
Summary
This detection rule is designed to identify the execution of a renamed instance of the NetSupport Rat, specifically targeting occurrences where it executes as 'client32.exe' on Windows systems. This is accomplished through a sophisticated approach analyzing various characteristics of the process, including the product name, original file name, and the imphash of the executable. The rule consists of a selection criteria that checks for the presence of the string 'NetSupport Remote Control' in the product field, verifies 'client32.exe' is present in the OriginalFileName, and confirms the imphash matches a predefined value. Importantly, an exclusion filter is applied, which identifies instances of the executable that specifically end with '\client32.exe'. If the selection conditions are satisfied while the filter is not, an alert triggers, indicating a potential security incident. This rule is classified within the context of defense evasion tactics used by malicious actors, making it crucial for threat detection and response efforts.
Categories
- Windows
Data Sources
- Process
Created: 2022-09-19