ESXi VSAN Information Discovery Via ESXCLI
Detects execution of the "esxcli" command with the "vsan" flag in order to retrieve information about virtual storage. Seen used by malware such as DarkSide.
Sigma rule (View on GitHub)
1title: ESXi VSAN Information Discovery Via ESXCLI
2id: d54c2f06-aca9-4e2b-81c9-5317858f4b79
3status: test
4description: Detects execution of the "esxcli" command with the "vsan" flag in order to retrieve information about virtual storage. Seen used by malware such as DarkSide.
5references:
6 - https://www.trendmicro.com/en_us/research/21/e/darkside-linux-vms-targeted.html
7 - https://www.trendmicro.com/en_us/research/22/a/analysis-and-Impact-of-lockbit-ransomwares-first-linux-and-vmware-esxi-variant.html
8 - https://developer.broadcom.com/xapis/esxcli-command-reference/7.0.0/namespace/esxcli_vsan.html
9author: Nasreddine Bencherchali (Nextron Systems), Cedric Maurugeon
10date: 2023-09-04
11tags:
12 - attack.discovery
13 - attack.execution
14 - attack.t1033
15 - attack.t1007
16 - attack.t1059.012
17logsource:
18 category: process_creation
19 product: linux
20detection:
21 selection_img:
22 Image|endswith: '/esxcli'
23 CommandLine|contains: 'vsan'
24 selection_cli:
25 CommandLine|contains:
26 - ' get'
27 - ' list'
28 condition: all of selection_*
29falsepositives:
30 - Legitimate administration activities
31# Note: level can be reduced to low in some envs
32level: medium
References
Related rules
- ESXi Network Configuration Discovery Via ESXCLI
- ESXi Storage Information Discovery Via ESXCLI
- ESXi System Information Discovery Via ESXCLI
- ESXi VM List Discovery Via ESXCLI
- HackTool - PCHunter Execution