
Summary
This detection rule monitors for potentially malicious behavior involving the use of the 'od' utility on Linux systems. 'od', short for octal dump, is a command-line tool utilized for examining binary files in various formats. Attackers may employ 'od' to investigate the dynamic linker, allowing them to identify potential injection points for executing payloads. The rule focuses on detecting process executions where 'od' is invoked with specific arguments relative to known dynamic linker files, which could indicate preparatory reconnaissance activities for an exploit attempt. The rule's severity is classified as low, signifying that while the behavior is suspicious, it may often occur as legitimate process activity by system administrators or developers. An in-depth investigation is recommended upon triggering, involving analysis of the user executing the process, surrounding system activities, and any correlating logs or alerts indicating malicious intent.
Categories
- Endpoint
- Linux
Data Sources
- Process
- File
- Network Traffic
ATT&CK Techniques
- T1057
Created: 2024-02-01