
Summary
This detection rule focuses on identifying potential hexadecimal payload executions on Linux systems, which are often utilized by adversaries to obfuscate malicious payloads, thereby circumventing standard detection mechanisms. The rule leverages an EQL (Event Query Language) format to analyze process events from various data sources including Elastic Defend, CrowdStrike, and SentinelOne. It captures the initialization of processes that use hex-related commands and behaviors, aiming to alert analysts to potentially malicious activity. The EQL query distinguishes between legitimate hex executions and suspicious ones based on process names and arguments related to hex decoding and encoding, involving tools such as `xxd`, `python`, `php`, `ruby`, `perl`, and `lua`. By monitoring for these indicators, the rule helps in uncovering and responding to hidden threats by detecting abnormal usage patterns that are indicative of obfuscation tactics.
Categories
- Linux
- Endpoint
- Cloud
Data Sources
- Process
- Application Log
- Container
- User Account
ATT&CK Techniques
- T1027
- T1140
- T1059
- T1059.004
- T1204
- T1204.002
Created: 2024-11-04