Currently viewing ATT&CK v8.2 which was live between October 27, 2020 and April 28, 2021. Learn more about the versioning system or see the live site.

Application Discovery

Adversaries may seek to identify all applications installed on the device. One use case for doing so is to identify the presence of endpoint security applications that may increase the adversary's risk of detection. Another use case is to identify the presence of applications that the adversary may wish to target.

On Android, applications can use methods in the PackageManager class [1] to enumerate other apps installed on device, or an entity with shell access can use the pm command line tool.

On iOS, apps can use private API calls to obtain a list of other apps installed on the device. [2] However, use of private API calls will likely prevent the application from being distributed through Apple's App Store.

ID: T1418
Sub-techniques:  No sub-techniques
Tactic Type: Post-Adversary Device Access
Tactics: Defense Evasion, Discovery
Platforms: Android, iOS
Version: 1.0
Created: 25 October 2017
Last Modified: 17 October 2018

Procedure Examples

Name Description
Agent Smith

Agent Smith obtains the device’s application list.[3]

Anubis

Anubis can collect a list of installed applications to compare to a list of targeted applications.[4]

Cerberus

Cerberus can obtain a list of installed applications.[5]

DEFENSOR ID

DEFENSOR ID can retrieve a list of installed applications.[6]

Desert Scorpion

Desert Scorpion can obtain a list of installed applications.[7]

EventBot

EventBot can collect a list of installed applications.[8]

Exodus

Exodus Two can obtain a list of installed applications.[9]

FakeSpy

FakeSpy can collect a list of installed applications.[10]

FlexiSpy

FlexiSpy can retrieve a list of installed applications.[11]

Ginp

Ginp can obtain a list of installed applications.[12]

GolfSpy

GolfSpy can obtain a list of installed applications.[13]

Gustuff

Gustuff checks for antivirus software contained in a predefined list.[14]

INSOMNIA

INSOMNIA can obtain a list of installed non-Apple applications.[15]

Mandrake

Mandrake can obtain a list of installed applications.[16]

Monokle

Monokle can list applications installed on the device.[17]

Pallas

Pallas retrieves a list of all applications installed on the device.[18]

Pegasus for Android

Pegasus for Android accesses the list of installed applications.[19]

Riltok

Riltok can retrieve a list of installed applications. Installed application names are then checked against an adversary-defined list of targeted applications.[20]

Rotexy

Rotexy retrieves a list of installed applications and sends it to the command and control server.[21]

Stealth Mango

Stealth Mango uploads information about installed packages.[22]

Triada

Triada is able to modify code within the com.android.systemui application to gain access to GET_REAL_TASKS permissions. This permission enables access to information about applications currently on the foreground and other recently used apps.[23]

TrickMo

TrickMo can collect a list of installed applications.[24]

ViceLeaker

ViceLeaker can obtain a list of installed applications.[25]

WolfRAT

WolfRAT can obtain a list of installed applications.[26]

Mitigations

Mitigation Description
Application Vetting

Application vetting techniques could search for use of the Android PackageManager class to enumerate other apps, and such applications could have extra scrutiny applied to them. However, this technique may not be practical if many apps invoke these methods as part of their legitimate behavior. On iOS, application vetting techniques could similarly search for use of the private API call necessary to obtain a list of apps installed on the device. Additionally, on iOS, use of the private API call is likely to result in the app not being accepted into Apple's App Store.

References

  1. Android. (n.d.). PackageManager. Retrieved December 21, 2016.
  2. Andreas Kurtz. (2014, September 18). Malicious iOS Apps. Retrieved December 21, 2016.
  3. A. Hazum, F. He, I. Marom, B. Melnykov, A. Polkovnichenko. (2019, July 10). Agent Smith: A New Species of Mobile Malware. Retrieved May 7, 2020.
  4. M. Feller. (2020, February 5). Infostealer, Keylogger, and Ransomware in One: Anubis Targets More than 250 Android Applications. Retrieved April 8, 2020.
  5. Threat Fabric. (2019, August). Cerberus - A new banking Trojan from the underworld. Retrieved June 26, 2020.
  6. L. Stefanko. (2020, May 22). Insidious Android malware gives up all malicious features but one to gain stealth. Retrieved June 26, 2020.
  7. A. Blaich, M. Flossman. (2018, April 16). Lookout finds new surveillanceware in Google Play with ties to known threat actor targeting the Middle East. Retrieved September 11, 2020.
  8. D. Frank, L. Rochberger, Y. Rimmer, A. Dahan. (2020, April 30). EventBot: A New Mobile Banking Trojan is Born. Retrieved June 26, 2020.
  9. Security Without Borders. (2019, March 29). Exodus: New Android Spyware Made in Italy. Retrieved September 3, 2019.
  10. O. Almkias. (2020, July 1). FakeSpy Masquerades as Postal Service Apps Around the World. Retrieved September 15, 2020.
  11. FlexiSpy. (n.d.). FlexiSpy Monitoring Features. Retrieved September 4, 2019.
  12. ThreatFabric. (2019, November). Ginp - A malware patchwork borrowing from Anubis. Retrieved April 8, 2020.
  13. E. Xu, G. Guo. (2019, June 28). Mobile Cyberespionage Campaign ‘Bouncing Golf’ Affects Middle East. Retrieved January 27, 2020.
  1. Vitor Ventura. (2019, April 9). Gustuff banking botnet targets Australia . Retrieved September 3, 2019.
  2. I. Beer. (2019, August 29). Implant Teardown. Retrieved June 2, 2020.
  3. R. Gevers, M. Tivadar, R. Bleotu, A. M. Barbatei, et al.. (2020, May 14). Uprooting Mandrake: The Story of an Advanced Android Spyware Framework That Went Undetected for 4 Years. Retrieved July 15, 2020.
  4. Bauer A., Kumar A., Hebeisen C., et al. (2019, July). Monokle: The Mobile Surveillance Tooling of the Special Technology Center. Retrieved September 4, 2019.
  5. Blaich, A., et al. (2018, January 18). Dark Caracal: Cyber-espionage at a Global Scale. Retrieved April 11, 2018.
  6. Mike Murray. (2017, April 3). Pegasus for Android: the other side of the story emerges. Retrieved April 16, 2017.
  7. Tatyana Shishkova. (2019, June 25). Riltok mobile Trojan: A banker with global reach. Retrieved August 7, 2019.
  8. T. Shishkova, L. Pikman. (2018, November 22). The Rotexy mobile Trojan – banker and ransomware. Retrieved September 23, 2019.
  9. Lookout. (n.d.). Stealth Mango & Tangelo. Retrieved September 27, 2018.
  10. Lukasz Siewierski. (2019, June 6). PHA Family Highlights: Triada. Retrieved July 16, 2019.
  11. P. Asinovsky. (2020, March 24). TrickBot Pushing a 2FA Bypass App to Bank Customers in Germany. Retrieved April 24, 2020.
  12. GReAT. (2019, June 26). ViceLeaker Operation: mobile espionage targeting Middle East. Retrieved November 21, 2019.
  13. W. Mercer, P. Rascagneres, V. Ventura. (2020, May 19). The wolf is back... . Retrieved July 20, 2020.