
Summary
This rule detects the use of various decoding commands associated with base encoding formats, namely base32, base64, base58, basenc, and basez. These decoding methods can be exploited in malicious activities, allowing threat actors to read privileged data or disclose sensitive files from a restricted file system, especially when used in conjunction with binaries that have the SUID bit set or are allowed to execute with superuser privileges via sudo. The executed commands that trigger this detection often include flags such as '--decode' or '-d', indicating a decoding operation. The presence of these commands in the data stream could suggest an attacker is attempting to evade detection by decoding payloads or manipulating data unnoticed. This rule falls under the defense evasion tactic and is also associated with threat actor groups UNC5221 and UTA0178. For further information, relevant links to GTFObins, a resource detailing potentially dangerous binaries, are provided in the rule's references.
Categories
- Endpoint
- Cloud
Data Sources
- Process
- File
- Logon Session
- Application Log
ATT&CK Techniques
- T1027
- T1140
Created: 2024-02-09