heroui logo

Suspicious Content Extracted or Decompressed via Funzip

Elastic Detection Rules

View Source
Summary
This rule is designed to detect suspicious activities involving the extraction and decompression of malicious content using the 'funzip' utility on Linux systems. The analysis indicates that attackers may execute the 'tail' command with the '-c' option to read the end of a file, enabling them to extract potentially harmful data. The output from 'tail' can then be piped to 'funzip' for decompression before execution. This behavior has been observed in certain malware families like Bundlore. The rule identifies these actions by monitoring process executions that involve both 'tail' and 'funzip', while excluding known benign processes to minimize false positives. The investigation guide emphasizes the importance of examining the contexts in which these commands are executed to determine if they are part of legitimate operations or potentially malicious behavior.
Categories
  • Endpoint
  • Linux
Data Sources
  • Process
  • Sensor Health
  • Logon Session
  • Application Log
  • Network Traffic
ATT&CK Techniques
  • T1059
  • T1059.004
  • T1027
  • T1140
Created: 2023-06-26