Rule Library

Sigma Rules

957 rules found for "Nasreddine Bencherchali (Nextron Systems)"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumexperimental

AWS Bucket Deleted

Detects the deletion of S3 buckets in AWS CloudTrail logs. Monitoring the deletion of S3 buckets is critical for security and data integrity, as it may indicate potential data loss or unauthorized access attempts.

AWScloudtrail
TA0005 · Defense Evasion
Ivan Saakov+1Sun Oct 19cloud
Detectionmediumexperimental

AWS ConsoleLogin Failed Authentication

Detects failed AWS console login attempts due to authentication failures. Monitoring these events is crucial for identifying potential brute-force attacks or unauthorized access attempts to AWS accounts.

AWScloudtrail
TA0006 · Credential AccessT1110 · Brute Force
Ivan Saakov+1Sun Oct 19cloud
Detectioninformationaltest

New Okta User Created

Detects new user account creation

Oktaokta
TA0006 · Credential Access
Nasreddine Bencherchali (Nextron Systems)Wed Oct 25identity
Detectionhightest

Potential Suspicious BPF Activity - Linux

Detects the presence of "bpf_probe_write_user" BPF helper-generated warning messages. Which could be a sign of suspicious eBPF activity on the system.

Linux
TA0003 · PersistenceTA0005 · Defense Evasion
Red Canary+1Wed Jan 25linux
Detectionmediumtest

Persistence Via Sudoers Files

Detects creation of sudoers file or files in "sudoers.d" directory which can be used a potential method to persiste privileges for a specific user.

LinuxFile Event
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1053.003 · Cron
Nasreddine Bencherchali (Nextron Systems)Tue Jul 05linux
Detectionhightest

Triple Cross eBPF Rootkit Default LockFile

Detects the creation of the file "rootlog" which is used by the TripleCross rootkit as a way to check if the backdoor is already running.

LinuxFile Event
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Tue Jul 05linux
Detectionhightest

Triple Cross eBPF Rootkit Default Persistence

Detects the creation of "ebpfbackdoor" files in both "cron.d" and "sudoers.d" directories. Which both are related to the TripleCross persistence method

LinuxFile Event
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceTA0005 · Defense Evasion+1
Nasreddine Bencherchali (Nextron Systems)Tue Jul 05linux
Detectionmediumtest

Shell Invocation via Apt - Linux

Detects the use of the "apt" and "apt-get" commands to execute a shell or proxy commands. Such behavior may be associated with privilege escalation, unauthorized command execution, or to break out from restricted environments.

LinuxProcess Creation
TA0007 · DiscoveryT1083 · File and Directory Discovery
Nasreddine Bencherchali (Nextron Systems)Wed Dec 28linux
Detectionmediumtest

Linux Base64 Encoded Shebang In CLI

Detects the presence of a base64 version of the shebang in the commandline, which could indicate a malicious payload about to be decoded

LinuxProcess Creation
TA0005 · Defense EvasionT1140 · Deobfuscate/Decode Files or Information
Nasreddine Bencherchali (Nextron Systems)Thu Sep 15linux
Detectionmediumtest

Enable BPF Kprobes Tracing

Detects common command used to enable bpf kprobes tracing

LinuxProcess Creation
TA0002 · ExecutionTA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Wed Jan 25linux
Detectionlowtest

Capabilities Discovery - Linux

Detects usage of "getcap" binary. This is often used during recon activity to determine potential binaries that can be abused as GTFOBins or other.

LinuxProcess Creation
TA0007 · DiscoveryT1083 · File and Directory Discovery
Nasreddine Bencherchali (Nextron Systems)Wed Dec 28linux
Detectionmediumtest

Remove Immutable File Attribute

Detects usage of the 'chattr' utility to remove immutable file attribute.

