| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1548 | .002 | Abuse Elevation Control Mechanism: Bypass User Account Control | |
| Enterprise | T1010 | Application Window Discovery | ||
| Enterprise | T1560 | .001 | Archive Collected Data: Archive via Utility | |
| Enterprise | T1123 | Audio Capture | ||
| Enterprise | T1547 | .001 | Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder |
Remcos can add itself to the Registry key |
| Enterprise | T1115 | Clipboard Data | ||
| Enterprise | T1059 | .003 | Command and Scripting Interpreter: Windows Command Shell |
Remcos can launch a remote command line to execute commands on the victim’s machine.[3][4] |
| .005 | Command and Scripting Interpreter: Visual Basic | |||
| .006 | Command and Scripting Interpreter: Python | |||
| .007 | Command and Scripting Interpreter: JavaScript | |||
| Enterprise | T1543 | .003 | Create or Modify System Process: Windows Service |
Remcos can terminate, suspend, and resume a process by PID.[4] |
| Enterprise | T1132 | .001 | Data Encoding: Standard Encoding | |
| Enterprise | T1491 | .001 | Defacement: Internal Defacement | |
| Enterprise | T1568 | Dynamic Resolution |
Remcos has used dynamic DNS domains in C2 communications.[5] |
|
| Enterprise | T1573 | .002 | Encrypted Channel: Asymmetric Cryptography | |
| Enterprise | T1083 | File and Directory Discovery | ||
| Enterprise | T1564 | Hide Artifacts | ||
| .003 | Hidden Window |
Remcos can set |
||
| Enterprise | T1070 | Indicator Removal |
Remcos can clean saved cookies and logins from the web browser.[4] |
|
| .004 | File Deletion |
Remcos can delete files and folders from victim machines.[4] |
||
| Enterprise | T1105 | Ingress Tool Transfer |
Remcos can upload and download files to and from the victim’s machine.[1][4] |
|
| Enterprise | T1056 | .001 | Input Capture: Keylogging | |
| Enterprise | T1112 | Modify Registry |
Remcos has full control of the Registry, including the ability to modify it.[1][4] |
|
| Enterprise | T1027 | Obfuscated Files or Information |
Remcos uses RC4 and base64 to obfuscate data, including Registry entries and file paths.[2] Remcos can also employ control flow flattening to hinder analysis.[5] |
|
| .013 | Encrypted/Encoded File | |||
| Enterprise | T1566 | .001 | Phishing: Spearphishing Attachment |
Remcos has been spread through emails containing malicious documents.[4] |
| Enterprise | T1057 | Process Discovery |
Remcos can discover running processes on compromised machines.[4] |
|
| Enterprise | T1055 | Process Injection |
Remcos has a command to hide itself by injecting into another process.[3] |
|
| Enterprise | T1090 | Proxy |
Remcos uses the infected hosts as SOCKS5 proxies to allow for tunneling and proxying.[1][4] |
|
| Enterprise | T1012 | Query Registry | ||
| Enterprise | T1113 | Screen Capture |
Remcos takes automated screenshots of the infected machine.[1][4] |
|
| Enterprise | T1082 | System Information Discovery |
Remcos can collect the OS version and process architecture of compromised hosts.[4] |
|
| Enterprise | T1614 | System Location Discovery | ||
| Enterprise | T1033 | System Owner/User Discovery | ||
| Enterprise | T1529 | System Shutdown/Reboot | ||
| Enterprise | T1204 | .002 | User Execution: Malicious File |
Remcos has been executed by luring victims into opening malicious email attachments including Excel files.[4] |
| Enterprise | T1125 | Video Capture | ||
| Enterprise | T1497 | .001 | Virtualization/Sandbox Evasion: System Checks | |
| ID | Name | References |
|---|---|---|
| G0140 | LazyScripter |
LazyScripter dropped Remcos during operations.[6] |
| G0047 | Gamaredon Group |
Gamaredon Group used Remcos during operations.[7] |
| G0099 | APT-C-36 | |
| G0078 | Gorgon Group |
Gorgon Group has used Remcos as the final payload during operations.[11] |
| ID | Name | Description |
|---|---|---|
| C0005 | Operation Spalax |
During Operation Spalax, the threat actors obtained Remcos to use in operations.[12] |