
Summary
The rule "Multi-Base64 Decoding Attempt from Suspicious Location" developed by Elastic is designed to detect unusual activity related to the execution of multiple base64 decoding commands on Linux systems. This type of behavior is often employed by attackers to obfuscate malicious payloads or commands, making them difficult to detect. The EQL (Event Query Language) rule monitors process execution events in a sequence to identify any instances where processes associated with base64 decoding, such as `base64`, `base64plain`, or similar, are executed from suspicious directories like temporary folders (`/tmp/*`, `/var/tmp*`, `/dev/shm/*`, etc.). The rule sets specific criteria to filter out legitimate processes while flagging potentially harmful ones that are utilizing base64 decoding methods in a manner indicative of obfuscation or malicious intent. The implementation requires configuration through Elastic Defend, integrated within the Elastic Agent, and is valid only for Linux systems. With a low severity and a risk score of 21, the detection holds relevance for security teams monitoring endpoint threats in real-time.
Categories
- Endpoint
- Linux
Data Sources
- Process
- Command
ATT&CK Techniques
- T1027
- T1140
- T1059
- T1059.004
- T1204
- T1204.002
Created: 2025-07-24