heroui logo

Potential Linux Credential Dumping via Proc Filesystem

Elastic Detection Rules

View Source
Summary
This detection rule identifies the execution of the mimipenguin exploit script, which is a Linux adaptation of the well-known Windows tool Mimikatz. The mimipenguin script is designed to dump clear text passwords from the currently logged-in user's session by exploiting vulnerability CVE-2018-20781. Malicious actors can utilize this technique to extract sensitive credentials from memory by analyzing the processes using the '/proc' filesystem. The rule uses an EQL query to detect sequences involving the execution of the 'ps' and 'strings' commands, which are common in efforts to capture clear text passwords. A risk score of 47 indicates a medium severity level for this possible attack on Linux systems. The associated investigation guide provides insights into investigating such incidents and steps to mitigate potential exploits.
Categories
  • Endpoint
  • Linux
Data Sources
  • Process
  • File
  • Command
  • Sensor Health
  • Application Log
ATT&CK Techniques
  • T1003
  • T1003.007
  • T1212
Created: 2023-04-26