
Summary
This rule is designed to monitor the creation or modification of the '/etc/rc.local' and '/etc/rc.common' files on Linux systems, which are executed during system startup. The `rc.local` file allows the execution of custom commands, scripts, or applications during system boot, but it has largely been replaced by systemd. Attackers may manipulate these files to achieve persistence on a system by executing malicious code at startup. The rule utilizes EQL (Event Query Language) to detect file rename or creation actions within defined paths while excluding known package management commands. Alerts generated by this rule can assist in identifying potential unauthorized changes that may indicate malicious activity.
Categories
- Endpoint
- Linux
Data Sources
- File
- Process
- Application Log
ATT&CK Techniques
- T1037
- T1037.004
Created: 2023-02-28