| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1090 | 代理 |
Remcos uses the infected hosts as SOCKS5 proxies to allow for tunneling and proxying.[1] |
|
| Enterprise | T1112 | 修改注册表 |
Remcos has full control of the Registry, including the ability to modify it.[1] |
|
| Enterprise | T1115 | 剪贴板数据 | ||
| Enterprise | T1547 | .001 | 启动或登录自动启动执行: Registry Run Keys / Startup Folder |
Remcos can add itself to the Registry key |
| Enterprise | T1059 | .003 | 命令与脚本解释器: Windows Command Shell |
Remcos can launch a remote command line to execute commands on the victim’s machine.[3] |
| .006 | 命令与脚本解释器: Python | |||
| Enterprise | T1113 | 屏幕捕获 |
Remcos takes automated screenshots of the infected machine.[1] |
|
| Enterprise | T1083 | 文件和目录发现 | ||
| Enterprise | T1027 | 混淆文件或信息 |
Remcos uses RC4 and base64 to obfuscate data, including Registry entries and file paths.[2] |
|
| Enterprise | T1548 | .002 | 滥用权限提升控制机制: Bypass User Account Control | |
| Enterprise | T1497 | .001 | 虚拟化/沙盒规避: System Checks | |
| Enterprise | T1125 | 视频捕获 | ||
| Enterprise | T1105 | 输入工具传输 |
Remcos can upload and download files to and from the victim’s machine.[1] |
|
| Enterprise | T1056 | .001 | 输入捕获: Keylogging | |
| Enterprise | T1055 | 进程注入 |
Remcos has a command to hide itself through injecting into another process.[3] |
|
| Enterprise | T1123 | 音频捕获 | ||
| ID | Name | References |
|---|---|---|
| G0140 | LazyScripter | |
| G0078 | Gorgon Group |
| ID | Name | Description |
|---|---|---|
| C0005 | Operation Spalax |