{ "type": "bundle", "id": "bundle--57f7e21e-562d-47f1-8943-9d01452c7d2f", "spec_version": "2.0", "objects": [ { "labels": [ "malware" ], "x_mitre_platforms": [ "Android" ], "x_mitre_domains": [ "mobile-attack" ], "x_mitre_aliases": [ "DroidJack" ], "object_marking_refs": [ "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" ], "type": "malware", "id": "malware--05c4f87c-be8f-46ea-8d9a-2a0aad8f52c1", "created": "2017-10-25T14:48:40.571Z", "x_mitre_version": "1.2", "external_references": [ { "source_name": "mitre-attack", "external_id": "S0320", "url": "https://attack.mitre.org/software/S0320" }, { "source_name": "DroidJack", "description": "(Citation: Zscaler-SuperMarioRun) (Citation: Proofpoint-Droidjack)" }, { "source_name": "Proofpoint-Droidjack", "url": "https://www.proofpoint.com/us/threat-insight/post/droidjack-uses-side-load-backdoored-pokemon-go-android-app", "description": "Proofpoint. (2016, July 7). DroidJack Uses Side-Load\u2026It's Super Effective! Backdoored Pokemon GO Android App Found. Retrieved January 20, 2017." }, { "source_name": "Zscaler-SuperMarioRun", "url": "https://www.zscaler.com/blogs/security-research/super-mario-run-malware-2-droidjack-rat", "description": "Viral Gandhi. (2017, January 12). Super Mario Run Malware #2 \u2013 DroidJack RAT. Retrieved January 20, 2017." } ], "x_mitre_deprecated": false, "revoked": false, "description": "[DroidJack](https://attack.mitre.org/software/S0320) is an Android remote access tool that has been observed posing as legitimate applications including the Super Mario Run and Pokemon GO games. (Citation: Zscaler-SuperMarioRun) (Citation: Proofpoint-Droidjack)", "modified": "2022-05-20T17:13:16.506Z", "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", "name": "DroidJack", "x_mitre_attack_spec_version": "2.1.0", "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" } ] }