Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1548 | .002 | Abuse Elevation Control Mechanism: Bypass User Account Control | |
Enterprise | T1123 | Audio Capture | ||
Enterprise | T1547 | .001 | Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder |
Remcos can add itself to the Registry key |
Enterprise | T1115 | Clipboard Data | ||
Enterprise | T1059 | .003 | Command and Scripting Interpreter: Windows Command Shell |
Remcos can launch a remote command line to execute commands on the victim’s machine.[3] |
.006 | Command and Scripting Interpreter: Python | |||
Enterprise | T1083 | File and Directory Discovery | ||
Enterprise | T1105 | Ingress Tool Transfer |
Remcos can upload and download files to and from the victim’s machine.[1] |
|
Enterprise | T1056 | .001 | Input Capture: Keylogging | |
Enterprise | T1112 | Modify Registry |
Remcos has full control of the Registry, including the ability to modify it.[1] |
|
Enterprise | T1027 | Obfuscated Files or Information |
Remcos uses RC4 and base64 to obfuscate data, including Registry entries and file paths.[2] |
|
Enterprise | T1055 | Process Injection |
Remcos has a command to hide itself through injecting into another process.[3] |
|
Enterprise | T1090 | Proxy |
Remcos uses the infected hosts as SOCKS5 proxies to allow for tunneling and proxying.[1] |
|
Enterprise | T1113 | Screen Capture |
Remcos takes automated screenshots of the infected machine.[1] |
|
Enterprise | T1125 | Video Capture | ||
Enterprise | T1497 | .001 | Virtualization/Sandbox Evasion: System Checks |
ID | Name | References |
---|---|---|
G0140 | LazyScripter | |
G0078 | Gorgon Group |
ID | Name | Description |
---|---|---|
C0005 | Operation Spalax |