Domain | ID | Name | Use | |
---|---|---|---|---|
Mobile | T1429 | Audio Capture |
FlexiSpy can record both incoming and outgoing phone calls, as well as microphone audio.[2] |
|
Mobile | T1533 | Data from Local System |
FlexiSpy can monitor device photos and can also access browser history and bookmarks.[4] |
|
Mobile | T1624 | .001 | Event Triggered Execution: Broadcast Receivers |
FlexiSpy uses root access to establish reboot hooks to re-install the application from |
Mobile | T1628 | .001 | Hide Artifacts: Suppress Application Icon |
FlexiSpy is capable of hiding SuperSU's icon if it is installed and visible.[1] FlexiSpy can also hide its own icon to make detection and the uninstallation process more difficult.[4] |
Mobile | T1625 | .001 | Hijack Execution Flow: System Runtime API Hijacking | |
Mobile | T1630 | .002 | Indicator Removal on Host: File Deletion | |
Mobile | T1417 | .001 | Input Capture: Keylogging |
FlexiSpy can record keystrokes and analyze them for keywords.[4] |
Mobile | T1430 | Location Tracking | ||
Mobile | T1509 | Non-Standard Port |
FlexiSpy can communicate with the command and control server over ports 12512 and 12514.[1] |
|
Mobile | T1406 | Obfuscated Files or Information | ||
Mobile | T1636 | .001 | Protected User Data: Calendar Entries | |
.003 | Protected User Data: Contact List | |||
.004 | Protected User Data: SMS Messages |
FlexiSpy can intercept SMS and MMS messages as well as monitor messages for keywords.[2][4] |
||
Mobile | T1513 | Screen Capture | ||
Mobile | T1418 | Software Discovery | ||
Mobile | T1409 | Stored Application Data |
FlexiSpy uses a |
|
Mobile | T1421 | System Network Connections Discovery |
FlexiSpy can collect a list of known Wi-Fi access points.[4] |
|
Mobile | T1512 | Video Capture |