Name | Description |
---|---|
Trojan-SMS.AndroidOS.Smaps |
Domain | ID | Name | Use | |
---|---|---|---|---|
Mobile | T1626 | .001 | Abuse Elevation Control Mechanism: Device Administrator Permissions | |
Mobile | T1437 | .001 | Application Layer Protocol: Web Protocols |
Asacub has communicated with the C2 using HTTP POST requests.[1] |
Mobile | T1532 | Archive Collected Data |
Asacub has encrypted C2 communications using Base64-encoded RC4.[1] |
|
Mobile | T1655 | .001 | Masquerading: Match Legitimate Name or Location |
Asacub has masqueraded as a client of popular free ads services.[1] |
Mobile | T1575 | Native API | ||
Mobile | T1406 | Obfuscated Files or Information | ||
Mobile | T1636 | .003 | Protected User Data: Contact List | |
.004 | Protected User Data: SMS Messages | |||
Mobile | T1582 | SMS Control | ||
Mobile | T1426 | System Information Discovery |
Asacub can collect various pieces of device information, including device model and OS version.[1] |
|
Mobile | T1422 | System Network Configuration Discovery |
Asacub can collect various pieces of device network configuration information, such as mobile network operator.[1] |
|
.001 | Internet Connection Discovery |
Asacub can collect various pieces of device network configuration information, such as mobile network operator.[1] |