heroui logo

Suspicious File Creation in /etc for Persistence

Elastic Detection Rules

View Source
Summary
This rule is designed to detect suspicious file creation in specific directories under '/etc/' in Linux systems, which is a common tactic employed by malware for establishing persistence. It monitors for actions performed by the root user that create files in critical system directories, indicating potential malicious activity aiming to maintain unauthorized access or escalate privileges. The rule employs various queries using Osquery to gather essential data regarding file creation, existing processes, and system activities. It provides a comprehensive investigative guide, outlining steps to analyze suspicious file creation incidents, including the review of running processes, associated user activities, and possible exploit attempts. Furthermore, the guideline offers responses and potential false-positive considerations while clarifying the relevance of monitoring certain directories that are often abused by attackers for persistence mechanisms. By integrating this detection mechanism within the Elastic Agent, organizations can enhance their incident detection capabilities regarding Linux environments.
Categories
  • Linux
  • Endpoint
Data Sources
  • File
  • Container
  • Process
ATT&CK Techniques
  • T1037
  • T1037.004
  • T1543
  • T1543.002
  • T1574
  • T1574.006
  • T1053
  • T1053.003
  • T1548
  • T1548.003
Created: 2022-07-22