An attacker uses deceptive methods to cause a user or an automated process to download and install dangerous code that originates from an attacker controlled source. There are several variations to this strategy of attack.
CAPEC 185 Malicious Software Download
Draft
Standard
Unknown Risk