Rule Library

Sigma Rules

1,701 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionhightest

Guacamole Two Users Sharing Session Anomaly

Detects suspicious session with two users present

Linuxguacamole
TA0006 · Credential AccessT1212 · Exploitation for Credential Access
Florian Roth (Nextron Systems)Fri Jul 03linux
Detectionhightest

Equation Group Indicators

Detects suspicious shell commands used in various Equation Group scripts and tools

Linux
TA0002 · ExecutionG0020 · G0020T1059.004 · Unix Shell
Florian Roth (Nextron Systems)Sun Apr 09linux
Detectionhightest

Buffer Overflow Attempts

Detects buffer overflow attempts in Unix system log files

Linux
T1068 · Exploitation for Privilege EscalationTA0004 · Privilege Escalation
Florian Roth (Nextron Systems)Wed Mar 01linux
Detectionhightest

Commands to Clear or Remove the Syslog - Builtin

Detects specific commands commonly used to remove or empty the syslog

Linux
TA0040 · ImpactT1565.001 · Stored Data Manipulation
Max Altgelt (Nextron Systems)Fri Sep 10linux
Detectionhightest

Code Injection by ld.so Preload

Detects the ld.so preload persistence file. See `man ld.so` for more information.

Linux
TA0005 · Defense EvasionTA0003 · PersistenceTA0004 · Privilege EscalationT1574.006 · Dynamic Linker Hijacking
Christian Burkard (Nextron Systems)Wed May 05linux
Detectionhightest

Potential Suspicious BPF Activity - Linux

Detects the presence of "bpf_probe_write_user" BPF helper-generated warning messages. Which could be a sign of suspicious eBPF activity on the system.

Linux
TA0003 · PersistenceTA0005 · Defense Evasion
Red Canary+1Wed Jan 25linux
Detectionhightest

Privileged User Has Been Created

Detects the addition of a new user to a privileged group such as "root" or "sudo"

Linux
TA0004 · Privilege EscalationTA0003 · PersistenceT1136.001 · Local AccountT1098 · Account Manipulation
Pawel MazurWed Dec 21linux
Detectionhightest

Shellshock Expression

Detects shellshock expressions in log files

Linux
TA0003 · PersistenceT1505.003 · Web Shell
Florian Roth (Nextron Systems)Tue Mar 14linux
Detectionhightest

Linux Command History Tampering

Detects commands that try to clear or tamper with the Linux command history. This technique is used by threat actors in order to evade defenses and execute commands without them being recorded in files such as "bash_history" or "zsh_history".

Linux
TA0005 · Defense EvasionT1070.003 · Clear Command History
Patrick BareissSun Mar 24linux
Detectionhightest

Suspicious Activity in Shell Commands

Detects suspicious shell commands used in various exploit codes (see references)

Linux
TA0002 · ExecutionT1059.004 · Unix Shell
Florian Roth (Nextron Systems)Mon Aug 21linux
Detectionhightest

Suspicious Reverse Shell Command Line

Detects suspicious shell commands or program code that may be executed or used in command line to establish a reverse shell

Linux
TA0002 · ExecutionT1059.004 · Unix Shell
Florian Roth (Nextron Systems)Tue Apr 02linux
Detectionhightest

JexBoss Command Sequence

Detects suspicious command sequence that JexBoss

Linux
TA0002 · ExecutionT1059.004 · Unix Shell
Florian Roth (Nextron Systems)Thu Aug 24linux
Detectionhightest

Symlink Etc Passwd

Detects suspicious command lines that look as if they would create symbolic links to /etc/passwd

Linux
T1204.001 · Malicious LinkTA0002 · Execution
Florian Roth (Nextron Systems)Fri Apr 05linux
Detectionhightest

Suspicious Named Error

Detects suspicious DNS error messages that indicate a fatal or suspicious error that could be caused by exploiting attempts

Linuxsyslog
TA0001 · Initial AccessT1190 · Exploit Public-Facing Application
Florian Roth (Nextron Systems)Tue Feb 20linux
Detectionhighexperimental

Suspicious Filename with Embedded Base64 Commands

Detects files with specially crafted filenames that embed Base64-encoded bash payloads designed to execute when processed by shell scripts. These filenames exploit shell interpretation quirks to trigger hidden commands, a technique observed in VShell malware campaigns.

