Triple Cross eBPF Rootkit Install Commands
Detects default install commands of the Triple Cross eBPF rootkit based on the "deployer.sh" script
Sigma rule (View on GitHub)
1title: Triple Cross eBPF Rootkit Install Commands
2id: 22236d75-d5a0-4287-bf06-c93b1770860f
3status: test
4description: Detects default install commands of the Triple Cross eBPF rootkit based on the "deployer.sh" script
5references:
6 - https://github.com/h3xduck/TripleCross/blob/1f1c3e0958af8ad9f6ebe10ab442e75de33e91de/apps/deployer.sh
7author: Nasreddine Bencherchali (Nextron Systems)
8date: 2022-07-05
9tags:
10 - attack.defense-evasion
11 - attack.t1014
12logsource:
13 category: process_creation
14 product: linux
15detection:
16 selection:
17 Image|endswith: '/sudo'
18 CommandLine|contains|all:
19 - ' tc '
20 - ' enp0s3 '
21 CommandLine|contains:
22 - ' qdisc '
23 - ' filter '
24 condition: selection
25falsepositives:
26 - Unlikely
27level: high
References
Related rules
- AD Object WriteDAC Access
- ADS Zone.Identifier Deleted By Uncommon Application
- AMSI Bypass Pattern Assembly GetType
- APT PRIVATELOG Image Load Pattern
- APT27 - Emissary Panda Activity