Rule Library

Sigma Rules

1,774 rules found for "Nextron Systems"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

ESXi VSAN Information Discovery Via ESXCLI

Detects execution of the "esxcli" command with the "vsan" flag in order to retrieve information about virtual storage. Seen used by malware such as DarkSide.

LinuxProcess Creation
TA0007 · DiscoveryTA0002 · ExecutionT1033 · System Owner/User DiscoveryT1007 · System Service Discovery+1
Nasreddine Bencherchali (Nextron Systems)+1Mon Sep 04linux
Detectionmediumtest

Suspicious Package Installed - Linux

Detects installation of suspicious packages using system installation utilities

LinuxProcess Creation
TA0005 · Defense EvasionT1553.004 · Install Root Certificate
Nasreddine Bencherchali (Nextron Systems)Tue Jan 03linux
Detectionlowtest

Named Pipe Created Via Mkfifo

Detects the creation of a new named pipe using the "mkfifo" utility

LinuxProcess Creation
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Fri Jun 16linux
Detectionmediumtest

Potentially Suspicious Named Pipe Created Via Mkfifo

Detects the creation of a new named pipe using the "mkfifo" utility in a potentially suspicious location

LinuxProcess Creation
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Fri Jun 16linux
Detectionhightest

Potential Netcat Reverse Shell Execution

Detects execution of netcat with the "-e" flag followed by common shells. This could be a sign of a potential reverse shell setup.

LinuxProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
@d4ns4n_+1Fri Apr 07linux
Detectionhightest

Potential Perl Reverse Shell Execution

Detects execution of the perl binary with the "-e" flag and common strings related to potential reverse shell activity

LinuxProcess Creation
TA0002 · Execution
@d4ns4n_+1Fri Apr 07linux
Detectionmediumexperimental

PUA - TruffleHog Execution - Linux

Detects execution of TruffleHog, a tool used to search for secrets in different platforms like Git, Jira, Slack, SharePoint, etc. that could be used maliciously. While it is a legitimate tool, intended for use in CI pipelines and security assessments, It was observed in the Shai-Hulud malware campaign targeting npm packages to steal sensitive information.

LinuxProcess Creation
TA0007 · DiscoveryTA0006 · Credential AccessT1083 · File and Directory DiscoveryT1552.001 · Credentials In Files
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Sep 24linux
Detectionmediumtest

Python Spawning Pretty TTY Via PTY Module

Detects a python process calling to the PTY module in order to spawn a pretty tty which could be indicative of potential reverse shell activity.

LinuxProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Nextron SystemsFri Jun 03linux
Detectionhightest

Python Reverse Shell Execution Via PTY And Socket Modules

Detects the execution of python with calls to the socket and pty module in order to connect and spawn a potential reverse shell.

LinuxProcess Creation
TA0002 · Execution
@d4ns4n_+1Mon Apr 24linux
Detectionlowtest

Linux Package Uninstall

Detects linux package removal using builtin tools such as "yum", "apt", "apt-get" or "dpkg".

LinuxProcess Creation
TA0005 · Defense EvasionT1070 · Indicator Removal
Tuan Le (NCSGroup)+1Thu Mar 09linux
Detectionhighexperimental

Shell Execution via Rsync - Linux

Detects the use of the "rsync" utility to execute a shell. Such behavior may be associated with privilege escalation, unauthorized command execution, or to break out from restricted environments.

LinuxProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Li Ling+4Mon Sep 02linux
Detectionhighexperimental

Suspicious Invocation of Shell via Rsync

Detects the execution of a shell as sub process of "rsync" without the expected command line flag "-e" being used, which could be an indication of exploitation as described in CVE-2024-12084. This behavior is commonly associated with attempts to execute arbitrary commands or escalate privileges, potentially leading to unauthorized access or further exploitation.

LinuxProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting InterpreterT1203 · Exploitation for Client Execution
Florian Roth (Nextron Systems)Sat Jan 18linux
Detectionmediumtest

Disable Or Stop Services

Detects the usage of utilities such as 'systemctl', 'service'...etc to stop or disable tools and services

LinuxProcess Creation
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Thu Sep 15linux
Detectionmediumtest

Suspicious Curl File Upload - Linux

Detects a suspicious curl process start the adds a file to a web request

LinuxProcess Creation
TA0010 · ExfiltrationTA0011 · Command and ControlT1567 · Exfiltration Over Web ServiceT1105 · Ingress Tool Transfer
Nasreddine Bencherchali (Nextron Systems)+1Thu Sep 15linux
Detectionmediumtest

Suspicious Curl Change User Agents - Linux

Detects a suspicious curl process start on linux with set useragent options

LinuxProcess Creation
TA0011 · Command and ControlT1071.001 · Web Protocols
Nasreddine Bencherchali (Nextron Systems)Thu Sep 15linux
Detectionmediumtest

Potential Discovery Activity Using Find - Linux

Detects usage of "find" binary in a suspicious manner to perform discovery

LinuxProcess Creation
TA0007 · DiscoveryT1083 · File and Directory Discovery
Nasreddine Bencherchali (Nextron Systems)Wed Dec 28linux
Detectionmediumtest

Suspicious Git Clone - Linux

Detects execution of "git" in order to clone a remote repository that contain suspicious keywords which might be suspicious

LinuxProcess Creation
TA0043 · Reconnaissanceattack.t1593.003
Nasreddine Bencherchali (Nextron Systems)Tue Jan 03linux
Detectionhightest

History File Deletion

Detects events in which a history file gets deleted, e.g. the ~/bash_history to remove traces of malicious activity

LinuxProcess Creation
TA0040 · ImpactT1565.001 · Stored Data Manipulation
Florian Roth (Nextron Systems)Mon Jun 20linux
Detectionmediumtest

Print History File Contents

Detects events in which someone prints the contents of history files to the commandline or redirects it to a file for reconnaissance

LinuxProcess Creation
TA0043 · ReconnaissanceT1592.004 · Client Configurations
Florian Roth (Nextron Systems)Mon Jun 20linux
Detectionhightest

Linux HackTool Execution

Detects known hacktool execution based on image name.

LinuxProcess Creation
TA0002 · ExecutionTA0042 · Resource DevelopmentT1587 · Develop Capabilities
Nasreddine Bencherchali (Nextron Systems)+1Tue Jan 03linux
Detectionmediumtest

Interactive Bash Suspicious Children

Detects suspicious interactive bash as a parent to rather uncommon child processes

LinuxProcess Creation
TA0002 · ExecutionTA0005 · Defense EvasionT1059.004 · Unix ShellT1036 · Masquerading
Florian Roth (Nextron Systems)Mon Mar 14linux
Detectionhightest

Suspicious Java Children Processes

Detects java process spawning suspicious children

LinuxProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Nasreddine Bencherchali (Nextron Systems)Fri Jun 03linux
Detectionmediumtest

Linux Shell Pipe to Shell

Detects suspicious process command line that starts with a shell that executes something and finally gets piped into another shell

LinuxProcess Creation
TA0005 · Defense EvasionT1140 · Deobfuscate/Decode Files or Information
Florian Roth (Nextron Systems)Mon Mar 14linux
Detectionmediumtest

Access of Sudoers File Content

Detects the execution of a text-based file access or inspection utilities to read the content of /etc/sudoers in order to potentially list all users that have sudo rights.

LinuxProcess Creation
TA0043 · ReconnaissanceT1592.004 · Client Configurations
Florian Roth (Nextron Systems)Mon Jun 20linux
Detectionhightest

Linux Recon Indicators

Detects events with patterns found in commands used for reconnaissance on linux systems

LinuxProcess Creation
TA0043 · ReconnaissanceT1592.004 · Client ConfigurationsTA0006 · Credential AccessT1552.001 · Credentials In Files
Florian Roth (Nextron Systems)Mon Jun 20linux
Detectionhighexperimental

Script Interpreter Spawning Credential Scanner - Linux

Detects a script interpreter process (like node.js or bun) spawning a known credential scanning tool (e.g., trufflehog, gitleaks). This behavior is indicative of an attempt to find and steal secrets, as seen in the "Shai-Hulud: The Second Coming" campaign.

