diff --git a/atomics/T1219/T1219.yaml b/atomics/T1219/T1219.yaml new file mode 100644 index 00000000..ea19fba3 --- /dev/null +++ b/atomics/T1219/T1219.yaml @@ -0,0 +1,16 @@ +--- +attack_technique: T1219 +display_name: Remote Access Tools + +atomic_tests: +- name: TeamViewer Files Detected Test on Windows + description: | + An adversary may attempt to trick the user into downloading teamviewer and using this to maintain access to the machine. + supported_platforms: + - windows + executor: + name: powershell + elevation_required: false + command: | + $client = new-object System.Net.WebClient + $client.DownloadFile("https://download.teamviewer.com/download/TeamViewer_Setup.exe","C:\tmp\teamviewer.exe")