heroui logo

Potential Hex Payload Execution via Command-Line

Elastic Detection Rules

View Source
Summary
This rule detects potential command-line executions in Linux environments that utilize hexadecimal character sequences, which are often employed by malware authors to obfuscate malicious payloads and bypass detection mechanisms. The rule is structured to identify when processes start with a command line that includes multiple hexadecimal escapes. Specifically, it checks for executables not being null and a command line length that exceeds 50 characters, which adds an additional layer of specificity to the detection criteria. This is particularly relevant in threat detection as attackers may try to obscure their activities from security monitoring tools. The rule links to MITRE ATT&CK techniques for contextualizing the associated behaviors, specifically highlighting tactics used for evasion and execution of potentially harmful tasks. The integration and setup guide emphasize the necessity of deploying Elastic Defend via the Elastic Agent at the endpoints to capture and analyze the requisite data effectively.
Categories
  • Endpoint
  • Linux
Data Sources
  • Process
  • Logon Session
ATT&CK Techniques
  • T1027
  • T1140
  • T1059
  • T1059.004
  • T1204
  • T1204.002
Created: 2025-04-29