
Summary
The rule titled 'Linux Auditd Kernel Module Enumeration' detects the use of the 'kmod' process on Linux systems to list kernel modules via the 'lsmod' command. This analytic leverages Linux Auditd syscall data, focusing on process names and command-line executions. While listing kernel modules is not necessarily malicious on its own, it can indicate preparatory actions by an attacker intending to load unauthorized modules, potentially leading to privilege escalation or persistence in the system. The rule captures relevant system call data to highlight instances where 'lsmod' is invoked, allowing security teams to assess whether such actions are part of a malicious exploitation process. The implementation requires ingestion of auditd data, normalization to match Splunk's Common Information Model, and can generate further insights by drilling down into risk events associated with the detected command.
Categories
- Linux
- Endpoint
Data Sources
- Kernel
- Process
- Logon Session
ATT&CK Techniques
- T1082
- T1014
Created: 2024-12-17