
Summary
This rule is designed to detect unusual egress network activity on Linux systems, specifically targeting executable files that typically do not generate a high volume of outbound connections. The detection mechanism relies on monitoring network events for processes classified as 'unusual'—those located in directories such as `/tmp`, `/var/tmp`, or `/dev/shm`. By tracking the number of outbound connection attempts, the rule aims to identify potential command and control (C2) communication, a common tactic employed by malware during infections or brute force attacks. Any executable that attempts more than 15 connections within a one-hour window and originates from a single agent is flagged for further analysis. This configuration aids in highlighting potential threats that might otherwise go unnoticed, ensuring system integrity through timely alerts.
Categories
- Linux
- Endpoint
Data Sources
- Process
- Network Traffic
- Container
ATT&CK Techniques
- T1071
Created: 2025-02-20