| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1071 | .001 | Application Layer Protocol:Web Protocols | Remexi usesBITSAdmin to communicate with the C2 server over HTTP.[1] |
| Enterprise | T1010 | Application Window Discovery | Remexi has a command to capture active windows on the machine and retrieve window titles.[1] | |
| Enterprise | T1560 | Archive Collected Data | Remexi encrypts and adds all gathered browser data into files for upload to C2.[1] | |
| Enterprise | T1547 | .001 | Boot or Logon Autostart Execution:Registry Run Keys / Startup Folder | Remexi utilizes Run Registry keys in the HKLM hive as a persistence mechanism.[1] |
| .004 | Boot or Logon Autostart Execution:Winlogon Helper DLL | Remexi achieves persistence using Userinit by adding the Registry key | ||
| Enterprise | T1115 | Clipboard Data | ||
| Enterprise | T1059 | .003 | Command and Scripting Interpreter:Windows Command Shell | |
| .005 | Command and Scripting Interpreter:Visual Basic | Remexi uses AutoIt and VBS scripts throughout its execution process.[1] | ||
| Enterprise | T1140 | Deobfuscate/Decode Files or Information | Remexi decrypts the configuration data using XOR with 25-character keys.[1] | |
| Enterprise | T1041 | Exfiltration Over C2 Channel | Remexi performs exfiltration overBITSAdmin, which is also used for the C2 channel.[1] | |
| Enterprise | T1083 | File and Directory Discovery | ||
| Enterprise | T1056 | .001 | Input Capture:Keylogging | Remexi gathers and exfiltrates keystrokes from the machine.[1] |
| Enterprise | T1027 | .013 | Obfuscated Files or Information:Encrypted/Encoded File | |
| Enterprise | T1053 | .005 | Scheduled Task/Job:Scheduled Task | Remexi utilizes scheduled tasks as a persistence mechanism.[1] |
| Enterprise | T1113 | Screen Capture | ||
| Enterprise | T1047 | Windows Management Instrumentation | Remexi executes received commands with wmic.exe (for WMI commands).[1] | |