MITRE ATT&CK Technique
Defense Evasion T1027.014
Description

Adversaries may utilize polymorphic code (also known as metamorphic or mutating code) to evade detection. Polymorphic code is a type of software capable of changing its runtime footprint during code execution.(Citation: polymorphic-blackberry) With each execution of the software, the code is mutated into a different version of itself that achieves the same purpose or objective as the original. This functionality enables the malware to evade traditional signature-based defenses, such as antivirus and antimalware tools.(Citation: polymorphic-sentinelone) Other obfuscation techniques can be used in conjunction with polymorphic code to accomplish the intended effects, including using mutation engines to conduct actions such as [Software Packing](https://attack.mitre.org/techniques/T1027/002), [Command Obfuscation](https://attack.mitre.org/techniques/T1027/010), or [Encrypted/Encoded File](https://attack.mitre.org/techniques/T1027/013).(Citation: polymorphic-linkedin)(Citation: polymorphic-medium)

Supported Platforms
Windows macOS Linux
Created

April 29, 2026

Last Updated

April 29, 2026

STIX Data
{'created': '2024-09-27T12:28:03.938Z',
 'created_by_ref': 'identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5',
 'description': 'Adversaries may utilize polymorphic code (also known as '
                'metamorphic or mutating code) to evade detection. Polymorphic '
                'code is a type of software capable of changing its runtime '
                'footprint during code execution.(Citation: '
                'polymorphic-blackberry) With each execution of the software, '
                'the code is mutated into a different version of itself that '
                'achieves the same purpose or objective as the original. This '
                'functionality enables the malware to evade traditional '
                'signature-based defenses, such as antivirus and antimalware '
                'tools.(Citation: polymorphic-sentinelone) \n'
                'Other obfuscation techniques can be used in conjunction with '
                'polymorphic code to accomplish the intended effects, '
                'including using mutation engines to conduct actions such as '
                '[Software '
                'Packing](https://attack.mitre.org/techniques/T1027/002), '
                '[Command '
                'Obfuscation](https://attack.mitre.org/techniques/T1027/010), '
                'or [Encrypted/Encoded '
                'File](https://attack.mitre.org/techniques/T1027/013).(Citation: '
                'polymorphic-linkedin)(Citation: polymorphic-medium)\n',
 'external_references': [{'external_id': 'T1027.014',
                          'source_name': 'mitre-attack',
                          'url': 'https://attack.mitre.org/techniques/T1027/014'},
                         {'description': 'Blackberry. (n.d.). What is '
                                         'Polymorphic Malware?. Retrieved '
                                         'September 27, 2024.',
                          'source_name': 'polymorphic-blackberry',
                          'url': 'https://www.blackberry.com/us/en/solutions/endpoint-security/ransomware-protection/polymorphic-malware'},
                         {'description': 'SentinelOne. (2023, March 18). What '
                                         'is Polymorphic Malware? Examples and '
                                         'Challenges. Retrieved September 27, '
                                         '2024.',
                          'source_name': 'polymorphic-sentinelone',
                          'url': 'https://www.sentinelone.com/cybersecurity-101/threat-intelligence/what-is-polymorphic-malware'},
                         {'description': 'Shellseekercyber. (2024, January 7). '
                                         'Explainer: Packed Malware. Retrieved '
                                         'September 27, 2024.',
                          'source_name': 'polymorphic-medium',
                          'url': 'https://medium.com/@shellseekerscyber/explainer-packed-malware-16f09cc75035'},
                         {'description': 'Sherwin Akshay. (2024, May 28). '
                                         'Techniques for concealing malware '
                                         'and hindering analysis: Packing up '
                                         'and unpacking stuff. Retrieved '
                                         'September 27, 2024.',
                          'source_name': 'polymorphic-linkedin',
                          'url': 'https://www.linkedin.com/pulse/techniques-concealing-malware-hindering-analysis-packing-akshay-unijc'}],
 'id': 'attack-pattern--b577dfc1-0177-4522-8d5a-782127c8592b',
 'kill_chain_phases': [{'kill_chain_name': 'mitre-attack',
                        'phase_name': 'defense-evasion'}],
 'modified': '2025-04-15T19:59:00.006Z',
 'name': 'Polymorphic Code',
 'object_marking_refs': ['marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168'],
 'revoked': False,
 'spec_version': '2.1',
 'type': 'attack-pattern',
 'x_mitre_attack_spec_version': '3.2.0',
 'x_mitre_contributors': ['Ye Yint Min Thu Htut, Active Defense Team, DBS Bank',
                          'TruKno'],
 'x_mitre_deprecated': False,
 'x_mitre_detection': '',
 'x_mitre_domains': ['enterprise-attack'],
 'x_mitre_is_subtechnique': True,
 'x_mitre_modified_by_ref': 'identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5',
 'x_mitre_platforms': ['Windows', 'macOS', 'Linux'],
 'x_mitre_version': '1.1'}
Quick Actions