DoubleAgent is a family of RAT malware dating back to 2013, known to target groups with contentious relationships with the Chinese government.[1]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Mobile | T1437 | Application Layer Protocol | DoubleAgent has used both FTP and TCP sockets for data exfiltration.[1] | |
| Mobile | T1429 | Audio Capture | DoubleAgent has captured audio and can record phone calls.[1] | |
| Mobile | T1623 | .001 | Command and Scripting Interpreter: Unix Shell | DoubleAgent can run arbitrary shell commands.[1] | 
| Mobile | T1645 | Compromise Client Software Binary | DoubleAgent has used exploits to root devices and install additional malware on the system partition.[1] | |
| Mobile | T1533 | Data from Local System | DoubleAgent has collected files from the infected device.[1] | |
| Mobile | T1407 | Download New Code at Runtime | DoubleAgent has downloaded additional code to root devices, such as TowelRoot.[1] | |
| Mobile | T1404 | Exploitation for Privilege Escalation | DoubleAgent has used exploit tools to gain root, such as TowelRoot.[1] | |
| Mobile | T1420 | File and Directory Discovery | DoubleAgent has searched for specific existing data directories, including the Gmail app, Dropbox app, Pictures, and thumbnails.[1] | |
| Mobile | T1628 | .001 | Hide Artifacts: Suppress Application Icon | DoubleAgent has hidden its app icon.[1] | 
| Mobile | T1630 | .002 | Indicator Removal on Host: File Deletion | DoubleAgent has deleted or renamed specific files.[1] | 
| Mobile | T1655 | .001 | Masquerading: Match Legitimate Name or Location | DoubleAgent has been embedded into trojanized versions of applications such as Voxer, TalkBox, and Amaq News.[1] | 
| Mobile | T1406 | Obfuscated Files or Information | DoubleAgent has used an AES encrypted file in the assets folder with an unsuspecting name (e.g. ‘GoogleMusic.png’) for holding configuration and C2 information.[1] | |
| Mobile | T1636 | .002 | Protected User Data: Call Log | DoubleAgent has accessed the call logs.[1] | 
| .003 | Protected User Data: Contact List | DoubleAgent has accessed the contact list.[1] | ||
| .004 | Protected User Data: SMS Messages | DoubleAgent has captured SMS and MMS messages.[1] | ||
| Mobile | T1418 | Software Discovery | DoubleAgent has accessed the list of installed apps.[1] | |
| Mobile | T1409 | Stored Application Data | DoubleAgent has accessed browser history, as well as the files for 15 other apps.[1] | |
| Mobile | T1426 | System Information Discovery | DoubleAgent has accessed common system information.[1] | |