heroui logo

Linux File Creation In Init Boot Directory

Splunk Security Content

View Source
Summary
The detection rule titled 'Linux File Creation In Init Boot Directory' targets the creation of files in Linux init boot directories such as /etc/init.d/ and /etc/rc.d/. These directories are critical for scripts that execute automatically upon system startup, making them prime targets for adversaries seeking to establish persistence on a compromised system. This analytic leverages Sysmon for Linux's EventID 11 to monitor filesystem logs and identify newly created files within these directories. Unauthorized file creations can indicate malicious behavior, such as an attacker trying to regain control or ensure the execution of their malicious payload every time the system boots. The rule applies a tstats search in Splunk to filter relevant events and notify security teams of potential threats. However, there is a possibility for false positives when legitimate administrators or network operators create files in these directories for automation purposes, necessitating careful monitoring and adjustment of the filter macros used in the detection process.
Categories
  • Linux
  • Endpoint
Data Sources
  • Pod
ATT&CK Techniques
  • T1037.004
  • T1037
  • T1546.004
Created: 2025-01-27