ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Report
Search
Home > List all groups > List all tools > List all groups using tool Remcom

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link Tool: Remcom

NamesRemcom
RemoteCommandExecution
CategoryTools
TypeBackdoor, Remote command
DescriptionRemCom is an open-source, redistributable utility providing the same remote management functions. It achieved a level of notoriety after adversaries used it to move laterally in their attack on the Democratic National Committee in 2016. However, it’s also included in several legitimate software packages. By default, RemCom sends RemComSvc.exe to a remote computer, which then uses the named pipe \\.\pipe\remcom_comunication (misspelling and all) in the place of PsExec’s named pipe. In addition, the process’s internal name has a value of remcom.
Information<https://redcanary.com/blog/threat-hunting-psexec-lateral-movement/>
<https://doublepulsar.com/second-zerologon-attacker-seen-exploiting-internet-honeypot-c7fb074451ef>
Malpedia<https://malpedia.caad.fkie.fraunhofer.de/details/win.remcom>

Last change to this tool card: 24 April 2021

Download this tool card in JSON format

All groups using tool Remcom

ChangedNameCountryObserved

APT groups

 ALPHV, BlackCat Gang[Unknown]2021-Mar 2024X
 Chafer, APT 39Iran2014-Sep 2020X
 DalbitChina2022 

3 groups listed (3 APT, 0 other, 0 unknown)

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]