LinuxFile Event
TA0002 · ExecutionT1059.004 · Unix ShellTA0005 · Defense EvasionT1027 · Obfuscated Files or Information
kostastsaleSat Nov 22linux
Detectionhightest

Triple Cross eBPF Rootkit Default LockFile

Detects the creation of the file "rootlog" which is used by the TripleCross rootkit as a way to check if the backdoor is already running.

LinuxFile Event
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Tue Jul 05linux
Detectionhightest

Triple Cross eBPF Rootkit Default Persistence

Detects the creation of "ebpfbackdoor" files in both "cron.d" and "sudoers.d" directories. Which both are related to the TripleCross persistence method

LinuxFile Event
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceTA0005 · Defense Evasion+1
Nasreddine Bencherchali (Nextron Systems)Tue Jul 05linux
Detectionhighstable

Linux Crypto Mining Pool Connections

Detects process connections to a Monero crypto mining pool

LinuxNetwork Connection
TA0040 · ImpactT1496 · Resource Hijacking
Florian Roth (Nextron Systems)Tue Oct 26linux
Detectionhightest

Communication To LocaltoNet Tunneling Service Initiated - Linux

Detects an executable initiating a network connection to "LocaltoNet" tunneling sub-domains. LocaltoNet is a reverse proxy that enables localhost services to be exposed to the Internet. Attackers have been seen to use this service for command-and-control activities to bypass MFA and perimeter controls.

LinuxNetwork Connection
TA0011 · Command and ControlT1572 · Protocol TunnelingT1090 · ProxyT1102 · Web Service
Andreas Braathen (mnemonic.io)Mon Jun 17linux
Detectionhightest

Communication To Ngrok Tunneling Service - Linux

Detects an executable accessing an ngrok tunneling endpoint, which could be a sign of forbidden exfiltration of data exfiltration by malicious actors

LinuxNetwork Connection
TA0010 · ExfiltrationTA0011 · Command and ControlT1567 · Exfiltration Over Web ServiceT1568.002 · Domain Generation Algorithms+4
Florian Roth (Nextron Systems)Thu Nov 03linux
Detectionhightest

Potentially Suspicious Malware Callback Communication - Linux

Detects programs that connect to known malware callback ports based on threat intelligence reports.

LinuxNetwork Connection
TA0003 · PersistenceTA0011 · Command and ControlT1571 · Non-Standard Port
hasseljFri May 10linux
Detectionhighexperimental

Audit Rules Deleted Via Auditctl

Detects the execution of 'auditctl' with the '-D' command line parameter, which deletes all configured audit rules and watches on Linux systems. This technique is commonly used by attackers to disable audit logging and cover their tracks by removing monitoring capabilities. Removal of audit rules can significantly impair detection of malicious activities on the affected system.

LinuxProcess Creation
TA0005 · Defense EvasionT1562.012 · Disable or Modify Linux Audit System
Mohamed LAKRIFri Oct 17linux
Detectionhighexperimental

Kaspersky Endpoint Security Stopped Via CommandLine - Linux

Detects execution of the Kaspersky init.d stop script on Linux systems either directly or via systemctl. This activity may indicate a manual interruption of the antivirus service by an administrator, or it could be a sign of potential tampering or evasion attempts by malicious actors.

LinuxProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Milad CheraghiSat Oct 18linux
Detectionhightest

Suspicious Invocation of Shell via AWK - Linux

Detects the execution of "awk" or it's sibling commands, to invoke a shell using the system() function. This behavior is commonly associated with attempts to execute arbitrary commands or escalate privileges, potentially leading to unauthorized access or further exploitation.

LinuxProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Li Ling+3Mon Sep 02linux
Detectionhightest

Capsh Shell Invocation - Linux

Detects the use of the "capsh" utility to invoke a shell.

LinuxProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Li Ling+3Mon Sep 02linux
Detectionhightest

Syslog Clearing or Removal Via System Utilities

Detects specific commands commonly used to remove or empty the syslog. Which is a technique often used by attacker as a method to hide their tracks

LinuxProcess Creation
TA0005 · Defense EvasionT1070.002 · Clear Linux or Mac System Logs
Max Altgelt (Nextron Systems)+3Fri Oct 15linux
Detectionhightest

Copy Passwd Or Shadow From TMP Path

Detects when the file "passwd" or "shadow" is copied from tmp path

LinuxProcess Creation
TA0006 · Credential AccessT1552.001 · Credentials In Files
Joseliyo SanchezTue Jan 31linux
Detectionhightest

Linux Crypto Mining Indicators

Detects command line parameters or strings often used by crypto miners

LinuxProcess Creation
TA0040 · ImpactT1496 · Resource Hijacking
Florian Roth (Nextron Systems)Tue Oct 26linux
Detectionhighexperimental

Suspicious Download and Execute Pattern via Curl/Wget

Detects suspicious use of command-line tools such as curl or wget to download remote content - particularly scripts - into temporary directories (e.g., /dev/shm, /tmp), followed by immediate execution, indicating potential malicious activity. This pattern is commonly used by malicious scripts, stagers, or downloaders in fileless or multi-stage Linux attacks.

LinuxProcess Creation
TA0002 · ExecutionT1059.004 · Unix ShellT1203 · Exploitation for Client Execution
Aayush GuptaTue Jun 17linux
Detectionhightest

Shell Invocation via Env Command - Linux

Detects the use of the env command to invoke a shell. This may indicate an attempt to bypass restricted environments, escalate privileges, or execute arbitrary commands.

LinuxProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Li Ling+3Mon Sep 02linux
Detectionhightest

ESXi Admin Permission Assigned To Account Via ESXCLI

Detects execution of the "esxcli" command with the "system" and "permission" flags in order to assign admin permissions to an account.

LinuxProcess Creation
TA0003 · PersistenceTA0002 · ExecutionTA0004 · Privilege Escalationattack.t1059.012+1
Nasreddine Bencherchali (Nextron Systems)Mon Sep 04linux
Detectionhightest

Shell Execution via Find - Linux

Detects the use of the find command to execute a shell. Such behavior may be associated with privilege escalation, unauthorized command execution, or exploitation attempt.

LinuxProcess Creation
TA0007 · DiscoveryT1083 · File and Directory Discovery
Li Ling+3Mon Sep 02linux
Detectionhightest

Shell Execution via Flock - Linux

Detects the use of the "flock" command to execute a shell. Such behavior may be associated with privilege escalation, unauthorized command execution, or to break out from restricted environments.

LinuxProcess Creation
TA0007 · DiscoveryT1083 · File and Directory Discovery
Li Ling+3Mon Sep 02linux
Detectionhightest

Shell Execution GCC - Linux

Detects the use of the "gcc" utility to execute a shell. Such behavior may be associated with privilege escalation, unauthorized command execution, or to break out from restricted environments.

LinuxProcess Creation
TA0007 · DiscoveryT1083 · File and Directory Discovery
Li Ling+3Mon Sep 02linux
Detectionhightest

Shell Execution via Git - Linux

Detects the use of the "git" utility to execute a shell. Such behavior may be associated with privilege escalation, unauthorized command execution, or to break out from restricted environments.

LinuxProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Li Ling+3Mon Sep 02linux
Detectionhightest

Potential GobRAT File Discovery Via Grep

Detects the use of grep to discover specific files created by the GobRAT malware

LinuxProcess Creation
TA0007 · DiscoveryT1082 · System Information Discovery
Joseliyo SanchezFri Jun 02linux
Detectionhightest

Potential Netcat Reverse Shell Execution

Detects execution of netcat with the "-e" flag followed by common shells. This could be a sign of a potential reverse shell setup.

LinuxProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
@d4ns4n_+1Fri Apr 07linux
Detectionhightest

Shell Execution via Nice - Linux

Detects the use of the "nice" utility to execute a shell. Such behavior may be associated with privilege escalation, unauthorized command execution, or to break out from restricted environments.

