heroui logo

High Number of Egress Network Connections from Unusual Executable

Elastic Detection Rules

View Source
Summary
This rule is designed to detect unusual egress network activity on Linux systems, specifically targeting executable files that typically do not generate a high volume of outbound connections. The detection mechanism relies on monitoring network events for processes classified as 'unusual'—those located in directories such as `/tmp`, `/var/tmp`, or `/dev/shm`. By tracking the number of outbound connection attempts, the rule aims to identify potential command and control (C2) communication, a common tactic employed by malware during infections or brute force attacks. Any executable that attempts more than 15 connections within a one-hour window and originates from a single agent is flagged for further analysis. This configuration aids in highlighting potential threats that might otherwise go unnoticed, ensuring system integrity through timely alerts.
Categories
  • Linux
  • Endpoint
Data Sources
  • Process
  • Network Traffic
  • Container
ATT&CK Techniques
  • T1071
Created: 2025-02-20