Register to stream ATT&CKcon 2.0 October 29-30

MobileOrder

MobileOrder is a Trojan intended to compromise Android mobile devices. It has been used by Scarlet Mimic. [1]

ID: S0079
Type: MALWARE
Version: 1.0

Techniques Used

Domain ID Name Use
Enterprise T1217 Browser Bookmark Discovery MobileOrder has a command to upload to its C2 server victim browser bookmarks. [1]
Enterprise T1005 Data from Local System MobileOrder exfiltrates data collected from the victim mobile device. [1]
Enterprise T1041 Exfiltration Over Command and Control Channel MobileOrder exfiltrates data to its C2 server over the same protocol as C2 communications. [1]
Enterprise T1083 File and Directory Discovery MobileOrder has a command to upload to its C2 server information about files on the victim mobile device, including SD card size, installed app list, SMS content, contacts, and calling history. [1]
Enterprise T1057 Process Discovery MobileOrder has a command to upload information about all running processes to its C2 server. [1]
Enterprise T1105 Remote File Copy MobileOrder has a command to download a file from the C2 server to the victim mobile device's SD card. [1]
Enterprise T1032 Standard Cryptographic Protocol MobileOrder uses AES to encrypt C2 communications. [1]
Enterprise T1082 System Information Discovery MobileOrder has a command to upload to its C2 server victim mobile device information, including IMEI, IMSI, SIM card serial number, phone number, Android version, and other information. [1]
Enterprise T1065 Uncommonly Used Port MobileOrder communicates with its C2 server over TCP port 3728. [1]

Groups That Use This Software

ID Name References
G0029 Scarlet Mimic [1]

References