Name | Description |
---|---|
Marcher |
Domain | ID | Name | Use | |
---|---|---|---|---|
Mobile | T1432 | Access Contact List | ||
Mobile | T1418 | Application Discovery |
Exobot can obtain a list of installed applications and can detect if an antivirus application is running, and close it if it is.[1] |
|
Mobile | T1402 | Broadcast Receivers |
Exobot has registered to receive the |
|
Mobile | T1412 | Capture SMS Messages | ||
Mobile | T1476 | Deliver Malicious App via Other Means | ||
Mobile | T1401 | Device Administrator Permissions | ||
Mobile | T1446 | Device Lockout |
Exobot can lock the device with a password and permanently disable the screen.[1] |
|
Mobile | T1417 | Input Capture |
Exobot has used web injects to capture users’ credentials.[1] |
|
Mobile | T1411 | Input Prompt |
Exobot can show phishing popups when a targeted application is running.[1] |
|
Mobile | T1444 | Masquerade as Legitimate Application | ||
Mobile | T1604 | Proxy Through Victim |
Exobot can open a SOCKS proxy connection through the compromised device.[1] |
|
Mobile | T1582 | SMS Control | ||
Mobile | T1437 | Standard Application Layer Protocol | ||
Mobile | T1426 | System Information Discovery | ||
Mobile | T1422 | System Network Configuration Discovery |
Exobot can obtain the device’s IMEI, phone number, and IP address.[1] |