
Summary
This detection rule identifies the creation of Linux kernel object files (.ko), which can be exploited by threat actors to load rootkits or other malware, thus gaining control over the system while potentially evading security measures. The rule uses KQL (Kibana Query Language) to filter events, focusing on files created in Linux environments with specific characteristics, thereby avoiding legitimate pathways. The rule is set to trigger alerts for malicious activities while minimizing false positives. Proper setup of the Elastic Defend integration is required, and detailed investigation guidance is provided for analyzing triggered alerts, including common investigation steps and remediation strategies. False positives may occur from legitimate activities like kernel updates or custom module development, necessitating careful whitelisting and monitoring of such paths.
Categories
- Endpoint
- Linux
Data Sources
- File
- Logon Session
- Process
ATT&CK Techniques
- T1547
- T1547.006
- T1014
Created: 2024-12-19