Rule Library

Sigma Rules

515 rules found for "Red Canary"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionhightest

Binary Padding - Linux

Adversaries may use binary padding to add junk data and change the on-disk representation of malware. This rule detect using dd and truncate to add a junk data to file.

Linuxauditd
TA0005 · Defense EvasionT1027.001 · Binary Padding
Igor Fits+1Tue Oct 13linux
Detectionmediumtest

File Time Attribute Change - Linux

Detect file time attribute change to hide new or changes to existing files.

Linuxauditd
TA0005 · Defense EvasionT1070.006 · Timestomp
Igor Fits+1Thu Oct 15linux
Detectionmediumtest

Remove Immutable File Attribute - Auditd

Detects removing immutable file attribute.

Linuxauditd
TA0005 · Defense Evasionattack.t1222.002
Jakob Weinzettl+1Mon Sep 23linux
Detectionlowtest

Data Compressed

An adversary may compress data (e.g., sensitive documents) that is collected prior to exfiltration in order to make it portable and minimize the amount of data sent over the network.

Linuxauditd
TA0010 · ExfiltrationTA0009 · CollectionT1560.001 · Archive via Utility
Timur Zinniatullin+1Mon Oct 21linux
Detectionlowstable

Overwriting the File with Dev Zero or Null

Detects overwriting (effectively wiping/deleting) of a file.

Linuxauditd
TA0040 · ImpactT1485 · Data Destruction
Jakob Weinzettl+1Wed Oct 23linux
Detectionlowtest

File or Folder Permissions Change

Detects file and folder permission changes.

Linuxauditd
TA0005 · Defense Evasionattack.t1222.002
Jakob Weinzettl+1Mon Sep 23linux
Detectionhightest

Credentials In Files - Linux

Detecting attempts to extract passwords with grep

Linuxauditd
TA0006 · Credential AccessT1552.001 · Credentials In Files
Igor Fits+1Thu Oct 15linux
Detectionlowtest

Hidden Files and Directories

Detects adversary creating hidden file or directory, by detecting directories or files with . as the first character

Linuxauditd
TA0005 · Defense EvasionT1564.001 · Hidden Files and Directories
Pawel MazurMon Sep 06linux
Detectionmediumtest

Masquerading as Linux Crond Process

Masquerading occurs when the name or location of an executable, legitimate or malicious, is manipulated or abused for the sake of evading defenses and observation. Several different variations of this technique have been observed.

Linuxauditd
TA0005 · Defense EvasionT1036.003 · Rename System Utilities
Timur Zinniatullin+1Mon Oct 21linux
Detectionlowtest

Network Sniffing - Linux

Network sniffing refers to using the network interface on a system to monitor or capture information sent over a wired or wireless connection. An adversary may place a network interface into promiscuous mode to passively access data in transit over the network, or use span ports to capture a larger amount of data.

Linuxauditd
TA0006 · Credential AccessTA0007 · DiscoveryT1040 · Network Sniffing
Timur Zinniatullin+1Mon Oct 21linux
Detectionlowtest

Screen Capture with Import Tool

Detects adversary creating screen capture of a desktop with Import Tool. Highly recommended using rule on servers, due to high usage of screenshot utilities on user workstations. ImageMagick must be installed.

Linuxauditd
TA0009 · CollectionT1113 · Screen Capture
Pawel MazurTue Sep 21linux
Detectionlowtest

Screen Capture with Xwd

Detects adversary creating screen capture of a full with xwd. Highly recommended using rule on servers, due high usage of screenshot utilities on user workstations

Linuxauditd
TA0009 · CollectionT1113 · Screen Capture
Pawel MazurMon Sep 13linux
Detectionmediumtest

Suspicious History File Operations - Linux

Detects commandline operations on shell history files

Linuxauditd
TA0006 · Credential AccessT1552.003 · Bash History
Mikhail Larin+1Sat Oct 17linux
Detectionlowtest

Service Reload or Start - Linux

Detects the start, reload or restart of a service.

Linuxauditd
TA0004 · Privilege EscalationTA0003 · PersistenceT1543.002 · Systemd Service
Jakob Weinzettl+2Mon Sep 23linux
Detectioninformationaltest

System Shutdown/Reboot - Linux

Adversaries may shutdown/reboot systems to interrupt access to, or aid in the destruction of, those systems.

Linuxauditd
TA0040 · ImpactT1529 · System Shutdown/Reboot
Igor Fits+1Thu Oct 15linux
Detectionlowtest

System Owner or User Discovery - Linux

Detects the execution of host or user discovery utilities such as "whoami", "hostname", "id", etc. Adversaries may use the information from System Owner/User Discovery during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions.

