | ATT&CK Name |
---|---|---|---|---|
AC-04 | Information Flow Enforcement | Protects | T1105 | Ingress Tool Transfer |
CA-07 | Continuous Monitoring | Protects | T1105 | Ingress Tool Transfer |
CM-02 | Baseline Configuration | Protects | T1105 | Ingress Tool Transfer |
CM-06 | Configuration Settings | Protects | T1105 | Ingress Tool Transfer |
CM-07 | Least Functionality | Protects | T1105 | Ingress Tool Transfer |
SC-07 | Boundary Protection | Protects | T1105 | Ingress Tool Transfer |
SI-03 | Malicious Code Protection | Protects | T1105 | Ingress Tool Transfer |
SI-04 | System Monitoring | Protects | T1105 | Ingress Tool Transfer |