History File Deletion

Detects events in which a history file gets deleted, e.g. the ~/bash_history to remove traces of malicious activity

Sigma rule (View on GitHub)

 1title: History File Deletion
 2id: 1182f3b3-e716-4efa-99ab-d2685d04360f
 3status: test
 4description: Detects events in which a history file gets deleted, e.g. the ~/bash_history to remove traces of malicious activity
 5references:
 6    - https://github.com/sleventyeleven/linuxprivchecker/
 7    - https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1552.003/T1552.003.md
 8author: Florian Roth (Nextron Systems)
 9date: 2022-06-20
10modified: 2022-09-15
11tags:
12    - attack.impact
13    - attack.t1565.001
14logsource:
15    category: process_creation
16    product: linux
17detection:
18    selection:
19        Image|endswith:
20            - '/rm'
21            - '/unlink'
22            - '/shred'
23    selection_history:
24        - CommandLine|contains:
25              - '/.bash_history'
26              - '/.zsh_history'
27        - CommandLine|endswith:
28              - '_history'
29              - '.history'
30              - 'zhistory'
31    condition: all of selection*
32falsepositives:
33    - Legitimate administration activities
34level: high

References

Related rules

to-top