Query Details
# Rule: Detection of Suspicious File Creation Related to TripleCrosse eBPF Backdoor ## Description This detection rule identifies the creation of suspicious files named "ebpfbackdoor" or "rootlog" on Linux systems. These files are associated with malicious activities, such as the installation of rootkits or backdoors. The creation of such files can indicate an attempt to establish persistence or hide unauthorized activities on the system. This rule monitors for the creation of files with names indicative of known malicious tools, focusing on files that are not typically present in legitimate environments. - [Sigma Rule: TripleCross Rootkit Lock File](https://github.com/SigmaHQ/sigma/blob/0bb6f0c0d75ae3e1c37f9ab77d68f20cdb32ecd3/rules/linux/file_event/file_event_lnx_triple_cross_rootkit_lock_file.yml) - [Sigma Rule: TripleCross Rootkit Persistence](https://github.com/SigmaHQ/sigma/blob/0bb6f0c0d75ae3e1c37f9ab77d68f20cdb32ecd3/rules/linux/file_event/file_event_lnx_triple_cross_rootkit_persistence.yml) ## Detection Logic - Monitors `DeviceFileEvents` for events where: - The `ActionType` is "FileCreated". - The `FileName` contains "ebpfbackdoor" or "rootlog". ## Tags - File Events - Persistence - Rootkit - eBPF Backdoor - Linux Security - Suspicious Activity ## Search Query ```kql DeviceFileEvents | where ActionType == "FileCreated" | where FileName contains "ebpfbackdoor" or FileName contains "rootlog"
This query is designed to detect the creation of suspicious files on Linux systems that could indicate malicious activities, such as the installation of rootkits or backdoors. Specifically, it looks for files named "ebpfbackdoor" or "rootlog," which are associated with known malicious tools. The query monitors file creation events and flags any instances where these suspicious file names appear. This helps in identifying potential security threats and unauthorized activities on the system.

Ali Hussein
Released: July 8, 2024
Tables
Keywords
Operators