heroui logo

Linux Base64 Encoded Shebang In CLI

Sigma Rules

View Source
Summary
The detection rule identifies instances where base64 encoded shebangs are present in the command line arguments of processes running on a Linux operating system. A shebang (#!) at the start of a script indicates which interpreter to use for executing the script. If the shebang itself is encoded in base64, it may suggest an attempt to obfuscate malicious payloads that could be executed when decoded. This behavior is commonly associated with various cyber threats attempting to bypass defenses and execute code in a concealed manner. The specified patterns in the detection involve common base64 prefixes that suggest the presence of base64 encoded scripts. The rule supports incident response and threat hunting by flagging command executions that potentially indicate malicious activities. This enables security teams to take appropriate action to investigate and mitigate risks.
Categories
  • Linux
  • Endpoint
Data Sources
  • Command
  • Process
Created: 2022-09-15