# T1612 - Build Image on Host
## Description from ATT&CK
> Adversaries may build a container image directly on a host to bypass defenses that monitor for the retrieval of malicious images from a public registry. A remote build request may be sent to the Docker API that includes a Dockerfile that pulls a vanilla base image, such as alpine, from a public or local registry and then builds a custom image upon it.(Citation: Docker Build Image)
>
> An adversary may take advantage of that build API to build a custom image on the host that includes malware downloaded from their C2 server, and then they may utilize [Deploy Container](https://attack.mitre.org/techniques/T1610) using that custom image.(Citation: Aqua Build Images on Hosts)(Citation: Aqua Security Cloud Native Threat Report June 2021) If the base image is pulled from a public registry, defenses will likely not detect the image as malicious since it’s a vanilla image. If the base image already resides in a local registry, the pull may be considered even less suspicious since the image is already in the environment.
[Source](https://attack.mitre.org/techniques/T1612)
## Atomic Tests
- [Atomic Test #1: Build Image On Host](#atomic-test-1-build-image-on-host)
### Atomic Test #1: Build Image On Host
Adversaries may build a container image directly on a host to bypass defenses that monitor for the retrieval of malicious images from a public registry. An adversary may take advantage of that build API to build a custom image on the host that includes malware downloaded from their C2 server, and then they then may utilize Deploy Container using that custom image.
**Supported Platforms:** Containers
**auto_generated_guid:** `2db30061-589d-409b-b125-7b473944f9b3`
#### Attack Commands: Run with `sh`!
```sh
docker build -t t1612 $PathtoAtomicsFolder/T1612/src/
docker run --name t1612_container --rm -d -t t1612
docker exec t1612_container ./test.sh
```
#### Cleanup Commands
```sh
docker stop t1612_container
docker rmi -f t1612
```
#### Dependencies: Run with `sh`!
##### Description: Verify docker is installed.
###### Check Prereq Commands
```sh
which docker
```
###### Get Prereq Commands
```sh
if [ "" == "`which docker`" ]; then echo "Docker Not Found"; if [ -n "`which apt-get`" ]; then sudo apt-get -y install docker ; elif [ -n "`which yum`" ]; then sudo yum -y install docker ; fi ; else echo "Docker installed"; fi
```
##### Description: Verify docker service is running.
###### Check Prereq Commands
```sh
sudo systemctl status docker --no-pager
```
###### Get Prereq Commands
```sh
sudo systemctl start docker
```