
Summary
This rule identifies potentially malicious usage of the `awk` utility in Linux systems. Specifically, it looks for cases where the `awk` binary is used to spawn an interactive shell, which is not a standard usage scenario. The rule examines process events to detect when processes starting with shell interpreters like `sh`, `bash`, or `dash` have a parent process that is one of the `awk` variants (`nawk`, `mawk`, `awk`, `gawk`). A critical condition for detection is the presence of commands in the parent process arguments that indicate an attempt to execute a system shell via special scripting. The rule links this behavior to MITRE ATT&CK techniques under the Execution tactic, particularly focusing on command and scripting interpreters, highlighting its relevance in detecting breakouts from restricted environments.
Categories
- Linux
- Endpoint
- Other
Data Sources
- Process
- Logon Session
ATT&CK Techniques
- T1059
- T1059.004
Created: 2022-02-24