GoldenEagle is a piece of Android malware that has been used in targeting of Uyghurs, Muslims, Tibetans, individuals in Turkey, and individuals in China. Samples have been found as early as 2012.[1]
Domain | ID | Name | Use | |
---|---|---|---|---|
Mobile | T1437 | .001 | Application Layer Protocol: Web Protocols |
GoldenEagle has used HTTP POST requests for C2.[1] |
Mobile | T1429 | Audio Capture |
GoldenEagle has recorded calls and environment audio in .amr format.[1] |
|
Mobile | T1533 | Data from Local System |
GoldenEagle has retrieved .doc, .txt, .gif, .apk, .jpg, .png, .mp3, and .db files from external storage.[1] |
|
Mobile | T1407 | Download New Code at Runtime |
GoldenEagle can download new code to update itself.[1] |
|
Mobile | T1646 | Exfiltration Over C2 Channel |
GoldenEagle has exfiltrated data via both SMTP and HTTP.[1] |
|
Mobile | T1420 | File and Directory Discovery |
GoldenEagle has looked for .doc, .txt, .gif, .apk, .jpg, .png, .mp3, and .db files on external storage.[1] |
|
Mobile | T1430 | Location Tracking |
GoldenEagle has tracked location.[1] |
|
Mobile | T1655 | .001 | Masquerading: Match Legitimate Name or Location |
GoldenEagle has inserted trojan functionality into legitimate apps, including popular apps within the Uyghur community, VPNs, instant messaging apps, social networking, games, adult media, and Google searching.[1] |
Mobile | T1636 | .002 | Protected User Data: Call Log |
GoldenEagle has collected call logs.[1] |
.003 | Protected User Data: Contact List |
GoldenEagle has collected a list of contacts.[1] |
||
.004 | Protected User Data: SMS Messages |
GoldenEagle has collected SMS messages.[1] |
||
Mobile | T1513 | Screen Capture |
GoldenEagle has taken screenshots.[1] |
|
Mobile | T1582 | SMS Control |
GoldenEagle has sent messages to an attacker-controlled number.[1] |
|
Mobile | T1418 | Software Discovery |
GoldenEagle has collected a list of installed application names.[1] |
|
Mobile | T1409 | Stored Application Data |
GoldenEagle has extracted messages from chat programs, such as WeChat.[1] |
|
Mobile | T1632 | .001 | Subvert Trust Controls: Code Signing Policy Modification |
GoldenEagle has modified or configured proxy information.[1] |
Mobile | T1426 | System Information Discovery |
GoldenEagle has checked for system root.[1] |
|
Mobile | T1512 | Video Capture |
GoldenEagle has taken photos with the device camera.[1] |