Files
blue-team-tools/rules/linux/auditd/lnx_auditd_alter_bash_profile.yml
T

36 lines
919 B
YAML
Raw Normal View History

2020-01-30 17:26:09 +01:00
title: Edit of .bash_profile and .bashrc
2019-11-12 23:12:27 +01:00
id: e74e15cc-c4b6-4c80-b7eb-dfe49feb7fe9
2021-11-27 11:33:14 +01:00
status: test
2019-05-12 02:07:13 +02:00
description: Detects change of user environment. Adversaries can insert code into these files to gain persistence each time a user logs in or opens a new shell.
2020-09-13 22:03:04 -06:00
author: Peter Matkovski
2019-05-12 02:07:13 +02:00
references:
2021-11-27 11:33:14 +01:00
- 'MITRE Attack technique T1156; .bash_profile and .bashrc. '
date: 2019/05/12
2022-02-22 12:48:41 -03:00
modified: 2022/02/22
2019-05-12 02:07:13 +02:00
logsource:
2021-11-27 11:33:14 +01:00
product: linux
service: auditd
2019-05-12 02:07:13 +02:00
detection:
2021-11-27 11:33:14 +01:00
selection:
type: 'PATH'
name:
2022-02-21 10:15:48 -03:00
- '/root/.bashrc'
- '/root/.bash_profile'
- '/root/.profile'
2021-11-27 11:33:14 +01:00
- '/home/*/.bashrc'
- '/home/*/.bash_profile'
- '/home/*/.profile'
- '/etc/profile'
- '/etc/shells'
- '/etc/bashrc'
- '/etc/csh.cshrc'
- '/etc/csh.login'
condition: selection
2019-05-12 02:07:13 +02:00
falsepositives:
2021-11-27 11:33:14 +01:00
- Admin or User activity
2019-05-12 02:07:13 +02:00
level: medium
2020-09-13 22:03:04 -06:00
tags:
2021-11-27 11:33:14 +01:00
- attack.s0003
- attack.persistence
- attack.t1546.004