| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Mobile | T1517 | Access Notifications | SharkBot can intercept notifications to send to the C2 server and take advantage of the Direct Reply feature.[1] | |
| Mobile | T1437 | .001 | Application Layer Protocol:Web Protocols | SharkBot can use HTTP to send C2 messages to infected devices.[1] |
| Mobile | T1661 | Application Versioning | SharkBot initially poses as a benign application, then malware is downloaded and executed after an application update.[1] | |
| Mobile | T1407 | Download New Code at Runtime | SharkBot can use the Android "Direct Reply" feature to spread the malware to other devices. It can also download the full version of the malware after initial device compromise.[1] | |
| Mobile | T1637 | .001 | Dynamic Resolution:Domain Generation Algorithms | SharkBot contains domain generation algorithms to use as backups in case the hardcoded C2 domains are unavailable.[1] |
| Mobile | T1521 | .001 | Encrypted Channel:Symmetric Cryptography | |
| .002 | Encrypted Channel:Asymmetric Cryptography | SharkBot has used RSA to encrypt the symmetric encryption key used for C2 messages.[1] | ||
| Mobile | T1646 | Exfiltration Over C2 Channel | SharkBot can exfiltrate captured user credentials and event logs back to the C2 server.[1] | |
| Mobile | T1630 | .001 | Indicator Removal on Host:Uninstall Malicious Application | SharkBot has C2 commands that can uninstall the app from the infected device.[1] |
| Mobile | T1544 | Ingress Tool Transfer | ||
| Mobile | T1417 | .001 | Input Capture:Keylogging | SharkBot can use accessibility event logging to steal data in text fields.[1] |
| .002 | Input Capture:GUI Input Capture | SharkBot can use a WebView with a fake log in site to capture banking credentials.[1] | ||
| Mobile | T1516 | Input Injection | SharkBot can use input injection via Accessibility Services to simulate user touch inputs, prevent applications from opening, change device settings, and bypass MFA protections.[1] | |
| Mobile | T1406 | Obfuscated Files or Information | SharkBot can use a Domain Generation Algorithm to decode the C2 server location.[1] | |
| Mobile | T1644 | Out of Band Data | SharkBot can use the "Direct Reply" feature of Android to automatically reply to notifications with a message provided by C2.[1] | |
| Mobile | T1424 | Process Discovery | SharkBot can use Accessibility Services to detect which process is in the foreground.[1] | |
| Mobile | T1636 | .004 | Protected User Data:SMS Messages | |
| Mobile | T1582 | SMS Control | SharkBot can hide and send SMS messages.SharkBot can also change which application is the device’s default SMS handler.[1] | |