Rule Library

Sigma Rules

1,585 rules found for "defense-evasion"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

Linux Shell Pipe to Shell

Detects suspicious process command line that starts with a shell that executes something and finally gets piped into another shell

LinuxProcess Creation
TA0005 · Defense EvasionT1140 · Deobfuscate/Decode Files or Information
Florian Roth (Nextron Systems)Mon Mar 14linux
Detectionhighexperimental

Mask System Power Settings Via Systemctl

Detects the use of systemctl mask to disable system power management targets such as suspend, hibernate, or hybrid sleep. Adversaries may mask these targets to prevent a system from entering sleep or shutdown states, ensuring their malicious processes remain active and uninterrupted. This behavior can be associated with persistence or defense evasion, as it impairs normal system power operations to maintain long-term access or avoid termination of malicious activity.

LinuxProcess Creation
TA0003 · PersistenceTA0040 · ImpactT1653 · Power Settings
Milad Cheraghi+1Fri Oct 17linux
Detectionmediumtest

Touch Suspicious Service File

Detects usage of the "touch" process in service file.

LinuxProcess Creation
TA0005 · Defense EvasionT1070.006 · Timestomp
Joseliyo SanchezWed Jan 11linux
Detectionhightest

Triple Cross eBPF Rootkit Execve Hijack

Detects execution of a the file "execve_hijack" which is used by the Triple Cross rootkit as a way to elevate privileges

LinuxProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege Escalation
Nasreddine Bencherchali (Nextron Systems)Tue Jul 05linux
Detectionhightest

Triple Cross eBPF Rootkit Install Commands

Detects default install commands of the Triple Cross eBPF rootkit based on the "deployer.sh" script

LinuxProcess Creation
TA0005 · Defense EvasionT1014 · Rootkit
Nasreddine Bencherchali (Nextron Systems)Tue Jul 05linux
Detectionlowtest

Decode Base64 Encoded Text -MacOs

Detects usage of base64 utility to decode arbitrary base64-encoded text

macOSProcess Creation
TA0005 · Defense EvasionT1027 · Obfuscated Files or Information
Daniil Yugoslavskiy+1Mon Oct 19macos
Detectionhightest

Binary Padding - MacOS

Adversaries may use binary padding to add junk data and change the on-disk representation of malware. This rule detect using dd and truncate to add a junk data to file.

macOSProcess Creation
TA0005 · Defense EvasionT1027.001 · Binary Padding
Igor Fits+2Mon Oct 19macos
Detectionmediumtest

File Time Attribute Change

Detect file time attribute change to hide new or changes to existing files

macOSProcess Creation
TA0005 · Defense EvasionT1070.006 · Timestomp
Igor Fits+2Mon Oct 19macos
Detectionmediumtest

Hidden Flag Set On File/Directory Via Chflags - MacOS

Detects the execution of the "chflags" utility with the "hidden" flag, in order to hide files on MacOS. When a file or directory has this hidden flag set, it becomes invisible to the default file listing commands and in graphical file browsers.

macOSProcess Creation
TA0005 · Defense EvasionTA0006 · Credential AccessTA0011 · Command and ControlT1218 · System Binary Proxy Execution+3
Omar KhaledWed Aug 21macos
Detectionmediumtest

Indicator Removal on Host - Clear Mac System Logs

Detects deletion of local audit logs

macOSProcess Creation
TA0005 · Defense EvasionT1070.002 · Clear Linux or Mac System Logs
remotephone+1Sun Oct 11macos
Detectionmediumtest

Hidden User Creation

Detects creation of a hidden user account on macOS (UserID < 500) or with IsHidden option

macOSProcess Creation
TA0005 · Defense EvasionT1564.002 · Hidden Users
Daniil Yugoslavskiy+1Sat Oct 10macos
Detectionmediumtest

Disable Security Tools

Detects disabling security tools

macOSProcess Creation
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Daniil Yugoslavskiy+1Mon Oct 19macos
Detectionmediumtest

