Potential Ruby Reverse Shell
Detects execution of ruby with the "-e" flag and calls to "socket" related functions. This could be an indication of a potential attempt to setup a reverse shell
Sigma rule (View on GitHub)
1title: Potential Ruby Reverse Shell
2id: b8bdac18-c06e-4016-ac30-221553e74f59
3status: test
4description: Detects execution of ruby with the "-e" flag and calls to "socket" related functions. This could be an indication of a potential attempt to setup a reverse shell
5references:
6 - https://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet
7 - https://www.revshells.com/
8author: '@d4ns4n_'
9date: 2023-04-07
10tags:
11 - attack.execution
12logsource:
13 category: process_creation
14 product: linux
15detection:
16 selection:
17 Image|contains: 'ruby'
18 CommandLine|contains|all:
19 - ' -e'
20 - 'rsocket'
21 - 'TCPSocket'
22 CommandLine|contains:
23 - ' ash'
24 - ' bash'
25 - ' bsh'
26 - ' csh'
27 - ' ksh'
28 - ' pdksh'
29 - ' sh'
30 - ' tcsh'
31 condition: selection
32falsepositives:
33 - Unknown
34level: medium
References
Related rules
- AADInternals PowerShell Cmdlets Execution - ProccessCreation
- AADInternals PowerShell Cmdlets Execution - PsScript
- AMSI Bypass Pattern Assembly GetType
- APT29 2018 Phishing Campaign CommandLine Indicators
- AWS EC2 Startup Shell Script Change