Linuxauditd
TA0007 · DiscoveryT1033 · System Owner/User Discovery
Timur Zinniatullin+1Mon Oct 21linux
Detectionhightest

Linux Keylogging with Pam.d

Detect attempt to enable auditing of TTY input

Linuxauditd
TA0009 · CollectionTA0006 · Credential AccessT1003 · OS Credential DumpingT1056.001 · Keylogging
Pawel MazurMon May 24linux
Detectionlowstable

Password Policy Discovery - Linux

Detects password policy discovery commands

Linuxauditd
TA0007 · DiscoveryT1201 · Password Policy Discovery
Ömer Günal+2Thu Oct 08linux
Detectionlowtest

System Information Discovery - Auditd

Detects System Information Discovery commands

Linuxauditd
TA0007 · DiscoveryT1082 · System Information Discovery
Pawel MazurFri Sep 03linux
Detectionlowtest

Use Of Hidden Paths Or Files

Detects calls to hidden files or files located in hidden directories in NIX systems.

Linuxauditd
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionT1574.001 · DLL Search Order Hijacking
David BurkettFri Dec 30linux
Detectionhightest

Modification of ld.so.preload

Identifies modification of ld.so.preload for shared object injection. This technique is used by attackers to load arbitrary code into processes.

Linuxauditd
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionT1574.006 · Dynamic Linker Hijacking
E.M. Anhaus (originally from Atomic Blue Detections+2Thu Oct 24linux
Detectionmediumtest

Systemd Service Creation

Detects a creation of systemd services which could be used by adversaries to execute malicious code.

Linuxauditd
TA0004 · Privilege EscalationTA0003 · PersistenceT1543.002 · Systemd Service
Pawel MazurThu Feb 03linux
Detectioninformationalstable

System and Hardware Information Discovery

Detects system information discovery commands

Linuxauditd
TA0007 · DiscoveryT1082 · System Information Discovery
Ömer Günal+1Thu Oct 08linux
Detectionhightest

Disable System Firewall

Detects disabling of system firewalls which could be used by adversaries to bypass controls that limit usage of the network.

Linuxauditd
T1562.004 · Disable or Modify System FirewallTA0005 · Defense Evasion
Pawel MazurSat Jan 22linux
Detectionhightest

Loading of Kernel Module via Insmod

Detects loading of kernel modules with insmod command. Loadable Kernel Modules (LKMs) are pieces of code that can be loaded and unloaded into the kernel upon demand. Adversaries may use LKMs to obtain persistence within the system or elevate the privileges.

Linuxauditd
TA0003 · PersistenceTA0004 · Privilege EscalationT1547.006 · Kernel Modules and Extensions
Pawel MazurTue Nov 02linux
Detectionlowtest

Linux Network Service Scanning - Auditd

Detects enumeration of local or remote network services.

Linuxauditd
TA0007 · DiscoveryT1046 · Network Service Discovery
Alejandro Ortuno+1Wed Oct 21linux
Detectionlowtest

Split A File Into Pieces - Linux

Detection use of the command "split" to split files into parts and possible transfer.

Linuxauditd
TA0010 · ExfiltrationT1030 · Data Transfer Size Limits
Igor Fits+1Thu Oct 15linux
Detectionmediumtest

Modifying Crontab

Detects suspicious modification of crontab file.

Linuxcron
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1053.003 · Cron
Pawel MazurSat Apr 16linux
Detectionhightest

Potential Suspicious BPF Activity - Linux

Detects the presence of "bpf_probe_write_user" BPF helper-generated warning messages. Which could be a sign of suspicious eBPF activity on the system.

Linux
TA0003 · PersistenceTA0005 · Defense Evasion
Red Canary+1Wed Jan 25linux
Detectionhightest

Privileged User Has Been Created

Detects the addition of a new user to a privileged group such as "root" or "sudo"

Linux
TA0004 · Privilege EscalationTA0003 · PersistenceT1136.001 · Local AccountT1098 · Account Manipulation
Pawel MazurWed Dec 21linux
Detectionhightest

Linux Command History Tampering

Detects commands that try to clear or tamper with the Linux command history. This technique is used by threat actors in order to evade defenses and execute commands without them being recorded in files such as "bash_history" or "zsh_history".

