Domain | ID | Name | Use | |
---|---|---|---|---|
Mobile | T1517 | Access Notifications | ||
Mobile | T1437 | .001 | Application Layer Protocol: Web Protocols |
FluBot can use HTTP POST requests on port 80 for communicating with its C2 server.[1] |
Mobile | T1637 | .001 | Dynamic Resolution: Domain Generation Algorithms |
FluBot can use Domain Generation Algorithms to connect to the C2 server.[1] |
Mobile | T1521 | .002 | Encrypted Channel: Asymmetric Cryptography |
FluBot has encrypted C2 message bodies with RSA and encoded them in base64.[1] |
Mobile | T1646 | Exfiltration Over C2 Channel | ||
Mobile | T1628 | .002 | Hide Artifacts: User Evasion |
FluBot can use |
Mobile | T1629 | .001 | Impair Defenses: Prevent Application Removal |
FluBot can use Accessibility Services to make removal of the malicious app difficult.[2] |
.003 | Impair Defenses: Disable or Modify Tools |
FluBot can disable Google Play Protect to prevent detection.[1] |
||
Mobile | T1417 | .002 | Input Capture: GUI Input Capture |
FluBot can add display overlays onto banking apps to capture credit card information.[1] |
Mobile | T1406 | Obfuscated Files or Information |
FluBot can obfuscated class, string, and method names in newer malware versions.[1] |
|
Mobile | T1636 | .003 | Protected User Data: Contact List |
FluBot can retrieve the contacts list from an infected device.[1] |
.004 | Protected User Data: SMS Messages |
FluBot can intercept SMS messages and USSD messages from Telcom operators.[1] |
||
Mobile | T1604 | Proxy Through Victim | ||
Mobile | T1582 | SMS Control |
FluBot can send SMS phishing messages to other contacts on an infected device.[1][2] |