LinuxProcess Creation
TA0006 · Credential AccessT1552 · Unsecured CredentialsTA0002 · ExecutionTA0009 · Collection+2
Swachchhanda Shrawan Poudel (Nextron Systems)Tue Nov 25linux
Detectionhighexperimental

Mask System Power Settings Via Systemctl

Detects the use of systemctl mask to disable system power management targets such as suspend, hibernate, or hybrid sleep. Adversaries may mask these targets to prevent a system from entering sleep or shutdown states, ensuring their malicious processes remain active and uninterrupted. This behavior can be associated with persistence or defense evasion, as it impairs normal system power operations to maintain long-term access or avoid termination of malicious activity.

LinuxProcess Creation
TA0003 · PersistenceTA0040 · ImpactT1653 · Power Settings
Milad Cheraghi+1Fri Oct 17linux
Detectionhightest

Triple Cross eBPF Rootkit Execve Hijack

Detects execution of a the file "execve_hijack" which is used by the Triple Cross rootkit as a way to elevate privileges

LinuxProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege Escalation
Nasreddine Bencherchali (Nextron Systems)Tue Jul 05linux
Detectionhightest

Triple Cross eBPF Rootkit Install Commands

Detects default install commands of the Triple Cross eBPF rootkit based on the "deployer.sh" script

LinuxProcess Creation
TA0005 · Defense EvasionT1014 · Rootkit
Nasreddine Bencherchali (Nextron Systems)Tue Jul 05linux
Detectionhightest

Vim GTFOBin Abuse - Linux

Detects the use of "vim" and it's siblings commands to execute a shell or proxy commands. Such behavior may be associated with privilege escalation, unauthorized command execution, or to break out from restricted environments.

LinuxProcess Creation
TA0007 · DiscoveryT1083 · File and Directory Discovery
Nasreddine Bencherchali (Nextron Systems)Wed Dec 28linux
Detectionhightest

Linux Webshell Indicators

Detects suspicious sub processes of web server processes

LinuxProcess Creation
TA0003 · PersistenceT1505.003 · Web Shell
Florian Roth (Nextron Systems)+1Fri Oct 15linux
Detectionmediumtest

Credentials from Password Stores - Keychain

Detects passwords dumps from Keychain

macOSProcess Creation
TA0006 · Credential AccessT1555.001 · Keychain
Tim Ismilyaev+2Mon Oct 19macos
Detectionmediumtest

JAMF MDM Potential Suspicious Child Process

Detects potential suspicious child processes of "jamf". Could be a sign of potential abuse of Jamf as a C2 server as seen by Typhon MythicAgent.

macOSProcess Creation
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Tue Aug 22macos
Detectionmediumtest

Potential Discovery Activity Using Find - MacOS

Detects usage of "find" binary in a suspicious manner to perform discovery

macOSProcess Creation
TA0007 · DiscoveryT1083 · File and Directory Discovery
Nasreddine Bencherchali (Nextron Systems)Wed Dec 28macos
Detectionhightest

DNS Query to External Service Interaction Domains

Detects suspicious DNS queries to external service interaction domains often used for out-of-band interactions after successful RCE

dns
TA0001 · Initial AccessT1190 · Exploit Public-Facing ApplicationTA0043 · ReconnaissanceT1595.002 · Vulnerability Scanning
Florian Roth (Nextron Systems)+1Tue Jun 07network
Detectioncriticaltest

Cobalt Strike DNS Beaconing

Detects suspicious DNS queries known from Cobalt Strike beacons

dns
TA0011 · Command and ControlT1071.004 · DNS
Florian Roth (Nextron Systems)Thu May 10network
Detectionhighstable

Monero Crypto Coin Mining Pool Lookup

Detects suspicious DNS queries to Monero mining pools

dns
TA0040 · ImpactT1496 · Resource HijackingTA0010 · ExfiltrationT1567 · Exfiltration Over Web Service
Florian Roth (Nextron Systems)Sun Oct 24network
Detectionmediumtest

