mobile |
T1626 |
Abuse Elevation Control Mechanism |
- |
mobile |
T1626.001 |
Device Administrator Permissions |
AbstractEmu can modify system settings to give itself device administrator privileges. |
mobile |
T1517 |
Access Notifications |
AbstractEmu can monitor notifications. |
mobile |
T1437 |
Application Layer Protocol |
- |
mobile |
T1437.001 |
Web Protocols |
AbstractEmu can use HTTP to communicate with the C2 server. |
mobile |
T1429 |
Audio Capture |
AbstractEmu can grant itself microphone permissions. |
mobile |
T1623 |
Command and Scripting Interpreter |
- |
mobile |
T1623.001 |
Unix Shell |
AbstractEmu has included encoded shell scripts to potentially aid in the rooting process. |
mobile |
T1533 |
Data from Local System |
AbstractEmu can collect files from or inspect the device’s filesystem. |
mobile |
T1407 |
Download New Code at Runtime |
AbstractEmu can download and install additional malware after initial infection. |
mobile |
T1646 |
Exfiltration Over C2 Channel |
AbstractEmu can send large amounts of device data over its C2 channel, including the device’s manufacturer, model, version and serial number, telephone number, and IP address. |
mobile |
T1404 |
Exploitation for Privilege Escalation |
AbstractEmu can use rooting exploits to silently give itself permissions or install additional malware. |
mobile |
T1629 |
Impair Defenses |
- |
mobile |
T1629.003 |
Disable or Modify Tools |
AbstractEmu can disable Play Protect. |
mobile |
T1544 |
Ingress Tool Transfer |
AbstractEmu can receive files from the C2 at runtime. |
mobile |
T1430 |
Location Tracking |
AbstractEmu can access a device’s location. |
mobile |
T1406 |
Obfuscated Files or Information |
AbstractEmu has encoded files, such as exploit binaries, to potentially use during and after the rooting process. |
mobile |
T1636 |
Protected User Data |
- |
mobile |
T1636.002 |
Call Log |
AbstractEmu can access device call logs. |
mobile |
T1636.003 |
Contact List |
AbstractEmu can grant itself contact list access. |
mobile |
T1636.004 |
SMS Messages |
AbstractEmu can intercept SMS messages containing two factor authentication codes. |
mobile |
T1418 |
Software Discovery |
AbstractEmu can obtain a list of installed applications. |
mobile |
T1426 |
System Information Discovery |
AbstractEmu can collect device information such as manufacturer, model, version, serial number, and telephone number. |
mobile |
T1422 |
System Network Configuration Discovery |
AbstractEmu can collect device IP address and SIM information. |
mobile |
T1512 |
Video Capture |
AbstractEmu can grant itself camera permissions. |
mobile |
T1633 |
Virtualization/Sandbox Evasion |
AbstractEmu has used code abstraction and anti-emulation checks to potentially avoid running while under analysis. |
mobile |
T1633.001 |
System Checks |
AbstractEmu can check device system properties to potentially avoid running while under analysis. |