
Summary
This rule identifies the creation or renaming of systemd generator files on Linux systems, which can be used by attackers to maintain persistence. Systemd generators are small executables that are automatically executed by systemd during bootup or configuration reloads to create dynamic unit files and symlinks. They can be exploited to execute arbitrary code at startup, allowing potential persistence or privilege escalation. The rule filters out known benign processes and file types to focus on suspicious activities, thereby providing detection capabilities for possible malicious exploitation of systemd's functionality. The detection mechanism is reliant on Elastic Defend integration, which must be properly configured to monitor file events on hosts effectively.
Categories
- Endpoint
- Linux
Data Sources
- File
- Process
ATT&CK Techniques
- T1543
- T1543.002
Created: 2024-06-19