LinuxProcess Creation
TA0005 · Defense Evasionattack.t1222.002
Nasreddine Bencherchali (Nextron Systems)Thu Sep 15linux
Detectionmediumtest

Remove Scheduled Cron Task/Job

Detects usage of the 'crontab' utility to remove the current crontab. This is a common occurrence where cryptocurrency miners compete against each other by removing traces of other miners to hijack the maximum amount of resources possible

LinuxProcess Creation
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Thu Sep 15linux
Detectionlowtest

Curl Usage on Linux

Detects a curl process start on linux, which indicates a file download from a remote location or a simple web request to a remote server

LinuxProcess Creation
TA0011 · Command and ControlT1105 · Ingress Tool Transfer
Nasreddine Bencherchali (Nextron Systems)Thu Sep 15linux
Detectionhightest

ESXi Admin Permission Assigned To Account Via ESXCLI

Detects execution of the "esxcli" command with the "system" and "permission" flags in order to assign admin permissions to an account.

LinuxProcess Creation
TA0003 · PersistenceTA0002 · ExecutionTA0004 · Privilege Escalationattack.t1059.012+1
Nasreddine Bencherchali (Nextron Systems)Mon Sep 04linux
Detectionmediumtest

ESXi Storage Information Discovery Via ESXCLI

Detects execution of the "esxcli" command with the "storage" flag in order to retrieve information about the storage status and other related information. Seen used by malware such as DarkSide and LockBit.

LinuxProcess Creation
TA0007 · DiscoveryTA0002 · ExecutionT1033 · System Owner/User DiscoveryT1007 · System Service Discovery+1
Nasreddine Bencherchali (Nextron Systems)+1Mon Sep 04linux
Detectionmediumtest

ESXi VM Kill Via ESXCLI

Detects execution of the "esxcli" command with the "vm" and "kill" flag in order to kill/shutdown a specific VM.

LinuxProcess Creation
TA0002 · ExecutionTA0040 · Impactattack.t1059.012T1529 · System Shutdown/Reboot
Nasreddine Bencherchali (Nextron Systems)+1Mon Sep 04linux
Detectionmediumtest

ESXi VSAN Information Discovery Via ESXCLI

Detects execution of the "esxcli" command with the "vsan" flag in order to retrieve information about virtual storage. Seen used by malware such as DarkSide.

LinuxProcess Creation
TA0007 · DiscoveryTA0002 · ExecutionT1033 · System Owner/User DiscoveryT1007 · System Service Discovery+1
Nasreddine Bencherchali (Nextron Systems)+1Mon Sep 04linux
Detectionmediumtest

Suspicious Package Installed - Linux

Detects installation of suspicious packages using system installation utilities

LinuxProcess Creation
TA0005 · Defense EvasionT1553.004 · Install Root Certificate
Nasreddine Bencherchali (Nextron Systems)Tue Jan 03linux
Detectionlowtest

Named Pipe Created Via Mkfifo

Detects the creation of a new named pipe using the "mkfifo" utility

LinuxProcess Creation
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Fri Jun 16linux
Detectionmediumtest

Potentially Suspicious Named Pipe Created Via Mkfifo

Detects the creation of a new named pipe using the "mkfifo" utility in a potentially suspicious location

LinuxProcess Creation
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Fri Jun 16linux
Detectionhightest

Potential Netcat Reverse Shell Execution

Detects execution of netcat with the "-e" flag followed by common shells. This could be a sign of a potential reverse shell setup.

LinuxProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
@d4ns4n_+1Fri Apr 07linux
Detectionhightest

Potential Perl Reverse Shell Execution

Detects execution of the perl binary with the "-e" flag and common strings related to potential reverse shell activity

LinuxProcess Creation
TA0002 · Execution
@d4ns4n_+1Fri Apr 07linux
Detectionhightest

Python Reverse Shell Execution Via PTY And Socket Modules

Detects the execution of python with calls to the socket and pty module in order to connect and spawn a potential reverse shell.

