ComRAT
MITRE
Malware Type:
Other
Other
First seen:
Unknown
Unknown
Last seen:
Unknown
Unknown
Details:
[ComRAT](https://attack.mitre.org/software/S0126) is a second stage implant suspected of being a descendant of [Agent.btz](https://attack.mitre.org/software/S0092) and used by [Turla](https://attack.mitre.org/groups/G0010). The first version of [ComRAT](https://attack.mitre.org/software/S0126) was identified in 2007, but the tool has undergone substantial development for many years since.(Citation: Symantec Waterbug)(Citation: NorthSec 2015 GData Uroburos Tools)(Citation: ESET ComRAT May 2020)
Associated Techniques (22)
| ID | ATT&CK | Tactics |
|---|---|---|
| T1012 | Query Registry | - |
| T1027 | Obfuscated Files or Information | - |
| T1027.009 | Embedded Payloads | - |
| T1027.010 | Command Obfuscation | - |
| T1027.011 | Fileless Storage | - |
| T1029 | Scheduled Transfer | - |
| T1036.004 | Masquerade Task or Service | - |
| T1053.005 | Scheduled Task | - |
| T1055.001 | Dynamic-link Library Injection | - |
| T1059.001 | PowerShell | - |
| T1059.003 | Windows Command Shell | - |
| T1071.001 | Web Protocols | - |
| T1071.003 | Mail Protocols | - |
| T1102.002 | Bidirectional Communication | - |
| T1106 | Native API | - |
Used by Actors (1)
Metadata
| ID: | 598 |
| Created: | 13/01/2026 17:48 |
| Updated: | 23/04/2026 04:00 |