heroui logo

Kernel Module Load from Unusual Location

Elastic Detection Rules

View Source
Summary
This detection rule identifies the loading of kernel modules from unusual locations, a technique often employed by threat actors to establish persistence on compromised systems using rootkits. The rule is significant in detecting kernel-level injections, which are stealthy and can evade traditional security mechanisms. By monitoring for processes that execute loading commands like `insmod` or `modprobe` from atypical directories, such as `/tmp`, `/dev/shm`, or other writable paths, the rule helps in identifying potentially malicious activities. The detection strategy involves analyzing process activities that deviate from normal behavior, particularly focusing on the origin of module loading. Investigation steps include gathering command lines, checking module registration with the kernel, and reviewing system logs for anomalous behavior. False positives might arise from legitimate administrative tasks or recovery operations involving unusual directory paths. To mitigate the risks posed by detected threats, the rule outlines steps for containment, module removal, and recovery procedures while recommending hardening strategies for Linux environments to prevent such events from recurring.
Categories
  • Endpoint
  • Linux
Data Sources
  • Process
  • File
ATT&CK Techniques
  • T1547
  • T1547.006
  • T1014
Created: 2026-02-20