User Added To Admin Group Via Dscl

Detects attempts to create and add an account to the admin group via "dscl"

macOSProcess Creation
TA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial AccessTA0004 · Privilege Escalation+1
Sohan G (D4rkCiph3r)Sun Mar 19macos
Detectionmediumtest

User Added To Admin Group Via DseditGroup

Detects attempts to create and/or add an account to the admin group, thus granting admin privileges.

macOSProcess Creation
TA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial AccessTA0004 · Privilege Escalation+1
Sohan G (D4rkCiph3r)Tue Aug 22macos
Detectionmediumtest

Root Account Enable Via Dsenableroot

Detects attempts to enable the root account via "dsenableroot"

macOSProcess Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionT1078 · Valid AccountsT1078.001 · Default Accounts+3
Sohan G (D4rkCiph3r)Tue Aug 22macos
Detectionmediumtest

File Download Via Nscurl - MacOS

Detects the execution of the nscurl utility in order to download files.

macOSProcess Creation
TA0005 · Defense EvasionTA0011 · Command and ControlT1105 · Ingress Tool Transfer
Daniel CortezTue Jun 04macos
Detectionmediumtest

Payload Decoded and Decrypted via Built-in Utilities

Detects when a built-in utility is used to decode and decrypt a payload after a macOS disk image (DMG) is executed. Malware authors may attempt to evade detection and trick users into executing malicious code by encoding and encrypting their payload and placing it in a disk image file. This behavior is consistent with adware or malware families such as Bundlore and Shlayer.

macOSProcess Creation
T1059 · Command and Scripting InterpreterT1204 · User ExecutionTA0002 · ExecutionT1140 · Deobfuscate/Decode Files or Information+3
Tim Rauch+1Mon Oct 17macos
Detectionhighexperimental

Remote Access Tool - Renamed MeshAgent Execution - MacOS

Detects the execution of a renamed instance of the Remote Monitoring and Management (RMM) tool, MeshAgent. RMM tools such as MeshAgent are commonly utilized by IT administrators for legitimate remote support and system management. However, malicious actors may exploit these tools by renaming them to bypass detection mechanisms, enabling unauthorized access and control over compromised systems.

macOSProcess Creation
TA0011 · Command and ControlTA0005 · Defense Evasionattack.t1219.002T1036.003 · Rename System Utilities
Norbert Jaśniewicz (AlphaSOC)Mon May 19macos
Detectionlowtest

Space After Filename - macOS

Detects attempts to masquerade as legitimate files by adding a space to the end of the filename.

macOSProcess Creation
TA0005 · Defense EvasionT1036.006 · Space after Filename
remotephoneSat Nov 20macos
Detectionmediumtest

Suspicious Execution via macOS Script Editor

Detects when the macOS Script Editor utility spawns an unusual child process.

macOSProcess Creation
T1566 · PhishingT1566.002 · Spearphishing LinkTA0001 · Initial AccessT1059 · Command and Scripting Interpreter+7
Tim Rauch+1Fri Oct 21macos
Detectionmediumtest

User Added To Admin Group Via Sysadminctl

Detects attempts to create and add an account to the admin group via "sysadminctl"

macOSProcess Creation
TA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial AccessTA0004 · Privilege Escalation+1
Sohan G (D4rkCiph3r)Sun Mar 19macos
Detectionlowtest

Guest Account Enabled Via Sysadminctl

Detects attempts to enable the guest account using the sysadminctl utility

macOSProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial Access+2
Sohan G (D4rkCiph3r)Sat Feb 18macos
Detectionmediumtest

System Information Discovery Via Sysctl - MacOS

Detects the execution of "sysctl" with specific arguments that have been used by threat actors and malware. It provides system hardware information. This process is primarily used to detect and avoid virtualization and analysis environments.

macOSProcess Creation
TA0005 · Defense EvasionT1497.001 · System ChecksTA0007 · DiscoveryT1082 · System Information Discovery
Pratinav ChandraMon May 27macos
Detectionmediumtest

