
Summary
This rule is designed to monitor the creation or modification of shell configuration files on Unix systems, which are critical for defining user environments through environment variables, aliases, and startup scripts. Attackers may exploit these files to execute malicious code, aiming for persistence within the system. This behavior aligns with techniques utilized by the Kaiji malware family. The EQL query specifically targets events where shell configuration files are created or altered, while filtering out benign activities tied to legitimate user actions or common package management processes. The rule highlights a risk score of 47, indicating a medium severity potential threat based on the actions detected.
Categories
- Endpoint
- Linux
Data Sources
- File
- Network Traffic
ATT&CK Techniques
- T1546
- T1546.004
Created: 2024-04-30