Loading

Linux Restricted Shell Breakout via crash Shell evasion

Warning

This rule has been deprecated as of 2022/05/09.

Identifies Linux binary crash abuse to break out from restricted environments by spawning an interactive system shell. The crash utility helps analyze Linux crash dump data or a live system and the activity of spawning a shell is not a standard use of this binary by a user or system administrator. It indicates a potentially malicious actor attempting to improve the capabilities or stability of their access.

Rule type: eql
Rule indices:

  • logs-endpoint.events.*

Rule Severity: medium
Risk Score: 47
Runs every:
Searches indices from: now-9m
Maximum alerts per execution: 100
References:

Tags:

  • Elastic
  • Host
  • Linux
  • Threat Detection
  • Execution
  • GTFOBins

Version: 100
Rule authors:

  • Elastic

Rule license: Elastic License v2

process where event.type == "start" and process.parent.name == "crash" and process.parent.args == "-h" and process.name == "sh"
		

Framework: MITRE ATT&CK