Detecting Ammy Admin RMM Agent Execution

Detects the execution of the Ammy Admin RMM agent for remote management.

Sigma rule (View on GitHub)

 1title: Detecting Ammy Admin RMM Agent Execution
 2id: 7da7809e-f3d5-47a3-9d5d-fc9d019caf14
 3status: experimental
 4description: Detects the execution of the Ammy Admin RMM agent for remote management.
 5author: '@kostastsale'
 6references:
 7  - https://www.ammyy.com/en/admin_features.html
 8date: 2024/08/05
 9tags:
10  - attack.execution
11  - attack.persistence
12logsource:
13  category: process_creation
14  product: windows
15detection:
16  selection:
17    Image|endswith:
18      - '\rundll32.exe'
19    CommandLine|contains:
20      - 'AMMYY\aa_nts.dll",run'
21  condition: selection
22falsepositives:
23  - Legitimate use of Ammy Admin RMM agent for remote management by admins.
24level: medium```

References

Related rules

to-top