
Summary
This detection rule is designed to identify suspicious program execution activities in specific folders commonly associated with malicious or unauthorized actions on Linux systems. It focuses on system calls made to execute programs located in directories typically not meant for executing binary files, such as `/tmp/`, `/var/www/`, and other web-related folders. The logic behind the detection centers on the idea that attackers may exploit these folders to execute malignant scripts or binaries without drawing attention to standard program locations. The rule evaluates system calls (`SYSCALL`), monitoring for any programs that start executing from these defined paths. The potential false positives include legitimate administrative activities and unconventional web application behavior, which need consideration during alert triage. This rule provides a medium level threat identification, and its development is rooted in various attack techniques aimed at resource development and exploitation management within the Linux environment.
Categories
- Linux
- Endpoint
- Infrastructure
Data Sources
- Process
- File
- Network Traffic
Created: 2018-01-23