Domain | ID | Name | Use | |
---|---|---|---|---|
Mobile | T1437 | .001 | Application Layer Protocol: Web Protocols | |
Mobile | T1429 | Audio Capture |
RedDrop captures live recordings of the device's surroundings.[1] |
|
Mobile | T1646 | Exfiltration Over C2 Channel | ||
Mobile | T1643 | Generate Traffic from Victim |
RedDrop tricks the user into sending SMS messages to premium services and then deletes those messages.[1] |
|
Mobile | T1544 | Ingress Tool Transfer |
RedDrop uses ads or other links within websites to encourage users to download the malicious apps using a complex content distribution network (CDN) and series of network redirects. RedDrop also downloads additional components (APKs, JAR files) from different C2 servers.[1] |
|
Mobile | T1426 | System Information Discovery |
RedDrop exfiltrates details of the victim device operating system and manufacturer.[1] |
|
Mobile | T1422 | System Network Configuration Discovery |
RedDrop collects and exfiltrates information including IMEI, IMSI, MNC, MCC, nearby Wi-Fi networks, and other device and SIM-related info.[1] |
|
.001 | Internet Connection Discovery |
RedDrop collects and exfiltrates information including IMEI, IMSI, MNC, MCC, nearby Wi-Fi networks, and other device and SIM-related info.[1] |
||
.002 | Wi-Fi Discovery |
RedDrop collects and exfiltrates information including IMEI, IMSI, MNC, MCC, nearby Wi-Fi networks, and other device and SIM-related info.[1] |