Files
blue-team-tools/rules/linux/auditd/lnx_auditd_masquerading_crond.yml
T
2021-11-27 11:33:14 +01:00

25 lines
778 B
YAML

title: Masquerading as Linux Crond Process
id: 9d4548fa-bba0-4e88-bd66-5d5bf516cda0
status: test
description: Masquerading occurs when the name or location of an executable, legitimate or malicious, is manipulated or abused for the sake of evading defenses and observation. Several different variations of this technique have been observed.
author: Timur Zinniatullin, oscd.community
references:
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1036.003/T1036.003.md
date: 2019/10/21
modified: 2021/11/27
logsource:
product: linux
service: auditd
detection:
selection:
type: 'execve'
a0: 'cp'
a1: '-i'
a2: '/bin/sh'
a3|endswith: '/crond'
condition: selection
level: medium
tags:
- attack.defense_evasion
- attack.t1036.003