
Summary
This detection rule is designed to identify potentially malicious usage of Python scripts on Unix-like operating systems (including macOS and Linux) by monitoring for command-line invocations that include URL arguments. Specifically, it looks for instances where a URL is passed as an argument to a Python script located in suspicious directories such as /Users/, /tmp/, /var/tmp/, or /private/tmp/. The rule employs a SQL-like query structure against the CrowdStrike Falcon data and applies multiple regular expression (regexp) checks to ensure that the executed command interacts with specific shells (like zsh, bash, etc.) and that it conforms to the Python script pattern featuring a URL structure (http or https). This behavior may indicate payload delivery or execution in environments where malicious activities are prevalent, thus warranting alerts for further investigation.
Categories
- Endpoint
- macOS
- Linux
Data Sources
- Process
ATT&CK Techniques
- T1059.006
- T1059
Created: 2024-02-09