
Summary
This detection rule identifies the creation of hidden shared object (.so) files on Linux systems, which can be used by adversaries for persistence and evasion. The rule works by monitoring specific data sources like Auditbeat and Elastic Defend and is designed to flag events where a file is created with a name starting with a dot (denoting it as hidden). It filters out benign processes like 'dockerd', focusing solely on potential threats. The rule is a proactive measure against the tactic of Defense Evasion, specifically targeting techniques such as hiding artifacts. Investigators are advised to validate event details, assess process legitimacy, and correlate activities surrounding the file creation to detect malicious behaviors effectively.
Categories
- Endpoint
- Linux
Data Sources
- File
- Process
- Container
- Network Traffic
- Command
ATT&CK Techniques
- T1564
- T1564.001
Created: 2022-07-20