Domain | ID | Name | Use | |
---|---|---|---|---|
Mobile | T1407 | Download New Code at Runtime |
Zen can dynamically load executable code from remote sources.[1] |
|
Mobile | T1404 | Exploitation for Privilege Escalation |
Zen can obtain root access via a rooting trojan in its infection chain.[1] |
|
Mobile | T1643 | Generate Traffic from Victim | ||
Mobile | T1625 | .001 | Hijack Execution Flow: System Runtime API Hijacking |
Zen can install itself on the system partition to achieve persistence. Zen can also replace |
Mobile | T1629 | .003 | Impair Defenses: Disable or Modify Tools | |
Mobile | T1516 | Input Injection |
Zen can simulate user clicks on ads and system prompts to create new Google accounts.[1] |
|
Mobile | T1406 | Obfuscated Files or Information | ||
Mobile | T1631 | .001 | Process Injection: Ptrace System Calls |
Zen can inject code into the Setup Wizard at runtime to extract CAPTCHA images. Zen can inject code into the |