heroui logo

Remote Access Tool - Potential MeshAgent Execution - Windows

Sigma Rules

View Source
Summary
This detection rule targets the potential execution of MeshAgent, a remote access tool that is frequently misused by threat actors for unauthorized access to systems. MeshAgent's ability to be renamed poses a challenge for traditional detection methods, making historical context crucial in identifying its use. The rule focuses specifically on monitoring command line executions where the '--meshServiceName' argument is present, suggesting that the MeshAgent may be actively facilitating remote access on the Windows operating system. Environments that use MeshAgent legitimately might yield false positives, necessitating careful review and mitigation strategies.
Categories
  • Windows
  • Endpoint
Data Sources
  • Process
Created: 2025-05-19