
Summary
This rule identifies potential abuse of the `busybox` binary in Unix-like systems, particularly in Linux environments, which could indicate an unauthorized attempt to escape from restricted execution contexts. Users and system administrators typically do not invoke a shell instance from `busybox` as it is not a standard use case of this utility suite. The rule triggers on the creation of a process that starts `busybox` with specific arguments that indicate launching an interactive shell. Given the possibility that this behavior may point to a malicious actor trying to escalate their privileges or establish deeper access within a system, the rule employs risk evaluation metrics in line with the MITRE ATT&CK frameworks and is classified with a medium severity and a risk score of 47. This rule is targeted primarily at endpoint security and aligns with tactics associated with command and scripting interpreters within execution contexts.
Categories
- Linux
- Endpoint
- Infrastructure
Data Sources
- Process
- Logon Session
- Command
ATT&CK Techniques
- T1059
- T1059.004
Created: 2022-03-15