Rule Library

Sigma Rules

139 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

Shell Invocation via Apt - Linux

Detects the use of the "apt" and "apt-get" commands to execute a shell or proxy commands. Such behavior may be associated with privilege escalation, unauthorized command execution, or to break out from restricted environments.

LinuxProcess Creation
TA0007 · DiscoveryT1083 · File and Directory Discovery
Nasreddine Bencherchali (Nextron Systems)Wed Dec 28linux
Detectionlowstable

Scheduled Task/Job At

Detects the use of at/atd which are utilities that are used to schedule tasks. They are often abused by adversaries to maintain persistence or to perform task scheduling for initial or recurring execution of malicious code

LinuxProcess Creation
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1053.002 · At
Ömer Günal+1Tue Oct 06linux
Detectionhighexperimental

Audit Rules Deleted Via Auditctl

Detects the execution of 'auditctl' with the '-D' command line parameter, which deletes all configured audit rules and watches on Linux systems. This technique is commonly used by attackers to disable audit logging and cover their tracks by removing monitoring capabilities. Removal of audit rules can significantly impair detection of malicious activities on the affected system.

LinuxProcess Creation
TA0005 · Defense EvasionT1562.012 · Disable or Modify Linux Audit System
Mohamed LAKRIFri Oct 17linux
Detectionhighexperimental

Kaspersky Endpoint Security Stopped Via CommandLine - Linux

Detects execution of the Kaspersky init.d stop script on Linux systems either directly or via systemctl. This activity may indicate a manual interruption of the antivirus service by an administrator, or it could be a sign of potential tampering or evasion attempts by malicious actors.

LinuxProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Milad CheraghiSat Oct 18linux
Detectionhightest

Suspicious Invocation of Shell via AWK - Linux

Detects the execution of "awk" or it's sibling commands, to invoke a shell using the system() function. This behavior is commonly associated with attempts to execute arbitrary commands or escalate privileges, potentially leading to unauthorized access or further exploitation.

LinuxProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Li Ling+3Mon Sep 02linux
Detectionlowtest

Decode Base64 Encoded Text

Detects usage of base64 utility to decode arbitrary base64-encoded text

LinuxProcess Creation
TA0005 · Defense EvasionT1027 · Obfuscated Files or Information
Daniil Yugoslavskiy+1Mon Oct 19linux
Detectionmediumtest

Linux Base64 Encoded Pipe to Shell

Detects suspicious process command line that uses base64 encoded input for execution with a shell

LinuxProcess Creation
TA0005 · Defense EvasionT1140 · Deobfuscate/Decode Files or Information
Martin MuellerTue Jul 26linux
Detectionmediumtest

Linux Base64 Encoded Shebang In CLI

Detects the presence of a base64 version of the shebang in the commandline, which could indicate a malicious payload about to be decoded

LinuxProcess Creation
TA0005 · Defense EvasionT1140 · Deobfuscate/Decode Files or Information
Nasreddine Bencherchali (Nextron Systems)Thu Sep 15linux
Detectionlowtest

Bash Interactive Shell

Detects execution of the bash shell with the interactive flag "-i".

LinuxProcess Creation
TA0002 · Execution
@d4ns4n_Fri Apr 07linux
Detectionmediumtest

BPFtrace Unsafe Option Usage

Detects the usage of the unsafe bpftrace option

LinuxProcess Creation
TA0002 · ExecutionT1059.004 · Unix Shell
Andreas HunkelerFri Feb 11linux
Detectionmediumtest

Enable BPF Kprobes Tracing

Detects common command used to enable bpf kprobes tracing

LinuxProcess Creation
TA0002 · ExecutionTA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Wed Jan 25linux
Detectionlowtest

Capabilities Discovery - Linux

Detects usage of "getcap" binary. This is often used during recon activity to determine potential binaries that can be abused as GTFOBins or other.

LinuxProcess Creation
TA0007 · DiscoveryT1083 · File and Directory Discovery
Nasreddine Bencherchali (Nextron Systems)Wed Dec 28linux
Detectionhightest

Capsh Shell Invocation - Linux

Detects the use of the "capsh" utility to invoke a shell.

LinuxProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Li Ling+3Mon Sep 02linux
Detectionlowexperimental

Linux Setgid Capability Set on a Binary via Setcap Utility

Detects the use of the 'setcap' utility to set the 'setgid' capability (cap_setgid) on a binary file. This capability allows a non privileged process to make arbitrary manipulations of group IDs (GIDs), including setting its current GID to a value that would otherwise be restricted (i.e. GID 0, the root group). This behavior can be used by adversaries to backdoor a binary in order to escalate privileges again in the future if needed.

LinuxProcess Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionTA0003 · PersistenceT1548 · Abuse Elevation Control Mechanism+1
Luc GénauxSat Jan 24linux
Detectionlowexperimental

Linux Setuid Capability Set on a Binary via Setcap Utility

Detects the use of the 'setcap' utility to set the 'setuid' capability (cap_setuid) on a binary file. This capability allows a non privileged process to make arbitrary manipulations of user IDs (UIDs), including setting its current UID to a value that would otherwise be restricted (i.e. UID 0, the root user). This behavior can be used by adversaries to backdoor a binary in order to escalate privileges again in the future if needed.

LinuxProcess Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionTA0003 · PersistenceT1548 · Abuse Elevation Control Mechanism+1
Luc GénauxSat Jan 24linux
Detectionmediumtest

Remove Immutable File Attribute

Detects usage of the 'chattr' utility to remove immutable file attribute.

LinuxProcess Creation
TA0005 · Defense Evasionattack.t1222.002
Nasreddine Bencherchali (Nextron Systems)Thu Sep 15linux
Detectionlowexperimental

Linux Sudo Chroot Execution

Detects the execution of 'sudo' command with '--chroot' option, which is used to change the root directory for command execution. Attackers may use this technique to evade detection and execute commands in a modified environment. This can be part of a privilege escalation strategy, as it allows the execution of commands with elevated privileges in a controlled environment as seen in CVE-2025-32463. While investigating, look out for unusual or unexpected use of 'sudo --chroot' in conjunction with other commands or scripts such as execution from temporary directories or unusual user accounts.

LinuxProcess Creation
TA0004 · Privilege EscalationT1068 · Exploitation for Privilege Escalation
Swachchhanda Shrawn Poudel (Nextron Systems)Thu Oct 02linux
Detectionmediumstable

Clear Linux Logs

Detects attempts to clear logs on the system. Adversaries may clear system logs to hide evidence of an intrusion

LinuxProcess Creation
TA0005 · Defense EvasionT1070.002 · Clear Linux or Mac System Logs
Ömer Günal+1Wed Oct 07linux
Detectionhightest

Syslog Clearing or Removal Via System Utilities

Detects specific commands commonly used to remove or empty the syslog. Which is a technique often used by attacker as a method to hide their tracks

LinuxProcess Creation
TA0005 · Defense EvasionT1070.002 · Clear Linux or Mac System Logs
Max Altgelt (Nextron Systems)+3Fri Oct 15linux
Detectionlowtest

Clipboard Collection with Xclip Tool

Detects attempts to collect data stored in the clipboard from users with the usage of xclip tool. Xclip has to be installed. Highly recommended using rule on servers, due to high usage of clipboard utilities on user workstations.

LinuxProcess Creation
TA0009 · CollectionT1115 · Clipboard Data
Pawel Mazur+3Fri Oct 15linux
Detectionhightest

Copy Passwd Or Shadow From TMP Path

Detects when the file "passwd" or "shadow" is copied from tmp path

LinuxProcess Creation
TA0006 · Credential AccessT1552.001 · Credentials In Files
Joseliyo SanchezTue Jan 31linux
Detectionlowtest

Crontab Enumeration

Detects usage of crontab to list the tasks of the user

LinuxProcess Creation
TA0007 · DiscoveryT1007 · System Service Discovery
Joseliyo SanchezFri Jun 02linux
Detectionmediumtest

Remove Scheduled Cron Task/Job

Detects usage of the 'crontab' utility to remove the current crontab. This is a common occurrence where cryptocurrency miners compete against each other by removing traces of other miners to hijack the maximum amount of resources possible

LinuxProcess Creation
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Thu Sep 15linux
Detectionhightest

Linux Crypto Mining Indicators

Detects command line parameters or strings often used by crypto miners

LinuxProcess Creation
TA0040 · ImpactT1496 · Resource Hijacking
Florian Roth (Nextron Systems)Tue Oct 26linux
Detectionlowtest

