heroui logo

Unusual Kill Signal

Elastic Detection Rules

View Source
Summary
This detection rule identifies the use of unusual kill signals within a Linux environment, specifically those signals falling within the range of 32-64. Such signals are not typically associated with standard process termination activities and may indicate malicious actions, like privilege escalation or evasion methods used by rootkits. The rule leverages Elastic Query Language (EQL) for its implementation and pulls data from specific index patterns related to auditd logs. To effectively utilize this rule, the `auditd_manager` integration must be configured in the system to monitor kernel events. Additionally, the rule necessitates the implementation of a specific audit rule to catch kill system calls, enhancing overall detection capability for potentially harmful operations.
Categories
  • Endpoint
  • Linux
  • On-Premise
  • Infrastructure
Data Sources
  • Process
  • Kernel
  • Service
ATT&CK Techniques
  • T1014
Created: 2025-07-16