Linux
TA0005 · Defense EvasionT1070.003 · Clear Command History
Patrick BareissSun Mar 24linux
Detectionmediumtest

Suspicious Use of /dev/tcp

Detects suspicious command with /dev/tcp

Linux
TA0043 · Reconnaissance
François HubautFri Dec 10linux
Detectionmediumtest

Disabling Security Tools - Builtin

Detects disabling security tools

Linuxsyslog
TA0005 · Defense EvasionT1562.004 · Disable or Modify System Firewall
Ömer Günal+2Wed Jun 17linux
Detectionlowstable

Scheduled Task/Job At

Detects the use of at/atd which are utilities that are used to schedule tasks. They are often abused by adversaries to maintain persistence or to perform task scheduling for initial or recurring execution of malicious code

LinuxProcess Creation
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1053.002 · At
Ömer Günal+1Tue Oct 06linux
Detectionlowtest

Decode Base64 Encoded Text

Detects usage of base64 utility to decode arbitrary base64-encoded text

LinuxProcess Creation
TA0005 · Defense EvasionT1027 · Obfuscated Files or Information
Daniil Yugoslavskiy+1Mon Oct 19linux
Detectionmediumstable

Clear Linux Logs

Detects attempts to clear logs on the system. Adversaries may clear system logs to hide evidence of an intrusion

LinuxProcess Creation
TA0005 · Defense EvasionT1070.002 · Clear Linux or Mac System Logs
Ömer Günal+1Wed Oct 07linux
Detectionhightest

Syslog Clearing or Removal Via System Utilities

Detects specific commands commonly used to remove or empty the syslog. Which is a technique often used by attacker as a method to hide their tracks

LinuxProcess Creation
TA0005 · Defense EvasionT1070.002 · Clear Linux or Mac System Logs
Max Altgelt (Nextron Systems)+3Fri Oct 15linux
Detectionlowtest

DD File Overwrite

Detects potential overwriting and deletion of a file using DD.

LinuxProcess Creation
TA0040 · ImpactT1485 · Data Destruction
Roberto Rodriguez (Cyb3rWard0g)+2Fri Oct 15linux
Detectioninformationaltest

File and Directory Discovery - Linux

Detects usage of system utilities such as "find", "tree", "findmnt", etc, to discover files, directories and network shares.

LinuxProcess Creation
TA0007 · DiscoveryT1083 · File and Directory Discovery
Daniil Yugoslavskiy+2Mon Oct 19linux
Detectioninformationalstable

File Deletion

Detects file deletion using "rm", "shred" or "unlink" commands which are used often by adversaries to delete files left behind by the actions of their intrusion activity

LinuxProcess Creation
TA0005 · Defense EvasionT1070.004 · File Deletion
Ömer Günal+1Wed Oct 07linux
Detectionlowtest

Install Root Certificate

Detects installation of new certificate on the system which attackers may use to avoid warnings when connecting to controlled web servers or C2s

LinuxProcess Creation
TA0005 · Defense EvasionT1553.004 · Install Root Certificate
Ömer Günal+1Mon Oct 05linux
Detectionlowtest

Local System Accounts Discovery - Linux

Detects enumeration of local system accounts. This information can help adversaries determine which local accounts exist on a system to aid in follow-on behavior.

LinuxProcess Creation
TA0007 · DiscoveryT1087.001 · Local Account
Alejandro Ortuno+2Thu Oct 08linux
Detectionlowtest

Local Groups Discovery - Linux

Detects enumeration of local system groups. Adversaries may attempt to find local system groups and permission settings

LinuxProcess Creation
TA0007 · DiscoveryT1069.001 · Local Groups
Ömer Günal+2Sun Oct 11linux
Detectionlowtest

Linux Remote System Discovery

Detects the enumeration of other remote systems.

LinuxProcess Creation
TA0007 · DiscoveryT1018 · Remote System Discovery
Alejandro Ortuno+1Thu Oct 22linux
Detectionmediumtest

Scheduled Cron Task/Job - Linux

Detects abuse of the cron utility to perform task scheduling for initial or recurring execution of malicious code. Detection will focus on crontab jobs uploaded from the tmp folder.

LinuxProcess Creation
TA0002 · ExecutionTA0003 · PersistenceTA0004 · Privilege EscalationT1053.003 · Cron
Alejandro Ortuno+1Tue Oct 06linux
Detectionlowtest

Security Software Discovery - Linux

Detects usage of system utilities (only grep and egrep for now) to discover security software discovery

LinuxProcess Creation
TA0007 · DiscoveryT1518.001 · Security Software Discovery
Daniil Yugoslavskiy+1Mon Oct 19linux
Detectionmediumtest

Disabling Security Tools

Detects disabling security tools

LinuxProcess Creation
TA0005 · Defense EvasionT1562.004 · Disable or Modify System Firewall
Ömer Günal+2Wed Jun 17linux
Detectionlowtest

Setuid and Setgid

Detects suspicious change of file privileges with chown and chmod commands

LinuxProcess Creation
TA0005 · Defense EvasionTA0003 · PersistenceTA0004 · Privilege EscalationT1548.001 · Setuid and Setgid
Ömer GünalTue Jun 16linux