
Summary
This detection rule, developed by Elastic, is designed to identify potentially malicious activities where system binaries are copied or moved within a Linux environment. Adversaries may attempt to evade security measures by relocating system binaries to obscure locations, often renaming them to avoid detection. The rule triggers on specific events indicating that a file (system binary) was renamed, which typically should occur infrequently in normal operations. By monitoring the paths commonly associated with system binaries, such as those located in /bin, /usr/bin, and /sbin, and excluding known legitimate processes and common system package managers, this rule aims to flag suspicious behavior indicative of tactics such as masquerading. If triggered, it is crucial to perform a thorough investigation of the activity to ascertain if it is a legitimate administrative task or potentially malicious behavior.
Categories
- Endpoint
Data Sources
- File
ATT&CK Techniques
- T1036
- T1036.003
- T1564
Created: 2023-08-29