45 lines
1.4 KiB
YAML
45 lines
1.4 KiB
YAML
title: Program Executions in Suspicious Folders
|
|
id: a39d7fa7-3fbd-4dc2-97e1-d87f546b1bbc
|
|
status: test
|
|
description: Detects program executions in suspicious non-program folders related to malware or hacking activity
|
|
author: Florian Roth
|
|
references:
|
|
- Internal Research
|
|
date: 2018/01/23
|
|
modified: 2021/11/27
|
|
logsource:
|
|
product: linux
|
|
service: auditd
|
|
detection:
|
|
selection:
|
|
type: 'SYSCALL'
|
|
exe|startswith:
|
|
# Temporary folder
|
|
- '/tmp/'
|
|
# Web server
|
|
- '/var/www/' # Standard
|
|
- '/home/*/public_html/' # Per-user
|
|
- '/usr/local/apache2/' # Classical Apache
|
|
- '/usr/local/httpd/' # Old SuSE Linux 6.* Apache
|
|
- '/var/apache/' # Solaris Apache
|
|
- '/srv/www/' # SuSE Linux 9.*
|
|
- '/home/httpd/html/' # Redhat 6 or older Apache
|
|
- '/srv/http/' # ArchLinux standard
|
|
- '/usr/share/nginx/html/' # ArchLinux nginx
|
|
# Data dirs of typically exploited services (incomplete list)
|
|
- '/var/lib/pgsql/data/'
|
|
- '/usr/local/mysql/data/'
|
|
- '/var/lib/mysql/'
|
|
- '/var/vsftpd/'
|
|
- '/etc/bind/'
|
|
- '/var/named/'
|
|
condition: selection
|
|
falsepositives:
|
|
- Admin activity (especially in /tmp folders)
|
|
- Crazy web applications
|
|
level: medium
|
|
tags:
|
|
- attack.t1587
|
|
- attack.t1584
|
|
- attack.resource_development
|