Domain | ID | Name | Use | |
---|---|---|---|---|
Mobile | T1432 | Access Contact List | ||
Mobile | T1413 | Access Sensitive Data in Device Logs | ||
Mobile | T1418 | Application Discovery | ||
Mobile | T1412 | Capture SMS Messages | ||
Mobile | T1533 | Data from Local System | ||
Mobile | T1523 | Evade Analysis Environment | ||
Mobile | T1516 | Input Injection |
Ginp can inject input to make itself the default SMS handler.[1] |
|
Mobile | T1411 | Input Prompt |
Ginp can use a multi-step phishing overlay to capture banking credentials and then credit card numbers after login.[1] |
|
Mobile | T1444 | Masquerade as Legitimate Application |
Ginp has masqueraded as "Adobe Flash Player" and "Google Play Verificator".[1] |
|
Mobile | T1406 | Obfuscated Files or Information | ||
Mobile | T1513 | Screen Capture |
Ginp can capture device screenshots and stream them back to the C2.[1] |
|
Mobile | T1582 | SMS Control | ||
Mobile | T1508 | Suppress Application Icon |