System Information Discovery Using System_Profiler

Detects the execution of "system_profiler" with specific "Data Types" that have been seen being used by threat actors and malware. It provides system hardware and software configuration information. This process is primarily used for system information discovery. However, "system_profiler" can also be used to determine if virtualization software is being run for defense evasion purposes.

macOSProcess Creation
TA0007 · DiscoveryTA0005 · Defense EvasionT1082 · System Information DiscoveryT1497.001 · System Checks
Stephen Lincoln (AttackIQ)Tue Jan 02macos
Detectionhightest

Potential Base64 Decoded From Images

Detects the use of tail to extract bytes at an offset from an image and then decode the base64 value to create a new file with the decoded content. The detected execution is a bash one-liner.

macOSProcess Creation
TA0005 · Defense EvasionT1140 · Deobfuscate/Decode Files or Information
Joseliyo SanchezWed Dec 20macos
Detectionlowtest

Gatekeeper Bypass via Xattr

Detects macOS Gatekeeper bypass via xattr utility

macOSProcess Creation
TA0005 · Defense EvasionT1553.001 · Gatekeeper Bypass
Daniil Yugoslavskiy+1Mon Oct 19macos
Detectionhightest

Cisco Clear Logs

Clear command history in network OS which is used for defense evasion

Ciscoaaa
TA0005 · Defense EvasionT1070.003 · Clear Command History
Austin ClarkMon Aug 12network
Detectionhightest

Cisco Crypto Commands

Show when private keys are being exported from the device, or when new certificates are installed

Ciscoaaa
TA0006 · Credential AccessTA0005 · Defense EvasionT1553.004 · Install Root CertificateT1552.004 · Private Keys
Austin ClarkMon Aug 12network
Detectionhightest

Cisco Disabling Logging

Turn off logging locally or remote

Ciscoaaa
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Austin ClarkSun Aug 11network
Detectionmediumtest

Cisco File Deletion

See what files are being deleted from flash file systems

Ciscoaaa
TA0005 · Defense EvasionTA0040 · ImpactT1070.004 · File DeletionT1561.001 · Disk Content Wipe+1
Austin ClarkMon Aug 12network
Detectionlowtest

Cisco BGP Authentication Failures

Detects BGP failures which may be indicative of brute force attacks to manipulate routing

Ciscobgp
TA0001 · Initial AccessTA0003 · PersistenceTA0004 · Privilege EscalationTA0005 · Defense Evasion+5
Tim BrownMon Jan 09network
Detectionlowtest

Cisco LDP Authentication Failures

Detects LDP failures which may be indicative of brute force attacks to manipulate MPLS labels

Ciscoldp
TA0001 · Initial AccessTA0003 · PersistenceTA0004 · Privilege EscalationTA0005 · Defense Evasion+5
Tim BrownMon Jan 09network
Detectionmediumexperimental

FortiGate - Firewall Address Object Added

Detects the addition of firewall address objects on a Fortinet FortiGate Firewall.

fortigateevent
TA0005 · Defense EvasionT1562 · Impair Defenses
Marco Pedrinazzi (InTheCyber)Sat Nov 01network
Detectionmediumexperimental

FortiGate - New Firewall Policy Added

Detects the addition of a new firewall policy on a Fortinet FortiGate Firewall.

fortigateevent
TA0005 · Defense EvasionT1562 · Impair Defenses
Marco Pedrinazzi (InTheCyber)Sat Nov 01network
Detectionlowtest

Huawei BGP Authentication Failures

Detects BGP failures which may be indicative of brute force attacks to manipulate routing.

huaweibgp
TA0001 · Initial AccessTA0003 · PersistenceTA0004 · Privilege EscalationTA0005 · Defense Evasion+5
Tim BrownMon Jan 09network
Detectionlowtest

Juniper BGP Missing MD5

Detects juniper BGP missing MD5 digest. Which may be indicative of brute force attacks to manipulate routing.

