Remexi

Remexi is a Windows-based Trojan that was developed in the C programming language.[1]

ID: S0375
Type: MALWARE
Platforms: Windows
Version: 1.2
Created: 17 April 2019
Last Modified: 11 April 2024

Techniques Used

Domain ID Name Use
Enterprise T1047 Windows管理规范

Remexi executes received commands with wmic.exe (for WMI commands). [1]

Enterprise T1115 剪贴板数据

Remexi collects text from the clipboard.[1]

Enterprise T1140 反混淆/解码文件或信息

Remexi decrypts the configuration data using XOR with 25-character keys.[1]

Enterprise T1547 .001 启动或登录自动启动执行: Registry Run Keys / Startup Folder

Remexi utilizes Run Registry keys in the HKLM hive as a persistence mechanism.[1]

.004 启动或登录自动启动执行: Winlogon Helper DLL

Remexi achieves persistence using Userinit by adding the Registry key HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit.[1]

Enterprise T1059 .003 命令与脚本解释器: Windows Command Shell

Remexi silently executes received commands with cmd.exe.[1]

.005 命令与脚本解释器: Visual Basic

Remexi uses AutoIt and VBS scripts throughout its execution process.[1]

Enterprise T1113 屏幕捕获

Remexi takes screenshots of windows of interest.[1]

Enterprise T1071 .001 应用层协议: Web Protocols

Remexi uses BITSAdmin to communicate with the C2 server over HTTP.[1]

Enterprise T1010 应用窗口发现

Remexi has a command to capture active windows on the machine and retrieve window titles.[1]

Enterprise T1560 归档收集数据

Remexi encrypts and adds all gathered browser data into files for upload to C2.[1]

Enterprise T1083 文件和目录发现

Remexi searches for files on the system. [1]

Enterprise T1027 .013 混淆文件或信息: Encrypted/Encoded File

Remexi obfuscates its configuration data with XOR.[1]

Enterprise T1056 .001 输入捕获: Keylogging

Remexi gathers and exfiltrates keystrokes from the machine.[1]

Enterprise T1041 通过C2信道渗出

Remexi performs exfiltration over BITSAdmin, which is also used for the C2 channel.[1]

Enterprise T1053 .005 预定任务/作业: Scheduled Task

Remexi utilizes scheduled tasks as a persistence mechanism.[1]

Groups That Use This Software

ID Name References
G0087 APT39

[2][1][3]

References