PUA - Radmin Viewer Utility Execution
Detects the execution of Radmin which can be abused by an adversary to remotely control Windows machines
Sigma rule (View on GitHub)
1title: PUA - Radmin Viewer Utility Execution
2id: 5817e76f-4804-41e6-8f1d-5fa0b3ecae2d
3status: test
4description: Detects the execution of Radmin which can be abused by an adversary to remotely control Windows machines
5references:
6 - https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1072/T1072.md
7 - https://www.radmin.fr/
8author: frack113
9date: 2022-01-22
10modified: 2023-12-11
11tags:
12 - attack.execution
13 - attack.lateral-movement
14 - attack.t1072
15logsource:
16 category: process_creation
17 product: windows
18detection:
19 selection:
20 - Description: 'Radmin Viewer'
21 - Product: 'Radmin Viewer'
22 - OriginalFileName: 'Radmin.exe'
23 condition: selection
24falsepositives:
25 - Unknown
26level: medium
References
Related rules
- PDQ Deploy Remote Adminstartion Tool Execution
- Audit CVE Event
- CobaltStrike Service Installations - Security
- CobaltStrike Service Installations - System
- HackTool - Potential Impacket Lateral Movement Activity