The attacker uses a loader (often called ice_setup.exe , ~450KB). Upon execution, the loader checks for active antivirus, disables Windows Firewall via legacy netsh commands, and drops the modified r_server.exe into C:\Windows\System32\Drivers\ .
The attacker opens Radmin Viewer 3.4 (unmodified, because the viewer is legal). They enter the victim's IP, port 4899, and hit connect. radmin iceprogs
is one of those whispers.
The "Ice" doesn't melt. It just waits for the next cmd.exe to spawn. The attacker uses a loader (often called ice_setup
To the uninitiated, the name sounds like a bizarre mashup of a Russian networking utility and a 1990s demoscene group. To those who have found it running in the background of a compromised server, it evokes a chill. IceProgs isn't just a piece of software; it is a philosophy of stealth, born from the golden era of LAN cafes and persistent remote control. Let’s dissect the name. Radmin (Remote Administrator) is a legitimate, commercial remote control software developed by Famatech. It is fast, lightweight, and notorious for being difficult to detect on a network because it doesn’t rely on standard ports like RDP (3389) or VNC (5900). It runs on port 4899 by default—unless you change it. They enter the victim's IP, port 4899, and hit connect
By: [Staff Writer] Date: April 14, 2026
If you found this tool on your server, disconnect the Ethernet cable. Then, re-evaluate your firewall rules. And maybe check the webcam.