LinuxProcess Creation
TA0002 · Execution
@d4ns4n_+1Mon Apr 24linux
Detectionlowtest

Linux Package Uninstall

Detects linux package removal using builtin tools such as "yum", "apt", "apt-get" or "dpkg".

LinuxProcess Creation
TA0005 · Defense EvasionT1070 · Indicator Removal
Tuan Le (NCSGroup)+1Thu Mar 09linux
Detectionmediumtest

Disable Or Stop Services

Detects the usage of utilities such as 'systemctl', 'service'...etc to stop or disable tools and services

LinuxProcess Creation
TA0005 · Defense Evasion
Nasreddine Bencherchali (Nextron Systems)Thu Sep 15linux
Detectionmediumtest

Suspicious Curl File Upload - Linux

Detects a suspicious curl process start the adds a file to a web request

LinuxProcess Creation
TA0010 · ExfiltrationTA0011 · Command and ControlT1567 · Exfiltration Over Web ServiceT1105 · Ingress Tool Transfer
Nasreddine Bencherchali (Nextron Systems)+1Thu Sep 15linux
Detectionmediumtest

Suspicious Curl Change User Agents - Linux

Detects a suspicious curl process start on linux with set useragent options

LinuxProcess Creation
TA0011 · Command and ControlT1071.001 · Web Protocols
Nasreddine Bencherchali (Nextron Systems)Thu Sep 15linux
Detectionmediumtest

Potential Discovery Activity Using Find - Linux

Detects usage of "find" binary in a suspicious manner to perform discovery

LinuxProcess Creation
TA0007 · DiscoveryT1083 · File and Directory Discovery
Nasreddine Bencherchali (Nextron Systems)Wed Dec 28linux
Detectionmediumtest

Suspicious Git Clone - Linux

Detects execution of "git" in order to clone a remote repository that contain suspicious keywords which might be suspicious

LinuxProcess Creation
TA0043 · Reconnaissanceattack.t1593.003
Nasreddine Bencherchali (Nextron Systems)Tue Jan 03linux
Detectionhightest

Linux HackTool Execution

Detects known hacktool execution based on image name.

LinuxProcess Creation
TA0002 · ExecutionTA0042 · Resource DevelopmentT1587 · Develop Capabilities
Nasreddine Bencherchali (Nextron Systems)+1Tue Jan 03linux
Detectionhightest

Suspicious Java Children Processes

Detects java process spawning suspicious children

LinuxProcess Creation
TA0002 · ExecutionT1059 · Command and Scripting Interpreter
Nasreddine Bencherchali (Nextron Systems)Fri Jun 03linux
Detectionhighexperimental

Mask System Power Settings Via Systemctl

Detects the use of systemctl mask to disable system power management targets such as suspend, hibernate, or hybrid sleep. Adversaries may mask these targets to prevent a system from entering sleep or shutdown states, ensuring their malicious processes remain active and uninterrupted. This behavior can be associated with persistence or defense evasion, as it impairs normal system power operations to maintain long-term access or avoid termination of malicious activity.

LinuxProcess Creation
TA0003 · PersistenceTA0040 · ImpactT1653 · Power Settings
Milad Cheraghi+1Fri Oct 17linux
Detectionhightest

Triple Cross eBPF Rootkit Execve Hijack

Detects execution of a the file "execve_hijack" which is used by the Triple Cross rootkit as a way to elevate privileges

LinuxProcess Creation
TA0005 · Defense EvasionTA0004 · Privilege Escalation
Nasreddine Bencherchali (Nextron Systems)Tue Jul 05linux
Detectionhightest

Triple Cross eBPF Rootkit Install Commands

Detects default install commands of the Triple Cross eBPF rootkit based on the "deployer.sh" script

LinuxProcess Creation
TA0005 · Defense EvasionT1014 · Rootkit
Nasreddine Bencherchali (Nextron Systems)Tue Jul 05linux
Detectionhightest

Vim GTFOBin Abuse - Linux

Detects the use of "vim" and it's siblings commands to execute a shell or proxy commands. Such behavior may be associated with privilege escalation, unauthorized command execution, or to break out from restricted environments.

