heroui logo

Remcos RAT File Creation in Remcos Folder

Splunk Security Content

View Source
Summary
This detection rule identifies the creation of specific files associated with the Remcos Remote Access Trojan (RAT) within the AppData directory of Windows systems. Specifically, it focuses on files with a .dat extension being created in directories that include the term 'remcos', which is indicative of activities related to keylogging and clipboard logging performed by Remcos. This rule uses the Sysmon EventID 11 within the Endpoint.Filesystem data model to monitor file system events. If these files are confirmed to be generated as part of a malicious operation, it may indicate a compromised system, potentially allowing attackers to exfiltrate data or perform significant surveillance through the capabilities offered by the Remcos RAT.
Categories
  • Endpoint
Data Sources
  • File
ATT&CK Techniques
  • T1113
Created: 2024-11-13