Domain | ID | Name | Use | |
---|---|---|---|---|
Mobile | T1432 | Access Contact List | ||
Mobile | T1429 | Capture Audio | ||
Mobile | T1533 | Data from Local System | ||
Mobile | T1475 | Deliver Malicious App via Authorized App Store |
eSurv’s Android version was available in the Google Play Store.[1] |
|
Mobile | T1476 | Deliver Malicious App via Other Means |
eSurv has been distributed via phishing websites with geo-restrictions that allow access to only Italian and Turkmenistani mobile carriers. eSurv can install applications via malicious iOS provisioning profiles containing the developer’s certificate.[1] |
|
Mobile | T1407 | Download New Code at Runtime |
eSurv’s Android version is distributed in three stages: the dropper, the second stage payload, and the third stage payload which is Exodus.[1] |
|
Mobile | T1581 | Geofencing |
eSurv imposes geo-restrictions when delivering the second stage.[1] |
|
Mobile | T1430 | Location Tracking | ||
Mobile | T1437 | Standard Application Layer Protocol | ||
Mobile | T1521 | Standard Cryptographic Protocol |
eSurv’s Android version has used public key encryption and certificate pinning for C2 communication.[1] |
|
Mobile | T1426 | System Information Discovery |