Domain | ID | Name | Use | |
---|---|---|---|---|
Mobile | T1437 | .001 | Application Layer Protocol: Web Protocols |
BOULDSPY uses unencrypted HTTP traffic between the victim and C2 infrastructure.[1] |
Mobile | T1532 | Archive Collected Data | ||
Mobile | T1429 | Audio Capture |
BOULDSPY can access a device’s microphone to record audio, as well as cell and VoIP application calls.[1] |
|
Mobile | T1398 | Boot or Logon Initialization Scripts |
BOULDSPY can exfiltrate data when the user boots the app, or on device boot.[1] |
|
Mobile | T1414 | Clipboard Data | ||
Mobile | T1577 | Compromise Application Executable |
BOULDSPY can inject malicious packages into applications already existing on an infected device.[1] |
|
Mobile | T1533 | Data from Local System |
BOULDSPY can access browser history and bookmarks, and can list all files and folders on the device.[1] |
|
Mobile | T1407 | Download New Code at Runtime | ||
Mobile | T1624 | Event Triggered Execution |
BOULDSPY uses a background service that can restart itself when the parent activity is stopped.[1] |
|
Mobile | T1646 | Exfiltration Over C2 Channel |
BOULDSPY has exfiltrated cached data from infected devices.[1] |
|
Mobile | T1417 | .001 | Input Capture: Keylogging | |
Mobile | T1430 | Location Tracking |
BOULDSPY can get a device’s location using GPS or network.[1] |
|
Mobile | T1655 | .001 | Masquerading: Match Legitimate Name or Location |
BOULDSPY has been installed using the package name |
Mobile | T1644 | Out of Band Data | ||
Mobile | T1636 | .002 | Protected User Data: Call Log | |
.003 | Protected User Data: Contact List | |||
.004 | Protected User Data: SMS Messages | |||
Mobile | T1513 | Screen Capture | ||
Mobile | T1418 | Software Discovery |
BOULDSPY can retrieve the list of installed applications.[1] |
|
Mobile | T1409 | Stored Application Data |
BOULDSPY can retrieve account information for third party services, such as Google, Telegram, WeChat, or WhatsApp.[1] |
|
Mobile | T1426 | System Information Discovery |
BOULDSPY can collect system information, such as Android version and device identifiers.[1] |
|
Mobile | T1422 | System Network Configuration Discovery |
BOULDSPY can collect network information, such as IP address, SIM card info, and Wi-Fi info.[1] |
|
.001 | Internet Connection Discovery |
BOULDSPY can collect network information, such as IP address, SIM card info, and Wi-Fi info.[1] |
||
.002 | Wi-Fi Discovery |
BOULDSPY can collect network information, such as IP address, SIM card info, and Wi-Fi info.[1] |
||
Mobile | T1512 | Video Capture |