
Summary
This detection rule is designed to identify suspicious usage of the `chmod` command in Linux environments. Specifically, it focuses on determining when the `chmod` command is executed in directories that are not commonly associated with standard permission changes. The rule specifies that it will trigger if the command is run with file paths that include `/tmp/`, `/.Library/`, `/etc/`, or `/opt/`, which are indicative of unusual or potentially malicious alteration of permissions in sensitive or temporary locations. The use of `chmod` in these directories may be a part of an evasion tactic typically associated with malware trying to hide its activities by manipulating file permissions. The classification of the rule under the attack framework highlights its focus on defense evasion techniques, particularly indicating it relates to techniques T1222.002 in the ATT&CK framework. Potential false positives could arise from legitimate administrative activities, such as system administrators modifying file permissions in these directories. Overall, the rule is classified at a medium severity level and aims to enhance security monitoring in Linux environments by flagging potentially harmful commands executed in suspicious contexts.
Categories
- Linux
- Endpoint
Data Sources
- Command
- Process
ATT&CK Techniques
- T1222.002
Created: 2022-06-03