
Summary
The rule monitors for the modification of the executable permission on scripts located in directories that are often targeted for malicious persistence in Linux environments. Specifically, it triggers an alert when the executable bit is set on certain scripts, indicating the potential establishment of a persistent mechanism by adversaries. Malicious actors can exploit executable scripts to run unwanted code automatically at startup or at predetermined intervals. This rule uses Elastic Query Language (EQL) to search for events where processes, particularly permissions changes, occur in specified directories renowned for startup scripts and system configurations. The detection focuses on actions by processes such as 'chmod' and 'install' within these directories, ensuring that changes are flagged unless they originate from trusted sources like package managers. An alert from this rule may suggest the presence of a persistence threat, prompting further investigation to ascertain the nature and legitimacy of the permissions change.
Categories
- Endpoint
- Linux
Data Sources
- File
- Process
- Container
- Application Log
- Script
ATT&CK Techniques
- T1037
- T1037.004
- T1053
- T1053.003
- T1547
- T1547.013
Created: 2024-06-03