SigmaHQ/rules/linux/lnx_susp_jexboss.yml

21 lines
507 B
YAML
Raw Normal View History

2018-11-08 22:21:21 +00:00
title: JexBoss Command Sequence
2019-11-12 22:12:27 +00:00
id: 8ec2c8b4-557a-4121-b87c-5dfb3a602fae
2018-11-08 22:21:21 +00:00
description: Detects suspicious command sequence that JexBoss
author: Florian Roth
date: 2017/08/24
2020-09-14 04:03:04 +00:00
references:
- https://www.us-cert.gov/ncas/analysis-reports/AR18-312A
2018-11-08 22:21:21 +00:00
logsource:
product: linux
detection:
selection1:
2018-11-08 22:21:21 +00:00
- 'bash -c /bin/bash'
selection2:
- '&/dev/tcp/'
condition: selection1 and selection2
falsepositives:
- Unknown
level: high
2020-09-14 04:03:04 +00:00
tags:
- attack.execution
- attack.t1059.004