RatMilad is an Android remote access tool (RAT) with spyware functionality that has been used to target enterprise mobile devices in the Middle East since at least 2021. Variants of RatMilad have been disguised as VPN applications and a fake app named NumRent. Upon installation, RatMilad employs multiple Collection techniques to collect sensitive information before uploading the collected data to its command and control (C2) server. [1]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Mobile | T1437 | .001 | Application Layer Protocol: Web Protocols |
RatMilad has used HTTP POST requests for communicating with its C2 server.[1] |
| Mobile | T1429 | Audio Capture | ||
| Mobile | T1414 | Clipboard Data | ||
| Mobile | T1662 | Data Destruction | ||
| Mobile | T1533 | Data from Local System |
RatMilad has listed files and pictures on the device starting from |
|
| Mobile | T1407 | Download New Code at Runtime |
RatMilad has used a fake application to request permissions and to download itself.[1] |
|
| Mobile | T1646 | Exfiltration Over C2 Channel | ||
| Mobile | T1420 | File and Directory Discovery |
RatMilad has listed files and pictures on the device starting from |
|
| Mobile | T1430 | Location Tracking | ||
| Mobile | T1660 | Phishing |
RatMilad has concealed itself behind variants of a phone number spoofing application, which was distributed through links on social media and communication platforms.[1] |
|
| Mobile | T1636 | .002 | Protected User Data: Call Log | |
| .003 | Protected User Data: Contact List | |||
| .004 | Protected User Data: SMS Messages |
RatMilad has accessed the device’s SMS messages, including messages that were in the inbox, sent, draft, outbox, failed, and queued.[1] |
||
| .005 | Protected User Data: Accounts |
RatMilad has collected account names and their types from the compromised device.[1] |
||
| Mobile | T1418 | Software Discovery | ||
| Mobile | T1426 | System Information Discovery |
RatMilad has collected device information such as model, brand, buildId, Android version and manufacturer.[1] |
|
| Mobile | T1422 | System Network Configuration Discovery |
RatMilad has collected device information such as MAC address, IMEI and phone number.[1] |
|
| Mobile | T1512 | Video Capture |
RatMilad has taken photos and videos using the device’s camera.[1] |
|