Home > CAPEC List > CAPEC-572: Artificially Inflate File Sizes (Version 2.11)  

CAPEC-572: Artificially Inflate File Sizes

 
Artificially Inflate File Sizes
Definition in a New Window Definition in a New Window
Attack Pattern ID: 572
Abstraction: Detailed
Status: Draft
Completeness: Stub
Presentation Filter:
+ Summary

Security tools often inspect executables to determine if they are malicious. Adversaries may add data to executables to increase the executable size beyond what security tools are capable of handling. Adding data to an executable also changes the file's hash, frustrating security tools that look for known bad files by their hash.

+ References
[R.572.1] ATT&CK Project. "Binary padding (1009)". MITRE. <https://attack.mitre.org/wiki/Binary_padding>.
+ Content History
Submissions
SubmitterOrganizationDateSource
CAPEC Content TeamThe MITRE Corporation2015-11-09Internal_CAPEC_Team

More information is available — Please select a different filter.
Page Last Updated or Reviewed: July 31, 2017