heroui logo

Suspicious UltraVNC Execution

Sigma Rules

View Source
Summary
This rule detects potentially malicious use of UltraVNC, specifically looking for a combination of command line flags that suggest a threat actor is trying to maintain persistent and stealthy access to a compromised machine. The flags of interest include '-autoreconnect', '-connect', and '-id:', which are utilized by the Gamaredon group. The presence of these flags can indicate automated reconnection attempts by the malicious software during process creation, which is a tactic commonly associated with lateral movement in networks. The detection is particularly relevant in environments where UltraVNC is not a standard tool, helping to identify misuse and potential breaches.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
Created: 2022-03-04