Malware designed to install or run other types of malware embedded in a
payload on an infected host
Dropper
A piece of code that connects to the Internet to retrieve additional tools after
the initial infection by a dropper
Downloader
Any lightweight code designed to run an exploit on the target, which may include
any type of code format from scripting languages to binary code
Shell Code
Exploit technique that runs malicious code with the identification number of
a legitimate process
§ Masquerading
§ DLL injection
§ DLL sideloading
§ Process hollowing
Code Injection
Exploit techniques that use standard system tools and packages to perform
intrusions
Living off the land