Adversaries may establish persistence and elevate privileges by using an installer to trigger the execution of malicious content.
Sub-technique of
T1546
See: MITRE ATT&CK
Adversaries may establish persistence and elevate privileges by using an installer to trigger the execution of malicious content.
Sub-technique of
T1546
See: MITRE ATT&CK