LinuxProcess Creation
TA0007 · DiscoveryT1083 · File and Directory Discovery
Li Ling+3Mon Sep 02linux
Detectionhightest

Suspicious Nohup Execution

Detects execution of binaries located in potentially suspicious locations via "nohup"

LinuxProcess Creation
TA0002 · Execution
Joseliyo SanchezFri Jun 02linux
Detectionhightest

OMIGOD SCX RunAsProvider ExecuteScript

Rule to detect the use of the SCX RunAsProvider ExecuteScript to execute any UNIX/Linux script using the /bin/sh shell. Script being executed gets created as a temp file in /tmp folder with a scx* prefix. Then it is invoked from the following directory /etc/opt/microsoft/scx/conf/tmpdir/. The file in that directory has the same prefix scx*. SCXcore, started as the Microsoft Operations Manager UNIX/Linux Agent, is now used in a host of products including Microsoft Operations Manager, Microsoft Azure, and Microsoft Operations Management Suite.

LinuxProcess Creation
TA0004 · Privilege EscalationTA0001 · Initial AccessTA0002 · ExecutionT1068 · Exploitation for Privilege Escalation+2
Roberto Rodriguez (Cyb3rWard0g)+2Fri Oct 15linux
Detectionhightest

OMIGOD SCX RunAsProvider ExecuteShellCommand

Rule to detect the use of the SCX RunAsProvider Invoke_ExecuteShellCommand to execute any UNIX/Linux command using the /bin/sh shell. SCXcore, started as the Microsoft Operations Manager UNIX/Linux Agent, is now used in a host of products including Microsoft Operations Manager, Microsoft Azure, and Microsoft Operations Management Suite.

LinuxProcess Creation
TA0004 · Privilege EscalationTA0001 · Initial AccessTA0002 · ExecutionT1068 · Exploitation for Privilege Escalation+2
Roberto Rodriguez (Cyb3rWard0g)+2Fri Oct 15linux
Detectionhightest

Potential Perl Reverse Shell Execution

Detects execution of the perl binary with the "-e" flag and common strings related to potential reverse shell activity

LinuxProcess Creation
TA0002 · Execution
@d4ns4n_+1Fri Apr 07linux
Detectionhightest

Potential PHP Reverse Shell

Detects usage of the PHP CLI with the "-r" flag which allows it to run inline PHP code. The rule looks for calls to the "fsockopen" function which allows the creation of sockets. Attackers often leverage this in combination with functions such as "exec" or "fopen" to initiate a reverse shell connection.

LinuxProcess Creation
TA0002 · Execution
@d4ns4n_Fri Apr 07linux
Detectionhightest

Python Reverse Shell Execution Via PTY And Socket Modules

Detects the execution of python with calls to the socket and pty module in order to connect and spawn a potential reverse shell.

LinuxProcess Creation
TA0002 · Execution
@d4ns4n_+1Mon Apr 24linux
Detectionhightest

Inline Python Execution - Spawn Shell Via OS System Library

Detects execution of inline Python code via the "-c" in order to call the "system" function from the "os" library, and spawn a shell.

LinuxProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Li Ling+3Mon Sep 02linux
Detectionhighexperimental

Shell Execution via Rsync - Linux

Detects the use of the "rsync" utility to execute a shell. Such behavior may be associated with privilege escalation, unauthorized command execution, or to break out from restricted environments.

LinuxProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Li Ling+4Mon Sep 02linux
Detectionhighexperimental

Suspicious Invocation of Shell via Rsync

Detects the execution of a shell as sub process of "rsync" without the expected command line flag "-e" being used, which could be an indication of exploitation as described in CVE-2024-12084. This behavior is commonly associated with attempts to execute arbitrary commands or escalate privileges, potentially leading to unauthorized access or further exploitation.

LinuxProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting InterpreterT1203 · Exploitation for Client Execution
Florian Roth (Nextron Systems)Sat Jan 18linux
Detectionhightest

Shell Invocation Via Ssh - Linux

Detects the use of the "ssh" utility to execute a shell. Such behavior may be associated with privilege escalation, unauthorized command execution, or to break out from restricted environments.

LinuxProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Li Ling+3Thu Aug 29linux