AnyDesk Network
Detects use of AnyDesk
Sigma rule (View on GitHub)
1title: AnyDesk Network
2id: b26feb0b-8891-4e66-b2e7-ec91dc045d58
3status: experimental
4description: Detects use of AnyDesk
5author: _pete_0, TheDFIRReport
6references:
7 - https://support.anydesk.com/knowledge/firewall
8date: 2022/05/06
9modified: 2022/05/06
10logsource:
11 category: dns_query
12 product: windows
13detection:
14 selection:
15 QueryName|contains:
16 - '.anydesk.com'
17 Image|endswith:
18 - '\anydesk.exe'
19 condition: selection
20falsepositives:
21 - Legitimate AnyDesk installation
22level: high
23tags:
24 - attack.lateral_movement
25 - attack.t1133
26 - attack.command_and_control
27 - attack.t1219
References
Related rules
- SplashTop Network
- SplashTop Process
- Executable Deployment from Remote Share
- Suspicious Registry Modification of MaxMpxCt Parameters
- BITSAdmin Downloading Malicious Binaries