Esc
Reflective Code Loading - T1620
(ATT&CK® Technique)
Definition
Adversaries may reflectively load code into a process in order to conceal the execution of malicious payloads. Reflective loading involves allocating then executing payloads directly within the memory of the process, vice creating a thread or process backed by a file path on disk (e.g., Shared Modules).
D3FEND Inferred Relationships
Browse the D3FEND knowledge graph by clicking on the nodes below.