
Summary
This rule identifies modifications made to the dynamic linker preload shared object file, often referred to as `/etc/ld.so.preload`, in Linux environments. The dynamic linker preload mechanism allows shared libraries to be loaded before others, which is a pathway that adversaries exploit by inserting malicious libraries to hijack processes during execution, enabling privilege escalation or malicious activity. The rule monitors events related to file changes, specifically updates or renaming actions excluding deletions, and filters out benign activities that involve certain processes (`wine`, `oneagentinstallaction`). If unauthorized changes to this critical file are detected, it raises an alert, indicating potential malicious behavior intended to gain higher privileges or execute malicious payloads. The rule's query is built around monitoring the `event.category`, `event.action`, and specific file path conditions, promoting rapid incident response for any suspicious activities detected.
Categories
- Endpoint
- Linux
- Infrastructure
Data Sources
- File
- Process
- Command
ATT&CK Techniques
- T1574
- T1574.006
Created: 2021-01-27