
Summary
This rule identifies suspicious behavior involving Git and file downloads on Linux systems. It detects when a Git command is executed to clone a repository or when files are downloaded from GitHub using 'wget' or 'curl', immediately followed by the creation of files in directories such as /tmp, /var/tmp, or /dev/shm. Such actions may suggest an attempt to download and deploy malicious payloads or tools. The rule uses a sequence detection method to monitor the process execution and file creation events within a 10-second span, ensuring timely identification of potential threats.
Categories
- Endpoint
- Linux
Data Sources
- Process
- File
ATT&CK Techniques
- T1071
Created: 2025-04-25