heroui logo

System V Init Script Created

Elastic Detection Rules

View Source
Summary
This detection rule identifies the creation of new files in the `/etc/init.d/` directory on Linux systems, where adversaries may place scripts or executables to maintain persistence. The rule operates by monitoring file events that signal either the creation or renaming of files in this directory during a specified timeframe. It acknowledges that `init.d` has been largely replaced by `systemd`, but attackers can exploit the initialization system to configure services that execute malicious code upon system boot. The rule includes a sophisticated EQL query that filters out legitimate actions such as package management to reduce the occurrence of false positives. If necessary, the detection leverages Osquery for further investigation into created files, associated processes, and their potential impact. This leads to comprehensive incident response measures if malicious activity is suspected. The rule is acknowledged as being part of a broader set of detection and response strategies centered on system initialization processes.
Categories
  • Endpoint
  • Linux
  • On-Premise
Data Sources
  • File
  • Process
  • Network Traffic
ATT&CK Techniques
  • T1037
Created: 2023-03-21