
Summary
This detection rule is designed to identify the execution of a renamed version of the Plink binary, which is part of the PuTTY suite used for SSH networking. Attackers often rename legitimate binaries to evade detection by security systems. The rule will trigger when processes are created that meet specific criteria: the original file name must be 'Plink' and the command line must include certain strings typical of remote access commands ('-l forward', '-P', '-R'). If the image path ends with 'plink.exe', it will be excluded from triggering the rule, allowing for the identification of potentially malicious renamed variants.
Categories
- Endpoint
- Windows
Data Sources
- Process
Created: 2022-06-06