heroui logo

System Binary Moved or Copied

Elastic Detection Rules

View Source
Summary
This detection rule, developed by Elastic, is designed to identify potentially malicious activities where system binaries are copied or moved within a Linux environment. Adversaries may attempt to evade security measures by relocating system binaries to obscure locations, often renaming them to avoid detection. The rule triggers on specific events indicating that a file (system binary) was renamed, which typically should occur infrequently in normal operations. By monitoring the paths commonly associated with system binaries, such as those located in /bin, /usr/bin, and /sbin, and excluding known legitimate processes and common system package managers, this rule aims to flag suspicious behavior indicative of tactics such as masquerading. If triggered, it is crucial to perform a thorough investigation of the activity to ascertain if it is a legitimate administrative task or potentially malicious behavior.
Categories
  • Endpoint
Data Sources
  • File
ATT&CK Techniques
  • T1036
  • T1036.003
  • T1564
Created: 2023-08-29