Domain | ID | Name | Use | |
---|---|---|---|---|
Mobile | T1626 | .001 | Abuse Elevation Control Mechanism: Device Administrator Permissions | |
Mobile | T1532 | Archive Collected Data | ||
Mobile | T1429 | Audio Capture | ||
Mobile | T1623 | .001 | Command and Scripting Interpreter: Unix Shell | |
Mobile | T1533 | Data from Local System | ||
Mobile | T1646 | Exfiltration Over C2 Channel |
Sunbird can exfiltrate compressed ZIP files containing gathered info to C2 infrastructure.[1] |
|
Mobile | T1544 | Ingress Tool Transfer |
Sunbird can download adversary specified content from FTP shares.[1] |
|
Mobile | T1430 | Location Tracking | ||
Mobile | T1636 | .001 | Protected User Data: Calendar Entries | |
.002 | Protected User Data: Call Log | |||
.003 | Protected User Data: Contact List | |||
Mobile | T1513 | Screen Capture |
Sunbird can take screenshots and abuse accessibility services to scrape BlackBerry Messenger and WhatsApp messages, contacts, and notifications[1] |
|
Mobile | T1418 | Software Discovery | ||
Mobile | T1409 | Stored Application Data |
Sunbird can exfiltrate browser history, BlackBerry Messenger files, IMO instant messaging content, and WhatsApp voice notes.[1] |
|
Mobile | T1426 | System Information Discovery |
Sunbird can exfiltrate the victim device ID, model, manufacturer, and Android version.[1] |
|
Mobile | T1422 | System Network Configuration Discovery | ||
Mobile | T1512 | Video Capture |