MobileOrder

MobileOrder is a Trojan intended to compromise Android mobile devices. It has been used by Scarlet Mimic. [1]

ID: S0079
Type: MALWARE
Version: 1.0

Techniques Used

Domain ID Name Use
Enterprise T1217 Browser Bookmark Discovery

MobileOrder has a command to upload to its C2 server victim browser bookmarks.[1]

Enterprise T1005 Data from Local System

MobileOrder exfiltrates data collected from the victim mobile device.[1]

Enterprise T1041 Exfiltration Over Command and Control Channel

MobileOrder exfiltrates data to its C2 server over the same protocol as C2 communications.[1]

Enterprise T1083 File and Directory Discovery

MobileOrder has a command to upload to its C2 server information about files on the victim mobile device, including SD card size, installed app list, SMS content, contacts, and calling history.[1]

Enterprise T1057 Process Discovery

MobileOrder has a command to upload information about all running processes to its C2 server.[1]

Enterprise T1105 Remote File Copy

MobileOrder has a command to download a file from the C2 server to the victim mobile device's SD card.[1]

Enterprise T1032 Standard Cryptographic Protocol

MobileOrder uses AES to encrypt C2 communications.[1]

Enterprise T1082 System Information Discovery

MobileOrder has a command to upload to its C2 server victim mobile device information, including IMEI, IMSI, SIM card serial number, phone number, Android version, and other information.[1]

Enterprise T1065 Uncommonly Used Port

MobileOrder communicates with its C2 server over TCP port 3728.[1]

Groups That Use This Software

ID Name References
G0029 Scarlet Mimic [1]

References