
Summary
The rule detects the execution of Radmin Viewer, a remote control utility that can potentially be exploited by attackers to gain unauthorized access to and control over Windows systems. This detection applies to instances where Radmin Viewer is executed, which may indicate malicious lateral movement within a network or unauthorized remote access attempts. By monitoring process creation events in Windows, the detection logic focuses on specific attributes of the process such as its description, product name, and original file name. If any of these specified attributes appear in process creation logs, the rule will trigger an alert to notify security teams of potential misuse of this utility.
Categories
- Endpoint
- Windows
Data Sources
- Process
ATT&CK Techniques
- T1072
Created: 2022-01-22