Domain | ID | Name | Use | |
---|---|---|---|---|
Mobile | T1533 | Data from Local System | ||
Mobile | T1628 | .001 | Hide Artifacts: Suppress Application Icon | |
Mobile | T1417 | .002 | Input Capture: GUI Input Capture |
Ginp can use a multi-step phishing overlay to capture banking credentials and then credit card numbers after login.[1] |
Mobile | T1516 | Input Injection |
Ginp can inject input to make itself the default SMS handler.[1] |
|
Mobile | T1655 | .001 | Masquerading: Match Legitimate Name or Location |
Ginp has masqueraded as "Adobe Flash Player" and "Google Play Verificator".[1] |
Mobile | T1406 | Obfuscated Files or Information | ||
Mobile | T1636 | .003 | Protected User Data: Contact List | |
.004 | Protected User Data: SMS Messages | |||
Mobile | T1513 | Screen Capture |
Ginp can capture device screenshots and stream them back to the C2.[1] |
|
Mobile | T1582 | SMS Control | ||
Mobile | T1418 | Software Discovery | ||
Mobile | T1633 | .001 | Virtualization/Sandbox Evasion: System Checks |