| mobile |
T1437 |
Application Layer Protocol |
- |
| mobile |
T1437.001 |
Web Protocols |
BOULDSPY uses unencrypted HTTP traffic between the victim and C2 infrastructure. |
| mobile |
T1532 |
Archive Collected Data |
BOULDSPY can encrypt its data before exfiltration. |
| mobile |
T1429 |
Audio Capture |
BOULDSPY can access a device’s microphone to record audio, as well as cell and VoIP application calls. |
| mobile |
T1398 |
Boot or Logon Initialization Scripts |
BOULDSPY can exfiltrate data when the user boots the app, or on device boot. |
| mobile |
T1414 |
Clipboard Data |
BOULDSPY can collect clipboard data. |
| mobile |
T1577 |
Compromise Application Executable |
BOULDSPY can inject malicious packages into applications already existing on an infected device. |
| mobile |
T1533 |
Data from Local System |
BOULDSPY can access browser history and bookmarks, and can list all files and folders on the device. |
| mobile |
T1407 |
Download New Code at Runtime |
BOULDSPY can download and run code obtained from the C2. |
| mobile |
T1624 |
Event Triggered Execution |
BOULDSPY uses a background service that can restart itself when the parent activity is stopped. |
| mobile |
T1646 |
Exfiltration Over C2 Channel |
BOULDSPY has exfiltrated cached data from infected devices. |
| mobile |
T1417 |
Input Capture |
- |
| mobile |
T1417.001 |
Keylogging |
BOULDSPY can capture keystrokes. |
| mobile |
T1430 |
Location Tracking |
BOULDSPY can get a device’s location using GPS or network. |
| mobile |
T1655 |
Masquerading |
- |
| mobile |
T1655.001 |
Match Legitimate Name or Location |
BOULDSPY has been installed using the package name com.android.callservice, pretending to be an Android system service. |
| mobile |
T1644 |
Out of Band Data |
BOULDSPY can use SMS to send C2 commands. |
| mobile |
T1636 |
Protected User Data |
- |
| mobile |
T1636.002 |
Call Log |
BOULDSPY can access device call logs. |
| mobile |
T1636.003 |
Contact List |
BOULDSPY can exfiltrate a device’s contacts. |
| mobile |
T1636.004 |
SMS Messages |
BOULDSPY can exfiltrate SMS logs. |
| mobile |
T1513 |
Screen Capture |
BOULDSPY can take and exfiltrate screenshots. |
| mobile |
T1418 |
Software Discovery |
BOULDSPY can retrieve the list of installed applications. |
| mobile |
T1409 |
Stored Application Data |
BOULDSPY can retrieve account information for third party services, such as Google, Telegram, WeChat, or WhatsApp. |
| mobile |
T1426 |
System Information Discovery |
BOULDSPY can collect system information, such as Android version and device identifiers. |
| mobile |
T1422 |
System Network Configuration Discovery |
BOULDSPY can collect network information, such as IP address, SIM card information, and Wi-Fi information. |
| mobile |
T1422.001 |
Internet Connection Discovery |
BOULDSPY can collect network information, such as IP address, SIM card information, and Wi-Fi information. |
| mobile |
T1422.002 |
Wi-Fi Discovery |
BOULDSPY can collect network information, such as IP address, SIM card information, and Wi-Fi information. |
| mobile |
T1512 |
Video Capture |
BOULDSPY can take photos using the device cameras. |