heroui logo

Network Connection via Recently Compiled Executable

Elastic Detection Rules

View Source
Summary
This detection rule is designed to monitor a sequence of events that begins with the compilation of a program followed by its execution, culminating in a network connection attempt. The rule operates on data sourced from Elastic Defend, tailored specifically for Linux endpoints. It utilizes EQL (Event Query Language) to track the behaviors that signify potential threat activities such as the establishment of reverse TCP connections commonly employed by attackers to communicate with command-and-control servers. The risk score assigned to this rule is medium (47), denoting the significance of its detection capabilities. The rule identifies specific processes involved in compilation (like gcc, g++, cc) and then looks for a subsequent file creation event associated with linking, before analyzing process execution and any network connections that occur afterward. It specifically excludes known legitimate processes to reduce false positives and categorizes the behavior as an indicator of a compromise when unusual connections are observed. The guidance provided supports security teams in investigating alerts effectively and implementing remediation steps should a threat be confirmed.
Categories
  • Endpoint
  • Linux
Data Sources
  • Process
  • File
  • Network Traffic
  • Container
ATT&CK Techniques
  • T1059
  • T1059.004
  • T1071
Created: 2023-08-28