| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Mobile | T1407 | Download New Code at Runtime | Dvmap can download code and binaries from the C2 server to execute on the device as root.[1] | |
| Mobile | T1404 | Exploitation for Privilege Escalation | Dvmap attempts to gain root access by using local exploits.[1] | |
| Mobile | T1625 | .001 | Hijack Execution Flow:System Runtime API Hijacking | Dvmap replaces |
| Mobile | T1629 | .003 | Impair Defenses:Disable or Modify Tools | Dvmap can turn off |
| Mobile | T1406 | Obfuscated Files or Information | Dvmap decrypts executables from archive files stored in the | |
| Mobile | T1632 | .001 | Subvert Trust Controls:Code Signing Policy Modification | Dvmap can enable installation of apps from unknown sources.[1] |
| Mobile | T1426 | System Information Discovery | Dvmap checks the Android version to determine which system library to patch.[1] | |