
Summary
This detection rule identifies instances where the 'find' command is executed on a Linux system, specifically targeting arguments that imply an exploration of VMware-related paths. The specified paths include "/etc/vmware/", "/usr/lib/vmware/", and "/vmfs/*", which are associated with VMware virtualization environments. The presence of these paths in the command's arguments may indicate that a threat actor is attempting to search for or manipulate VM-related files or configurations. The rule is designed to trigger when the command is executed with alternative actions of process starting, excluding legitimate processes that should not raise alerts, hence reducing false positives. It leverages data from various Elastic product integrations, making it crucial for environments running VMware to monitor for such processes to prevent potential reconnaissance or malicious activities.
Categories
- Linux
- On-Premise
- Endpoint
- Cloud
Data Sources
- Process
- Command
- User Account
- Network Traffic
- File
ATT&CK Techniques
- T1518
Created: 2023-04-11