Domain | ID | Name | Use | |
---|---|---|---|---|
Mobile | T1438 | Alternate Network Mediums | ||
Mobile | T1418 | Application Discovery | ||
Mobile | T1402 | Broadcast Receivers |
TrickMo registers for the |
|
Mobile | T1412 | Capture SMS Messages | ||
Mobile | T1533 | Data from Local System | ||
Mobile | T1446 | Device Lockout |
TrickMo can prevent the user from interacting with the UI by showing a WebView with a persistent cursor.[1] |
|
Mobile | T1523 | Evade Analysis Environment |
TrickMo can detect if it is running on a rooted device or an emulator.[1] |
|
Mobile | T1516 | Input Injection |
TrickMo can inject input to set itself as the default SMS handler, and to automatically click through pop-ups without giving the user any time to react.[1] |
|
Mobile | T1406 | Obfuscated Files or Information |
TrickMo contains obfuscated function, class, and variable names, and encrypts its shared preferences using Java’s |
|
Mobile | T1513 | Screen Capture |
TrickMo can use the |
|
Mobile | T1582 | SMS Control | ||
Mobile | T1437 | Standard Application Layer Protocol |
TrickMo communicates with the C2 by sending JSON objects over unencrypted HTTP requests.[1] |
|
Mobile | T1426 | System Information Discovery |
TrickMo can collect device information such as network operator, model, brand, and OS version.[1] |
|
Mobile | T1422 | System Network Configuration Discovery |
TrickMo can collect device network configuration information such as IMSI, IMEI, and Wi-Fi connection state.[1] |
|
Mobile | T1576 | Uninstall Malicious Application |
TrickMo can uninstall itself from a device on command by abusing the accessibility service.[1] |