Skip to content

S0507 eSurv

eSurv is mobile surveillanceware designed for the lawful intercept market that was developed over the course of many years.1

Item Value
ID S0507
Associated Names
Type MALWARE
Version 1.0
Created 14 September 2020
Last Modified 14 September 2020
Navigation Layer View In ATT&CK® Navigator

Techniques Used

Domain ID Name Use
mobile T1429 Audio Capture eSurv can record audio.1
mobile T1533 Data from Local System eSurv can exfiltrate device pictures.1
mobile T1407 Download New Code at Runtime eSurv’s Android version is distributed in three stages: the dropper, the second stage payload, and the third stage payload which is Exodus.1
mobile T1521 Encrypted Channel -
mobile T1521.002 Asymmetric Cryptography eSurv’s Android version has used public key encryption and certificate pinning for C2 communication.1
mobile T1627 Execution Guardrails -
mobile T1627.001 Geofencing eSurv imposes geo-restrictions when delivering the second stage.1
mobile T1646 Exfiltration Over C2 Channel eSurv has exfiltrated data using HTTP PUT requests.1
mobile T1430 Location Tracking eSurv can track the device’s location.1
mobile T1636 Protected User Data -
mobile T1636.003 Contact List eSurv can exfiltrate the device’s contact list.1
mobile T1426 System Information Discovery eSurv’s iOS version can collect device information.1

References