Detectionmediumtest
Suspicious Commands Linux
Detects relevant commands often related to malware or hacking activity
Convert In Phoenix Studio
Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.
Launch
Florian Roth (Nextron Systems)Created Tue Dec 12Updated Wed Oct 051543ae20-cbdf-4ec1-8d12-7664d667a825linux
Log Source
Linuxauditd
ProductLinux← raw: linux
Serviceauditd← raw: auditd
Detection Logic
Detection Logic4 selectors
detection:
cmd1:
type: 'EXECVE'
a0: 'chmod'
a1: 777
cmd2:
type: 'EXECVE'
a0: 'chmod'
a1: 'u+s'
cmd3:
type: 'EXECVE'
a0: 'cp'
a1: '/bin/ksh'
cmd4:
type: 'EXECVE'
a0: 'cp'
a1: '/bin/sh'
condition: 1 of cmd*False Positives
Admin activity
References
1
Resolving title…
Internal Research - mostly derived from exploit code including code in MSFMITRE ATT&CK
Tactics
Sub-techniques
Rule Metadata
Rule ID
1543ae20-cbdf-4ec1-8d12-7664d667a825
Status
test
Level
medium
Type
Detection
Created
Tue Dec 12
Modified
Wed Oct 05
Path
rules/linux/auditd/execve/lnx_auditd_susp_cmds.yml
Raw Tags
attack.executionattack.t1059.004