Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Software
  3. Remexi

Remexi

Remexi is a Windows-based Trojan that was developed in the C programming language.[1]

ID: S0375
Type: MALWARE
Platforms: Windows
Version: 1.2
Created: 17 April 2019
Last Modified: 11 April 2024
Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1071.001Application Layer Protocol:Web Protocols

Remexi usesBITSAdmin to communicate with the C2 server over HTTP.[1]

EnterpriseT1010Application Window Discovery

Remexi has a command to capture active windows on the machine and retrieve window titles.[1]

EnterpriseT1560Archive Collected Data

Remexi encrypts and adds all gathered browser data into files for upload to C2.[1]

EnterpriseT1547.001Boot or Logon Autostart Execution:Registry Run Keys / Startup Folder

Remexi utilizes Run Registry keys in the HKLM hive as a persistence mechanism.[1]

.004Boot or Logon Autostart Execution:Winlogon Helper DLL

Remexi achieves persistence using Userinit by adding the Registry keyHKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit.[1]

EnterpriseT1115Clipboard Data

Remexi collects text from the clipboard.[1]

EnterpriseT1059.003Command and Scripting Interpreter:Windows Command Shell

Remexi silently executes received commands with cmd.exe.[1]

.005Command and Scripting Interpreter:Visual Basic

Remexi uses AutoIt and VBS scripts throughout its execution process.[1]

EnterpriseT1140Deobfuscate/Decode Files or Information

Remexi decrypts the configuration data using XOR with 25-character keys.[1]

EnterpriseT1041Exfiltration Over C2 Channel

Remexi performs exfiltration overBITSAdmin, which is also used for the C2 channel.[1]

EnterpriseT1083File and Directory Discovery

Remexi searches for files on the system.[1]

EnterpriseT1056.001Input Capture:Keylogging

Remexi gathers and exfiltrates keystrokes from the machine.[1]

EnterpriseT1027.013Obfuscated Files or Information:Encrypted/Encoded File

Remexi obfuscates its configuration data with XOR.[1]

EnterpriseT1053.005Scheduled Task/Job:Scheduled Task

Remexi utilizes scheduled tasks as a persistence mechanism.[1]

EnterpriseT1113Screen Capture

Remexi takes screenshots of windows of interest.[1]

EnterpriseT1047Windows Management Instrumentation

Remexi executes received commands with wmic.exe (for WMI commands).[1]

Groups That Use This Software

IDNameReferences
G0087APT39

[2][1][3]

References

×

[8]ページ先頭

©2009-2026 Movatter.jp