Juniperbgp
TA0001 · Initial AccessTA0003 · PersistenceTA0004 · Privilege EscalationTA0005 · Defense Evasion+5
Tim BrownMon Jan 09network
Detectionmediumtest

Download from Suspicious Dyndns Hosts

Detects download of certain file types from hosts with dynamic DNS names (selected list)

Proxy Log
TA0005 · Defense EvasionTA0011 · Command and ControlT1105 · Ingress Tool TransferT1568 · Dynamic Resolution
Florian Roth (Nextron Systems)Wed Nov 08web
Detectionhightest

HackTool - CobaltStrike Malleable Profile Patterns - Proxy

Detects cobalt strike malleable profiles patterns (URI, User-Agents, Methods).

Proxy Log
TA0005 · Defense EvasionTA0011 · Command and ControlT1071.001 · Web Protocols
Markus Neis+1Thu Feb 15web
Detectionhightest

HackTool - Empire UserAgent URI Combo

Detects user agent and URI paths used by empire agents

Proxy Log
TA0005 · Defense EvasionTA0011 · Command and ControlT1071.001 · Web Protocols
Florian Roth (Nextron Systems)Mon Jul 13web
Detectionhightest

Raw Paste Service Access

Detects direct access to raw pastes in different paste services often used by malware in their second stages to download malicious code in encrypted or encoded form

Proxy Log
TA0011 · Command and ControlT1071.001 · Web ProtocolsT1102.001 · Dead Drop ResolverT1102.003 · One-Way Communication+1
Florian Roth (Nextron Systems)Thu Dec 05web
Detectionhightest

Flash Player Update from Suspicious Location

Detects a flashplayer update from an unofficial location

Proxy Log
TA0001 · Initial AccessT1189 · Drive-by CompromiseTA0002 · ExecutionT1204.002 · Malicious File+2
Florian Roth (Nextron Systems)Wed Oct 25web
Detectionmediumtest

Telegram API Access

Detects suspicious requests to Telegram API without the usual Telegram User-Agent

Proxy Log
TA0005 · Defense EvasionTA0011 · Command and ControlT1071.001 · Web ProtocolsT1102.002 · Bidirectional Communication
Florian Roth (Nextron Systems)Tue Jun 05web
Detectionhightest

Bitsadmin to Uncommon IP Server Address

Detects Bitsadmin connections to IP addresses instead of FQDN names

Proxy Log
TA0011 · Command and ControlT1071.001 · Web ProtocolsTA0005 · Defense EvasionTA0003 · Persistence+2
Florian Roth (Nextron Systems)Fri Jun 10web
Detectionhightest

Bitsadmin to Uncommon TLD

Detects Bitsadmin connections to domains with uncommon TLDs

Proxy Log
TA0011 · Command and ControlT1071.001 · Web ProtocolsTA0005 · Defense EvasionTA0003 · Persistence+2
Florian Roth (Nextron Systems)+1Thu Mar 07web
Detectionmediumtest

HTTP Request With Empty User Agent

Detects a potentially suspicious empty user agent strings in proxy log. Could potentially indicate an uncommon request method.

Proxy Log
TA0005 · Defense EvasionTA0011 · Command and ControlT1071.001 · Web Protocols
Florian Roth (Nextron Systems)Sat Jul 08web
Detectionmediumtest

Windows PowerShell User Agent

Detects Windows PowerShell Web Access

Proxy Log
TA0005 · Defense EvasionTA0011 · Command and ControlT1071.001 · Web Protocols
Florian Roth (Nextron Systems)Mon Mar 13web
Detectionhightest

Server Side Template Injection Strings

Detects SSTI attempts sent via GET requests in access logs

Web Server Log
TA0005 · Defense Evasionattack.t1221
Nasreddine Bencherchali (Nextron Systems)Tue Jun 14web
Detectionhightest

Microsoft Malware Protection Engine Crash

This rule detects a suspicious crash of the Microsoft Malware Protection Engine

Windowsapplication
TA0005 · Defense EvasionT1211 · Exploitation for Defense EvasionT1562.001 · Disable or Modify Tools
Florian Roth (Nextron Systems)Tue May 09windows