Curl Usage on Linux

Detects a curl process start on linux, which indicates a file download from a remote location or a simple web request to a remote server

LinuxProcess Creation
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
Nasreddine Bencherchali (Nextron Systems)Thu Sep 15linux
Detectionhighexperimental

Suspicious Download and Execute Pattern via Curl/Wget

Detects suspicious use of command-line tools such as curl or wget to download remote content - particularly scripts - into temporary directories (e.g., /dev/shm, /tmp), followed by immediate execution, indicating potential malicious activity. This pattern is commonly used by malicious scripts, stagers, or downloaders in fileless or multi-stage Linux attacks.

LinuxProcess Creation
TA0002 · ExecutionT1059.004 · Unix ShellT1203 · Exploitation for Client Execution
Aayush GuptaTue Jun 17linux
Detectionlowtest

DD File Overwrite

Detects potential overwriting and deletion of a file using DD.

LinuxProcess Creation
TA0040 · ImpactT1485 · Data Destruction
Roberto Rodriguez (Cyb3rWard0g)+2Fri Oct 15linux
Detectionmediumtest

Potential Linux Process Code Injection Via DD Utility

Detects the injection of code by overwriting the memory map of a Linux process using the "dd" Linux command.

LinuxProcess Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionT1055.009 · Proc Memory
Joseph KamauFri Dec 01linux
Detectionmediumtest

Ufw Force Stop Using Ufw-Init

Detects attempts to force stop the ufw using ufw-init

LinuxProcess Creation
TA0005 · Defense EvasionT1562.004 · Disable or Modify System Firewall
Joseliyo SanchezWed Jan 18linux
Detectionlowstable

Linux Doas Tool Execution

Detects the doas tool execution in linux host platform. This utility tool allow standard users to perform tasks as root, the same way sudo does.

LinuxProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1548 · Abuse Elevation Control Mechanism
Sittikorn S+1Thu Jan 20linux
Detectionhightest

Shell Invocation via Env Command - Linux

Detects the use of the env command to invoke a shell. This may indicate an attempt to bypass restricted environments, escalate privileges, or execute arbitrary commands.

LinuxProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Li Ling+3Mon Sep 02linux
Detectionmediumtest

ESXi Network Configuration Discovery Via ESXCLI

Detects execution of the "esxcli" command with the "network" flag in order to retrieve information about the network configuration.

LinuxProcess Creation
TA0007 · DiscoveryTA0002 · ExecutionT1033 · System Owner/User DiscoveryT1007 · System Service Discovery+1
Cedric MaurugeonMon Sep 04linux
Detectionhightest

ESXi Admin Permission Assigned To Account Via ESXCLI

Detects execution of the "esxcli" command with the "system" and "permission" flags in order to assign admin permissions to an account.

LinuxProcess Creation
TA0003 · PersistenceTA0002 · ExecutionTA0004 · Privilege Escalationattack.t1059.012+1
Nasreddine Bencherchali (Nextron Systems)Mon Sep 04linux
Detectionmediumtest

ESXi Storage Information Discovery Via ESXCLI

Detects execution of the "esxcli" command with the "storage" flag in order to retrieve information about the storage status and other related information. Seen used by malware such as DarkSide and LockBit.

LinuxProcess Creation
TA0007 · DiscoveryTA0002 · ExecutionT1033 · System Owner/User DiscoveryT1007 · System Service Discovery+1
Nasreddine Bencherchali (Nextron Systems)+1Mon Sep 04linux
Detectionmediumtest

ESXi Syslog Configuration Change Via ESXCLI

Detects changes to the ESXi syslog configuration via "esxcli"

LinuxProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1562.001 · Disable or Modify ToolsT1562.003 · Impair Command History Logging+1
Cedric MaurugeonMon Sep 04linux
Detectionmediumtest

ESXi System Information Discovery Via ESXCLI

Detects execution of the "esxcli" command with the "system" flag in order to retrieve information about the different component of the system. Such as accounts, modules, NTP, etc.

