heroui logo

File Copied to _var_log - *nix

Anvilogic Forge

View Source
Summary
This detection rule targets the potential malicious activity of copying files to the '/var/log/' directory in Unix-like environments. Threat actors often utilize this directory to manipulate or obfuscate system logs in order to conceal their malicious activities, establish persistence, or to blend their operations with legitimate log entries. The detection is triggered by specific terminal commands and programs commonly used for file transfer, including 'cp', 'rsync', 'install', 'cat', 'dd', 'sftp', 'whois', and 'curl'. The rule is structured to monitor events within the last two hours where processes matching these commands are executed on Linux or macOS platforms. By identifying any files that are moved to the '/var/log/' directory, this rule aids in detecting attempts to cover tracks and impede forensic investigations following a compromise.
Categories
  • Linux
  • macOS
  • Endpoint
Data Sources
  • File
  • Process
ATT&CK Techniques
  • T1105
Created: 2024-02-09