MobileOrder

MobileOrder is a Trojan intended to compromise Android mobile devices. It has been used by Scarlet Mimic. [1]

ID: S0079
Aliases: MobileOrder
Type: MALWARE
Version: 1.0

Techniques Used

DomainIDNameUse
EnterpriseT1217Browser Bookmark DiscoveryMobileOrder has a command to upload to its C2 server victim browser bookmarks.[1]
EnterpriseT1005Data from Local SystemMobileOrder exfiltrates data collected from the victim mobile device.[1]
EnterpriseT1041Exfiltration Over Command and Control ChannelMobileOrder exfiltrates data to its C2 server over the same protocol as C2 communications.[1]
EnterpriseT1083File and Directory DiscoveryMobileOrder has a command to upload to its C2 server information about files on the victim mobile device, including SD card size, installed app list, SMS content, contacts, and calling history.[1]
EnterpriseT1057Process DiscoveryMobileOrder has a command to upload information about all running processes to its C2 server.[1]
EnterpriseT1105Remote File CopyMobileOrder has a command to download a file from the C2 server to the victim mobile device's SD card.[1]
EnterpriseT1032Standard Cryptographic ProtocolMobileOrder uses AES to encrypt C2 communications.[1]
EnterpriseT1082System Information DiscoveryMobileOrder has a command to upload to its C2 server victim mobile device information, including IMEI, IMSI, SIM card serial number, phone number, Android version, and other information.[1]
EnterpriseT1065Uncommonly Used PortMobileOrder communicates with its C2 server over TCP port 3728.[1]

Groups

Groups that use this software:

Scarlet Mimic

References