heroui logo

ESXI Discovery via Grep

Elastic Detection Rules

View Source
Summary
This detection rule is designed to identify potentially malicious use of common command-line processes on Linux systems, specifically the 'grep', 'egrep', or 'pgrep' commands, when they are invoked with arguments associated with virtual machine (VM) file formats. These formats include extensions such as '.vmdk', '.vmx', '.vmxf', '.vmsd', '.vmsn', '.vswp', '.vmss', '.nvram', and '.vmem', which are indicative of VM files that threat actors may target for reconnaissance or manipulation. The rule monitors process execution and flags activities meeting specific criteria, such as the command being executed, the arguments passed, and specific conditions around the parent process. If a match is found, it signals a possible discovery attempt by an attacker trying to analyze or manipulate VM resources, which requires further investigation. The rule's setup involves collecting data from the Elastic Defend integration, ensuring that the monitoring capabilities of the Elastic Agent are correctly configured to capture the necessary events on Linux systems. Proper handling of potential false positives, arising from normal administrative activities, is also addressed within the rule's guidance.
Categories
  • Linux
  • Endpoint
Data Sources
  • Process
  • Command
  • File
ATT&CK Techniques
  • T1518
Created: 2023-04-11