LinuxProcess Creation
TA0007 · DiscoveryTA0002 · ExecutionT1033 · System Owner/User DiscoveryT1007 · System Service Discovery+1
Cedric MaurugeonMon Sep 04linux
Detectionmediumtest

ESXi Account Creation Via ESXCLI

Detects user account creation on ESXi system via esxcli

LinuxProcess Creation
TA0003 · PersistenceTA0002 · ExecutionT1136 · Create Accountattack.t1059.012
Cedric MaurugeonTue Aug 22linux
Detectionmediumtest

ESXi VM List Discovery Via ESXCLI

Detects execution of the "esxcli" command with the "vm" flag in order to retrieve information about the installed VMs.

LinuxProcess Creation
TA0007 · DiscoveryTA0002 · ExecutionT1033 · System Owner/User DiscoveryT1007 · System Service Discovery+1
Cedric MaurugeonMon Sep 04linux
Detectionmediumtest

ESXi VM Kill Via ESXCLI

Detects execution of the "esxcli" command with the "vm" and "kill" flag in order to kill/shutdown a specific VM.

LinuxProcess Creation
TA0002 · ExecutionTA0040 · Impactattack.t1059.012T1529 · System Shutdown/Reboot
Nasreddine Bencherchali (Nextron Systems)+1Mon Sep 04linux
Detectionmediumtest

ESXi VSAN Information Discovery Via ESXCLI

Detects execution of the "esxcli" command with the "vsan" flag in order to retrieve information about virtual storage. Seen used by malware such as DarkSide.

LinuxProcess Creation
TA0007 · DiscoveryTA0002 · ExecutionT1033 · System Owner/User DiscoveryT1007 · System Service Discovery+1
Nasreddine Bencherchali (Nextron Systems)+1Mon Sep 04linux
Detectioninformationaltest

File and Directory Discovery - Linux

Detects usage of system utilities such as "find", "tree", "findmnt", etc, to discover files, directories and network shares.

LinuxProcess Creation
TA0007 · DiscoveryT1083 · File and Directory Discovery
Daniil Yugoslavskiy+2Mon Oct 19linux
Detectioninformationalstable

File Deletion

Detects file deletion using "rm", "shred" or "unlink" commands which are used often by adversaries to delete files left behind by the actions of their intrusion activity

LinuxProcess Creation
TA0005 · Defense EvasionT1070.004 · File Deletion
Ömer Günal+1Wed Oct 07linux
Detectionhightest

Shell Execution via Find - Linux

Detects the use of the find command to execute a shell. Such behavior may be associated with privilege escalation, unauthorized command execution, or exploitation attempt.

LinuxProcess Creation
TA0007 · DiscoveryT1083 · File and Directory Discovery
Li Ling+3Mon Sep 02linux
Detectionhightest

Shell Execution via Flock - Linux

Detects the use of the "flock" command to execute a shell. Such behavior may be associated with privilege escalation, unauthorized command execution, or to break out from restricted environments.

LinuxProcess Creation
TA0007 · DiscoveryT1083 · File and Directory Discovery
Li Ling+3Mon Sep 02linux
Detectionhightest

Shell Execution GCC - Linux

Detects the use of the "gcc" utility to execute a shell. Such behavior may be associated with privilege escalation, unauthorized command execution, or to break out from restricted environments.

LinuxProcess Creation
TA0007 · DiscoveryT1083 · File and Directory Discovery
Li Ling+3Mon Sep 02linux
Detectionhightest

Shell Execution via Git - Linux

Detects the use of the "git" utility to execute a shell. Such behavior may be associated with privilege escalation, unauthorized command execution, or to break out from restricted environments.

LinuxProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Li Ling+3Mon Sep 02linux
Detectionlowtest

OS Architecture Discovery Via Grep

Detects the use of grep to identify information about the operating system architecture. Often combined beforehand with the execution of "uname" or "cat /proc/cpuinfo"

LinuxProcess Creation
TA0007 · DiscoveryT1082 · System Information Discovery
Joseliyo SanchezFri Jun 02linux
Detectionmediumtest

Group Has Been Deleted Via Groupdel

Detects execution of the "groupdel" binary. Which is used to delete a group. This is sometimes abused by threat actors in order to cover their tracks

LinuxProcess Creation
TA0040 · ImpactT1531 · Account Access Removal
Tuan Le (NCSGroup)Mon Dec 26linux