Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Software
  3. Escobar

Escobar

Escobar is an Android banking trojan, first detected in March 2021, believed to be a new variant of AbereBot.[1]

ID: S1092
Type: MALWARE
Platforms: Android
Contributors: Pooja Natarajan, NEC Corporation India; Hiroki Nagahama, NEC Corporation; Manikantan Srinivasan, NEC Corporation India
Version: 1.0
Created: 28 September 2023
Last Modified: 11 October 2023
Mobile Layer
downloadview

Techniques Used

DomainIDNameUse
MobileT1517Access Notifications

Escobar can monitor a device’s notifications.[1]

MobileT1429Audio Capture

Escobar can record audio from the device’s microphone.[1]

MobileT1616Call Control

Escobar can initiate phone calls.[1]

MobileT1533Data from Local System

Escobar can collect sensitive information, such as Google Authenticator codes.[1]

MobileT1420File and Directory Discovery

Escobar can access external storage.[1]

MobileT1630.001Indicator Removal on Host:Uninstall Malicious Application

Escobar can uninstall itself and other applications.[1]

MobileT1417.001Input Capture:Keylogging

Escobar can collect application keylogs.[1]

.002Input Capture:GUI Input Capture

Escobar can collect credentials using phishing overlays.[1]

MobileT1430Location Tracking

Escobar can request coarse and fine location permissions to track the device.[1]

MobileT1461Lockscreen Bypass

Escobar can request theDISABLE_KEYGUARD permission to disable the device lock screen password.[1]

MobileT1636.002Protected User Data:Call Log

Escobar can access the device’s call log.[1]

.004Protected User Data:SMS Messages

Escobar can read SMS messages on the device.[1]

MobileT1663Remote Access Software

Escobar can use VNC to remotely control an infected device.[1]

MobileT1582SMS Control

Escobar can modify, send, and delete SMS messages.[1]

MobileT1409Stored Application Data

Escobar can request theGET_ACCOUNTS permission to get the list of accounts on the device, and can collect media files.[1]

MobileT1512Video Capture

Escobar can take photos using the device cameras.[1]

References

×

[8]ページ先頭

©2009-2026 Movatter.jp