Radmin | Iceprogs
is the mutation. It is a customized, cracked, or "hardened" distribution of Radmin 3.x, repacked by a warez group known as ICE . The "Progs" suffix is old-school scene slang for "programs" or "tools."
Here is where the "Ice" magic happens. Instead of a login prompt, the victim sees nothing. The attacker, however, is presented with a window that looks exactly like the local Windows desktop—but it is a ghost. No remote cursor blinking. No tray icon. Just total, silent control. You might think a tool built on a protocol from the Windows XP era would be obsolete. You would be wrong. radmin iceprogs
By: [Staff Writer] Date: April 14, 2026
The attacker opens Radmin Viewer 3.4 (unmodified, because the viewer is legal). They enter the victim's IP, port 4899, and hit connect. is the mutation
To the uninitiated, the name sounds like a bizarre mashup of a Russian networking utility and a 1990s demoscene group. To those who have found it running in the background of a compromised server, it evokes a chill. IceProgs isn't just a piece of software; it is a philosophy of stealth, born from the golden era of LAN cafes and persistent remote control. Let’s dissect the name. Radmin (Remote Administrator) is a legitimate, commercial remote control software developed by Famatech. It is fast, lightweight, and notorious for being difficult to detect on a network because it doesn’t rely on standard ports like RDP (3389) or VNC (5900). It runs on port 4899 by default—unless you change it. Instead of a login prompt, the victim sees nothing
The attacker uses a loader (often called ice_setup.exe , ~450KB). Upon execution, the loader checks for active antivirus, disables Windows Firewall via legacy netsh commands, and drops the modified r_server.exe into C:\Windows\System32\Drivers\ .