Detection rules › Sigma

PUA - Radmin Viewer Utility Execution

Severity
medium
Author
frack113
Source
upstream

Detects the execution of Radmin which can be abused by an adversary to remotely control Windows machines

MITRE ATT&CK coverage

TacticTechniques
ExecutionT1072 Software Deployment Tools
Lateral MovementT1072 Software Deployment Tools

Event coverage

ProviderEvent IDTitle
Sysmon1Process creation

Stages and Predicates

Stage 1: selection

or:
Description: 'Radmin Viewer'
OriginalFileName: Radmin.exe
Product: 'Radmin Viewer'

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
Descriptioneq
  • Radmin Viewer
OriginalFileNameeq
  • Radmin.exe
Producteq
  • Radmin Viewer