
Summary
This detection rule identifies potentially malicious files that contain Base64-encoded commands in their filenames, aiming specifically at Linux environments. The technique leverages particular quirks in shell interpretation, where filenames starting with patterns like '{echo' and containing encoded commands can initiate unintended script execution through shell invocations. This behavior is reminiscent of methods employed by VShell malware strategies, which utilize these hidden commands to execute payloads without clear indication of the activity. The rule plays a critical role in fortifying security measures against file-based attacks targeting command execution through deceptive filename strategies.
Categories
- Linux
- Endpoint
Data Sources
- File
Created: 2025-11-22