heroui logo

Git Repository or File Download to Suspicious Directory

Elastic Detection Rules

View Source
Summary
This rule identifies suspicious behavior involving Git and file downloads on Linux systems. It detects when a Git command is executed to clone a repository or when files are downloaded from GitHub using 'wget' or 'curl', immediately followed by the creation of files in directories such as /tmp, /var/tmp, or /dev/shm. Such actions may suggest an attempt to download and deploy malicious payloads or tools. The rule uses a sequence detection method to monitor the process execution and file creation events within a 10-second span, ensuring timely identification of potential threats.
Categories
  • Endpoint
  • Linux
Data Sources
  • Process
  • File
ATT&CK Techniques
  • T1071
Created: 2025-04-25