
Summary
This detection rule is designed to identify instances of binary padding on Linux systems, a technique often employed by adversaries to modify the on-disk representation of malicious binaries by appending junk data. The rule specifically monitors the execution of commands associated with adding junk data, such as 'dd' and 'truncate'. It detects execution events (EXECVE) that include the use of 'truncate' with the '-s' option and 'dd' commands that include an 'if=' argument. The condition for triggering the alert is when either the 'truncate' command or the 'dd' command is executed without the 'of=' argument, which indicates the potential use of these commands for nefarious purposes. Given the nature of the activity being monitored, this rule is classified with a high severity level. The rule aims to enhance the detection capabilities against techniques classified under ATT&CK framework T1027.001 - Binary Padding.
Categories
- Linux
- Endpoint
Data Sources
- Command
- Process
- File
ATT&CK Techniques
- T1027.001
Created: 2020-10-13