Domain | ID | Name | Use | |
---|---|---|---|---|
Mobile | T1429 | Audio Capture | ||
Mobile | T1533 | Data from Local System | ||
Mobile | T1407 | Download New Code at Runtime |
eSurv’s Android version is distributed in three stages: the dropper, the second stage payload, and the third stage payload which is Exodus.[1] |
|
Mobile | T1521 | .002 | Encrypted Channel: Asymmetric Cryptography |
eSurv’s Android version has used public key encryption for C2 communication.[1] |
.003 | Encrypted Channel: SSL Pinning |
eSurv’s Android version has used certificate pinning for C2 communication.[1] |
||
Mobile | T1627 | .001 | Execution Guardrails: Geofencing |
eSurv imposes geo-restrictions when delivering the second stage.[1] |
Mobile | T1646 | Exfiltration Over C2 Channel | ||
Mobile | T1430 | Location Tracking | ||
Mobile | T1636 | .003 | Protected User Data: Contact List | |
Mobile | T1426 | System Information Discovery |