heroui logo

Interactive Bash Suspicious Children

Sigma Rules

View Source
Summary
This detection rule aims to identify instances where an interactive Bash shell (`bash -i`) is used as a parent process launching potentially malicious child processes. It focuses on detecting anomalies that stem from the execution of certain command-line arguments or the invocation of less common distribution utilities, suggesting that an attacker may be leveraging these tools for post-exploitation activities. The selection criteria require the parent command line to specifically be `bash -i`, while child processes exhibiting suspicious command line arguments (containing patterns such as '-c import', 'base64', 'pty.spawn') or uncommon images (such as 'whoami', 'iptables', or various netcat variations) are flagged. This helps in detecting covert command execution techniques, which may indicate an attempt to manipulate or control the compromised environment.
Categories
  • Linux
  • Endpoint
Data Sources
  • Process
Created: 2022-03-14