Name | Description |
---|---|
Trojan-SMS.AndroidOS.Smaps |
Domain | ID | Name | Use | |
---|---|---|---|---|
Mobile | T1432 | Access Contact List | ||
Mobile | T1412 | Capture SMS Messages | ||
Mobile | T1532 | Data Encrypted |
Asacub has encrypted C2 communications using Base64-encoded RC4.[1] |
|
Mobile | T1476 | Deliver Malicious App via Other Means |
Asacub has been spread via phishing SMS messages that contain a link to a website that hosts the malicious APK file.[1] |
|
Mobile | T1401 | Device Administrator Permissions | ||
Mobile | T1444 | Masquerade as Legitimate Application |
Asacub has masqueraded as a client of popular free ads services.[1] |
|
Mobile | T1575 | Native Code | ||
Mobile | T1406 | Obfuscated Files or Information | ||
Mobile | T1582 | SMS Control | ||
Mobile | T1437 | Standard Application Layer Protocol |
Asacub has communicated with the C2 using HTTP POST requests.[1] |
|
Mobile | T1426 | System Information Discovery |
Asacub can collect various pieces of device information, including device model and OS version.[1] |
|
Mobile | T1422 | System Network Configuration Discovery |
Asacub can collect various pieces of device network configuration information, such as mobile network operator.[1] |