Suspicious DNS Query with B64 Encoded String

Detects suspicious DNS queries using base64 encoding

dns
TA0010 · ExfiltrationT1048.003 · Exfiltration Over Unencrypted Non-C2 ProtocolTA0011 · Command and ControlT1071.004 · DNS
Florian Roth (Nextron Systems)Thu May 10network
Detectionmediumtest

Telegram Bot API Request

Detects suspicious DNS queries to api.telegram.org used by Telegram Bots of any kind

dns
TA0011 · Command and ControlT1102.002 · Bidirectional Communication
Florian Roth (Nextron Systems)Tue Jun 05network
Detectionhighexperimental

Suspicious DNS Query Indicating Kerberos Coercion via DNS Object SPN Spoofing - Network

Detects DNS queries containing patterns associated with Kerberos coercion attacks via DNS object spoofing. The pattern "1UWhRCAAAAA..BAAAA" is a base64-encoded signature that corresponds to a marshaled CREDENTIAL_TARGET_INFORMATION structure. Attackers can use this technique to coerce authentication from victim systems to attacker-controlled hosts. It is one of the strong indicators of a Kerberos coercion attack, where adversaries manipulate DNS records to spoof Service Principal Names (SPNs) and redirect authentication requests like CVE-2025-33073.

Zeek (Bro)dns
TA0009 · CollectionTA0006 · Credential AccessTA0003 · PersistenceTA0004 · Privilege Escalation+2
Swachchhanda Shrawan Poudel (Nextron Systems)Fri Jun 20network
Detectionhightest

Apache Segmentation Fault

Detects a segmentation fault error message caused by a crashing apache worker process

apache
TA0040 · ImpactT1499.004 · Application or System Exploitation
Florian Roth (Nextron Systems)Tue Feb 28web
Detectionmediumtest

Apache Threading Error

Detects an issue in apache logs that reports threading related errors

apache
TA0001 · Initial AccessTA0008 · Lateral MovementT1190 · Exploit Public-Facing ApplicationT1210 · Exploitation of Remote Services
Florian Roth (Nextron Systems)Tue Jan 22web
Detectionhightest

Nginx Core Dump

Detects a core dump of a crashing Nginx worker process, which could be a signal of a serious problem or exploitation attempts.

nginx
TA0040 · ImpactT1499.004 · Application or System Exploitation
Florian Roth (Nextron Systems)Mon May 31web
Detectionhightest

Windows WebDAV User Agent

Detects WebDav DownloadCradle

Proxy Log
TA0011 · Command and ControlT1071.001 · Web Protocols
Florian Roth (Nextron Systems)Fri Apr 06web
Detectionmediumtest

Download from Suspicious Dyndns Hosts

Detects download of certain file types from hosts with dynamic DNS names (selected list)

Proxy Log
TA0005 · Defense EvasionTA0011 · Command and ControlT1105 · Ingress Tool TransferT1568 · Dynamic Resolution
Florian Roth (Nextron Systems)Wed Nov 08web
Detectionlowtest

Download From Suspicious TLD - Blacklist

Detects download of certain file types from hosts in suspicious TLDs

Proxy Log
TA0001 · Initial AccessT1566 · PhishingTA0002 · ExecutionT1203 · Exploitation for Client Execution+1
Florian Roth (Nextron Systems)Tue Nov 07web
Detectionlowtest

Download From Suspicious TLD - Whitelist

Detects executable downloads from suspicious remote systems

Proxy Log
TA0001 · Initial AccessT1566 · PhishingTA0002 · ExecutionT1203 · Exploitation for Client Execution+1
Florian Roth (Nextron Systems)Mon Mar 13web
Detectionmediumtest

F5 BIG-IP iControl Rest API Command Execution - Proxy

Detects POST requests to the F5 BIG-IP iControl Rest API "bash" endpoint, which allows the execution of commands on the BIG-IP

Proxy Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Application
Nasreddine Bencherchali (Nextron Systems)+1Wed Nov 08web