LinuxProcess Creation
TA0007 · DiscoveryT1083 · File and Directory Discovery
Nasreddine Bencherchali (Nextron Systems)Wed Dec 28linux
Detectionhightest

Linux Webshell Indicators

Detects suspicious sub processes of web server processes

LinuxProcess Creation
TA0003 · PersistenceT1505.003 · Web Shell
Florian Roth (Nextron Systems)+1Fri Oct 15linux
Detectionmediumtest

JAMF MDM Potential Suspicious Child Process

Detects potential suspicious child processes of "jamf". Could be a sign of potential abuse of Jamf as a C2 server as seen by Typhon MythicAgent.

macOSProcess Creation
TA0002 · Execution
Nasreddine Bencherchali (Nextron Systems)Tue Aug 22macos
Detectionmediumtest

Potential Discovery Activity Using Find - MacOS

Detects usage of "find" binary in a suspicious manner to perform discovery

macOSProcess Creation
TA0007 · DiscoveryT1083 · File and Directory Discovery
Nasreddine Bencherchali (Nextron Systems)Wed Dec 28macos
Detectionmediumtest

F5 BIG-IP iControl Rest API Command Execution - Proxy

Detects POST requests to the F5 BIG-IP iControl Rest API "bash" endpoint, which allows the execution of commands on the BIG-IP

Proxy Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Application
Nasreddine Bencherchali (Nextron Systems)+1Wed Nov 08web
Detectionmediumtest

Suspicious Base64 Encoded User-Agent

Detects suspicious encoded User-Agent strings, as seen used by some malware.

Proxy Log
TA0011 · Command and ControlT1071.001 · Web Protocols
Nasreddine Bencherchali (Nextron Systems)Thu May 04web
Detectionhightest

Malware User Agent

Detects suspicious user agent strings used by malware in proxy logs

Proxy Log
TA0011 · Command and ControlT1071.001 · Web Protocols
Florian Roth (Nextron Systems)+2Sat Jul 08web
Detectionmediumtest

F5 BIG-IP iControl Rest API Command Execution - Webserver

Detects POST requests to the F5 BIG-IP iControl Rest API "bash" endpoint, which allows the execution of commands on the BIG-IP

Web Server Log
TA0002 · ExecutionT1190 · Exploit Public-Facing ApplicationTA0001 · Initial Access
Nasreddine Bencherchali (Nextron Systems)+1Wed Nov 08web
Detectionmediumtest

Path Traversal Exploitation Attempts

Detects path traversal exploitation attempts

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Application
Subhash Popuri+3Sat Sep 25web
Detectionhightest

SQL Injection Strings In URI

Detects potential SQL injection attempts via GET requests in access logs.

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Application
Saw Win Naung+2Sat Feb 22web
Detectionhightest

Server Side Template Injection Strings

Detects SSTI attempts sent via GET requests in access logs

Web Server Log
TA0005 · Defense Evasionattack.t1221
Nasreddine Bencherchali (Nextron Systems)Tue Jun 14web
Detectionmediumtest

Suspicious User-Agents Related To Recon Tools

Detects known suspicious (default) user-agents related to scanning/recon tools

Web Server Log
TA0001 · Initial AccessT1190 · Exploit Public-Facing Application
Nasreddine Bencherchali (Nextron Systems)+1Tue Jul 19web
Detectionhightest

Suspicious Windows Strings In URI

Detects suspicious Windows strings in URI which could indicate possible exfiltration or webshell communication

Web Server Log
TA0003 · PersistenceTA0010 · ExfiltrationT1505.003 · Web Shell
Nasreddine Bencherchali (Nextron Systems)Mon Jun 06web