| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1071 | .001 | Application Layer Protocol: Web Protocols | Remexi uses BITSAdmin to communicate with the C2 server over HTTP.[1] | 
| Enterprise | T1010 | Application Window Discovery | Remexi has a command to capture active windows on the machine and retrieve window titles.[1] | |
| Enterprise | T1560 | Archive Collected Data | Remexi encrypts and adds all gathered browser data into files for upload to C2.[1] | |
| Enterprise | T1547 | .001 | Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder | Remexi utilizes Run Registry keys in the HKLM hive as a persistence mechanism.[1] | 
| .004 | Boot or Logon Autostart Execution: Winlogon Helper DLL | Remexi achieves persistence using Userinit by adding the Registry key  | ||
| Enterprise | T1115 | Clipboard Data | ||
| Enterprise | T1059 | .003 | Command and Scripting Interpreter: Windows Command Shell | |
| .005 | Command and Scripting Interpreter: Visual Basic | Remexi uses AutoIt and VBS scripts throughout its execution process.[1] | ||
| Enterprise | T1140 | Deobfuscate/Decode Files or Information | Remexi decrypts the configuration data using XOR with 25-character keys.[1] | |
| Enterprise | T1041 | Exfiltration Over C2 Channel | Remexi performs exfiltration over BITSAdmin, which is also used for the C2 channel.[1] | |
| Enterprise | T1083 | File and Directory Discovery | ||
| Enterprise | T1056 | .001 | Input Capture: Keylogging | Remexi gathers and exfiltrates keystrokes from the machine.[1] | 
| Enterprise | T1027 | .013 | Obfuscated Files or Information: Encrypted/Encoded File | |
| Enterprise | T1053 | .005 | Scheduled Task/Job: Scheduled Task | Remexi utilizes scheduled tasks as a persistence mechanism.[1] | 
| Enterprise | T1113 | Screen Capture | ||
| Enterprise | T1047 | Windows Management Instrumentation | Remexi executes received commands with wmic.exe (for WMI commands). [1] | |