heroui logo

Potential GobRAT File Discovery Via Grep

Sigma Rules

View Source
Summary
This detection rule aims to identify the usage of the 'grep' command in a Linux environment as a potential method for discovering files associated with the GobRAT malware. GobRAT is a well-documented type of malware known for leveraging various techniques to maintain persistence and perform reconnaissance on infected systems. The rule focuses on the process creation events where the 'grep' command is used in conjunction with specific command-line arguments that may indicate an attacker is searching for certain malware-related files, such as 'apached', 'frpc', 'sshd.sh', or 'zone.arm'. These parameters are indicative of a known GobRAT payload related to normal or suspicious activities in a compromised environment. The detection is triggered when any of these patterns are associated with the execution of the 'grep' command, which is frequently used by attackers to examine files without raising immediate suspicion. The severity level of this detection is labeled as high, alerting security teams to closely monitor such activities.
Categories
  • Linux
  • Endpoint
Data Sources
  • Process
Created: 2023-06-02