
Summary
The detection rule focuses on the identification of suspicious usage of Radmin, a legitimate remote management software, within an enterprise environment. Adversaries may exploit Radmin to perform lateral movement across the network, making this detection critical for identifying unauthorized access. The Splunk logic utilizes Sysmon event data to capture instances where Radmin is executed or when attempts are made to connect remotely using the tool. The rule specifically looks for patterns indicating radmin.exe process execution or the presence of connection strings in the logs, signaling potential malicious activities. The data is aggregated over time to reveal trends in the use of this tool, which is crucial for assessing the integrity of system management practices and spotting potential breaches.
Categories
- Endpoint
- Windows
Data Sources
- Process
- Windows Registry
ATT&CK Techniques
- T1072
Created: 2024-02-09