Suspicious Filename with Embedded Base64 Commands
Detects files with specially crafted filenames that embed Base64-encoded bash payloads designed to execute when processed by shell scripts. These filenames exploit shell interpretation quirks to trigger hidden commands, a technique observed in VShell malware campaigns.
Sigma rule (View on GitHub)
1title: Suspicious Filename with Embedded Base64 Commands
2id: 179b3686-6271-4d87-807d-17d843a8af73
3status: experimental
4description: |
5 Detects files with specially crafted filenames that embed Base64-encoded bash payloads designed to execute when processed by shell scripts.
6 These filenames exploit shell interpretation quirks to trigger hidden commands, a technique observed in VShell malware campaigns.
7references:
8 - https://www.trellix.com/blogs/research/the-silent-fileless-threat-of-vshell/
9author: '@kostastsale'
10date: 2025-11-22
11tags:
12 - attack.execution
13 - attack.t1059.004
14 - attack.defense-evasion
15 - attack.t1027
16logsource:
17 product: linux
18 category: file_event
19detection:
20 selection:
21 TargetFilename|contains:
22 - '{echo'
23 - '{base64,-d}'
24 condition: selection
25falsepositives:
26 - Legitimate files with similar naming patterns (very unlikely).
27level: high
References
Related rules
- Potential Emotet Activity
- PowerShell Base64 Encoded Reflective Assembly Load
- Suspicious Encoded And Obfuscated Reflection Assembly Load Function Call
- Turla Group Commands May 2020
- Operation Wocao Activity