Local System Accounts Discovery - Linux

Detects enumeration of local systeam accounts. This information can help adversaries determine which local accounts exist on a system to aid in follow-on behavior.

Sigma rule (View on GitHub)

 1title: Local System Accounts Discovery - Linux
 2id: b45e3d6f-42c6-47d8-a478-df6bd6cf534c
 3status: test
 4description: Detects enumeration of local systeam accounts. This information can help adversaries determine which local accounts exist on a system to aid in follow-on behavior.
 5references:
 6    - https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1087.001/T1087.001.md
 7author: Alejandro Ortuno, oscd.community
 8date: 2020-10-08
 9modified: 2024-08-10
10tags:
11    - attack.discovery
12    - attack.t1087.001
13logsource:
14    category: process_creation
15    product: linux
16detection:
17    selection_1:
18        Image|endswith: '/lastlog'
19    selection_2:
20        CommandLine|contains: '''x:0:'''
21    selection_3:
22        Image|endswith:
23            - '/cat'
24            - '/ed'
25            - '/head'
26            - '/more'
27            - '/nano'
28            - '/tail'
29            - '/vi'
30            - '/vim'
31        CommandLine|contains:
32            - '/etc/passwd'
33            - '/etc/shadow'
34            - '/etc/sudoers'
35    selection_4:
36        Image|endswith: '/id'
37    selection_5:
38        Image|endswith: '/lsof'
39        CommandLine|contains: '-u'
40    condition: 1 of selection*
41falsepositives:
42    - Legitimate administration activities
43level: low

References

Related rules

to-top