MobileOrder

MobileOrder is a Trojan intended to compromise Android mobile devices. It has been used by Scarlet Mimic. [1]

ID: S0079
Type: MALWARE
Version: 1.0

Techniques Used

Domain ID Name Use
Enterprise T1217 Browser Bookmark Discovery MobileOrder has a command to upload to its C2 server victim browser bookmarks.[1]
Enterprise T1005 Data from Local System MobileOrder exfiltrates data collected from the victim mobile device.[1]
Enterprise T1041 Exfiltration Over Command and Control Channel MobileOrder exfiltrates data to its C2 server over the same protocol as C2 communications.[1]
Enterprise T1083 File and Directory Discovery MobileOrder has a command to upload to its C2 server information about files on the victim mobile device, including SD card size, installed app list, SMS content, contacts, and calling history.[1]
Enterprise T1057 Process Discovery MobileOrder has a command to upload information about all running processes to its C2 server.[1]
Enterprise T1105 Remote File Copy MobileOrder has a command to download a file from the C2 server to the victim mobile device's SD card.[1]
Enterprise T1032 Standard Cryptographic Protocol MobileOrder uses AES to encrypt C2 communications.[1]
Enterprise T1082 System Information Discovery MobileOrder has a command to upload to its C2 server victim mobile device information, including IMEI, IMSI, SIM card serial number, phone number, Android version, and other information.[1]
Enterprise T1065 Uncommonly Used Port MobileOrder communicates with its C2 server over TCP port 3728.[1]

Groups

Groups that use this software:

Scarlet Mimic

References