Excited for @hack_lu! In addition to my planned talk, I'll conduct a 90-min workshop to introduce Kunai: your new Linux threat-hunting tool (an alternative to #SysmonForLinux). See you there! More info: https://github.com/0xrawsec/kunai
GitHub - 0xrawsec/kunai: Threat-hunting tool for Linux

Threat-hunting tool for Linux. Contribute to 0xrawsec/kunai development by creating an account on GitHub.

GitHub
If you are looking for a #SysmonForLinux alternative or if you are just curious ! Take a look to kunai: https://why.kunai.rocks/
I am currently working on making the project buildable to everyone, without having to compile LLVM ... If you want to try the stuff out, there is a pre-compiled binary on GitHub: https://github.com/0xrawsec/kunai/releases/tag/v0.1.0
I am heavily interested by feedbacks (positive or not) so don't hesitate to share your thoughts !
#ebpf #linux #threathunting #dfir
Bring your Linux Threat-Hunting capabilities to the next level | Kunai

Description will go into a meta tag in <head />

Lack of error checking on calls to UTF8toUTF16, rule filter bypass · Issue #83 · Sysinternals/SysmonForLinux

Summary Event filtering in Sysmon For Linux incorrectly assumes event data, such as executable image paths, will be valid UTF-8 and that conversion to UTF-16 will always succeed. This can result in...

GitHub

I should probably take a look at auditd logs that are available and compare the telemetry to Sysmon, seeing if it's better at filling in the missing info in Sysmon.

#Sysmonforlinux #Wine #Linux

Linux-Detection/chmod_file_executable.yml at main · exeronn/Linux-Detection

Rules and other artifacts related to Linux compromise / malware detection - Linux-Detection/chmod_file_executable.yml at main · exeronn/Linux-Detection

GitHub

The decompiled interpretation from ghidra of the main function.
This is a link to the sample executed - https://bazaar.abuse.ch/sample/990628a2402ee9d0c66f52bd4ce24f039dc01b30fb1146df741d93a396a07cac/

#SysmonforLinux

MalwareBazaar | Checking your browser

A few bits from this one, using echo directly into crontab & attempting to mount /tmp over the PID in /proc/ as likely a stealth method. Not running as root prevented the mount command so I ran it as root to test it.

Sigma rule for mount - https://github.com/exeronn/Linux-Detection/blob/main/Sigma/suspicious_mount_against_proc.yml

#Sigma #Sysmonforlinux

Another compiled python sample, with better stealth than the previous one. Its files are located in /dev/shm/.p/, it uses a process hider to change the name for ps and similar output and the compiled python code isn't listed in objdump.

#SysmonforLinux

A fairly crude, yet relatively well functioned perl implant. Supports Scanning, log cleanup, DOS and arbitary command execution. Whilst it was simple it was good for 8 new sigma rules!

#Sigma #SysmonforLinux #Perl #Malware

1/

I also created a Sysmon config with the required sections that can be merged with a current config to record the specific event types

https://github.com/exeronn/Linux-Detection/blob/main/Sysmon/Execution/T1059-006_sysmon_pyInstaller.xml

#SysmonforLinux #Sigma #PyInstaller #Python

end/

Linux-Detection/T1059-006_sysmon_pyInstaller.xml at main · exeronn/Linux-Detection

Rules and other artifacts related to Linux compromise / malware detection - Linux-Detection/T1059-006_sysmon_pyInstaller.xml at main · exeronn/Linux-Detection

GitHub