heroui logo

Suspicious Activity in Shell Commands

Sigma Rules

View Source
Summary
This rule is designed to detect suspicious shell command executions that are potentially associated with exploit attempts, particularly targeting Linux environments. The detection focuses on specific command patterns commonly seen in exploit kits and malicious scripts. These commands often involve downloading and executing payloads, managing firewall rules, or altering permissions in a way conducive to unauthorized access or persistence. The rule formulates its detections by analyzing command keywords in logs and raising alerts when it encounters patterns that match known exploit behaviors, as outlined in various references. The emphasis is placed on commands that could indicate attempts to download malicious content through tools like 'wget' or 'curl', as well as suspicious operations involving 'chmod' and 'nc' (netcat).
Categories
  • Linux
Data Sources
  • Command
  • Logon Session
Created: 2017-08-21