MITRE ATT&CK Technique
Defense Evasion T1027.005
Description

Adversaries may remove indicators from tools if they believe their malicious tool was detected, quarantined, or otherwise curtailed. They can modify the tool by removing the indicator and using the updated version that is no longer detected by the target's defensive systems or subsequent targets that may use similar systems. A good example of this is when malware is detected with a file signature and quarantined by anti-virus software. An adversary who can determine that the malware was quarantined because of its file signature may modify the file to explicitly avoid that signature, and then re-use the malware.

Supported Platforms
Linux macOS Windows
Created

April 29, 2026

Last Updated

April 29, 2026

STIX Data
{'created': '2020-03-19T21:27:32.820Z',
 'created_by_ref': 'identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5',
 'description': 'Adversaries may remove indicators from tools if they believe '
                'their malicious tool was detected, quarantined, or otherwise '
                'curtailed. They can modify the tool by removing the indicator '
                'and using the updated version that is no longer detected by '
                "the target's defensive systems or subsequent targets that may "
                'use similar systems.\n'
                '\n'
                'A good example of this is when malware is detected with a '
                'file signature and quarantined by anti-virus software. An '
                'adversary who can determine that the malware was quarantined '
                'because of its file signature may modify the file to '
                'explicitly avoid that signature, and then re-use the malware.',
 'external_references': [{'external_id': 'T1027.005',
                          'source_name': 'mitre-attack',
                          'url': 'https://attack.mitre.org/techniques/T1027/005'}],
 'id': 'attack-pattern--b0533c6e-8fea-4788-874f-b799cacc4b92',
 'kill_chain_phases': [{'kill_chain_name': 'mitre-attack',
                        'phase_name': 'defense-evasion'}],
 'modified': '2025-10-24T17:49:13.906Z',
 'name': 'Indicator Removal from Tools',
 'object_marking_refs': ['marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168'],
 'revoked': False,
 'spec_version': '2.1',
 'type': 'attack-pattern',
 'x_mitre_attack_spec_version': '3.2.0',
 'x_mitre_deprecated': False,
 'x_mitre_detection': '',
 'x_mitre_domains': ['enterprise-attack'],
 'x_mitre_is_subtechnique': True,
 'x_mitre_modified_by_ref': 'identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5',
 'x_mitre_platforms': ['Linux', 'macOS', 'Windows'],
 'x_mitre_version': '1.2'}
Quick Actions
Related Threat Actors (7)
donex
Low

OilRig
High

Turla
High

UNC3886
High

GALLIUM
High