File tree Expand file tree Collapse file tree 1 file changed +45
-0
lines changed
rules/linux/process_creation Expand file tree Collapse file tree 1 file changed +45
-0
lines changed Original file line number Diff line number Diff line change 1+ title : Suspicious Child Process of Azure Run Command on Linux
2+ id : 8c452236-7341-5236-a362-236152152514
3+ related :
4+ - id : 5a2e6f43-85f2-4e6a-8d3b-9c2e1f4a5b6c
5+ type : similar
6+ status : experimental
7+ description : |
8+ Detects suspicious commands spawned by shell scripts running under the Azure Run Command
9+ extension context on Linux virtual machines.
10+ author : Vladan Sekulic
11+ date : 2025-12-17
12+ references :
13+ - https://cloud.google.com/blog/topics/threat-intelligence/azure-run-command-dummies
14+ logsource :
15+ product : linux
16+ category : process_creation
17+ detection :
18+ selection_parent :
19+ ParentCommandLine|contains|all :
20+ - ' /bin/sh'
21+ - ' /var/lib/waagent/run-command/download/'
22+ - ' /script.sh'
23+
24+ selection_child :
25+ Image|endswith :
26+ - ' /whoami' # recon
27+ - ' /id'
28+ - ' /nc' # reverse shells
29+ - ' /ncat'
30+ - ' /netcat'
31+ - ' /python' # interactive shells
32+ - ' /python3'
33+ - ' /perl'
34+ - ' /socat' # port forwarding/shell
35+
36+ condition : selection_parent and selection_child
37+ falsepositives :
38+ - Custom admin scripts invoking specific diagnostics
39+ - Legitimate python automation scripts pushed via Azure
40+ level : high
41+ tags :
42+ - attack.execution
43+ - attack.t1059.004
44+ - attack.discovery
45+ - attack.t1033
You can’t perform that action at this time.
0 commit comments