Names | Remcom | |
Category | Tools | |
Type | Backdoor, Remote command | |
Description | RemCom is an open-source, redistributable utility providing the same remote management functions. It achieved a level of notoriety after adversaries used it to move laterally in their attack on the Democratic National Committee in 2016. However, it’s also included in several legitimate software packages. By default, RemCom sends RemComSvc.exe to a remote computer, which then uses the named pipe \\.\pipe\remcom_comunication (misspelling and all) in the place of PsExec’s named pipe. In addition, the process’s internal name has a value of remcom. | |
Information | <https://redcanary.com/blog/threat-hunting-psexec-lateral-movement/> |
Last change to this tool card: 20 April 2020
Download this tool card in JSON format
Previous: Regin
Next: RemcosRAT
Changed | Name | Country | Observed | ||
APT groups | |||||
![]() | Chafer, APT 39 | ![]() | 2014-Sep 2020 | ![]() |
1 group listed (1 APT, 0 other, 0 unknown)
Thailand Computer Emergency Response Team (ThaiCERT) Follow us on![]() ![]() |
Report incidents |
|
![]() |
+66 (0)2-123-1234 | |
![]() |
report@thaicert.or.th | |
![]() |
Download PGP key |