Advisory 2020-008: Copy-Paste Compromises – tactics ...

The ACSC identified the utilisation of timestomping in an attempt to prevent detection of malicious files dropped on systems. The most common identified use of time stomping was matching web shells timestamps to that of the parent folder, another file located in the same directory, or to match the previous modification time of a file. ................
................