
Summary
This detection rule identifies the installation of the Remcos Remote Access Trojan (RAT) by monitoring for specific registry entries in the Windows Registry on a host system. Utilizing data from Splunk's Endpoint.Processes and Endpoint.Registry data models, the rule specifically looks for the presence of a registry key associated with Remcos under the path 'Software\Remcos' that contains a 'license' key. Such detection indicates potential compromise, allowing unauthorized access and possible exfiltration of sensitive information. Immediate action is required if such entries are found as it signifies that the host may be under the attacker's control. The strategy combines telemetry from various sources such as Sysmon logs and Windows Event Logs to ensure comprehensive coverage against this threat.
Categories
- Endpoint
- Windows
Data Sources
- Process
- Windows Registry
ATT&CK Techniques
- T1112
Created: 2024-11-13