heroui logo

Executable File Download via Wget

Elastic Detection Rules

View Source
Summary
The rule titled 'Executable File Download via Wget' is designed to detect instances where the wget command is utilized to download executable files to suspicious directories on macOS, such as /tmp and /Users/Shared. This behavior is often associated with threat actors who use wget to stage malicious payloads for execution following breaches or vulnerabilities. The detection leverages EQL (Event Query Language) and is supported by an investigation guide highlighting possible investigation steps, false positive scenarios, and response actions. The rule aims to mitigate risks associated with ingress tool transfers and maintain secure environments by identifying potentially malicious actions promptly.
Categories
  • macOS
  • Endpoint
  • Other
Data Sources
  • Process
  • Network Traffic
  • File
ATT&CK Techniques
  • T1105
  • T1204
  • T1204.002
Created: 2026-01-30