-- Find unexpected regular files in /var/run -- -- false positives: -- * none known -- -- references: -- * https://sandflysecurity.com/blog/bpfdoor-an-evasive-linux-backdoor-technical-analysis/ -- -- tags: persistent -- platform: linux SELECT file.filename, uid, gid, mode, file.ctime, file.atime, file.mtime, file.size, hash.sha256, magic.data FROM file LEFT JOIN hash on file.path = hash.path LEFT JOIN magic ON file.path = magic.path WHERE file.directory = "/var/run" AND file.type = "regular" AND file.filename NOT IN ( 'acpid.pid', 'agetty.reload', 'alsactl.pid', 'apcupsd.pid', 'apport.lock', 'atd.pid', 'adduser', 'lima-boot-done', 'lima-ssh-ready', 'machine-id', 'motd.dynamic', 'multipathd.pid', 'auditd.pid', 'cron.reboot', 'crond.pid', 'crond.reboot', 'dnf-metadata.lock', 'docker.pid', 'firefox-restart-required', 'gdm3.pid', 'gssproxy.pid', 'haproxy.pid', 'lightdm.pid', 'mcelog.pid', 'motd', 'nvidia-powerd.pid', 'nvidia_runtimepm_enabled', 'nvidia_runtimepm_supported', 'reboot-required', 'reboot-required.pkgs', 'rsyslogd.pid', 'sm-notify.pid', 'sshd.pid', 'u-d-c-nvidia-drm-was-loaded', 'u-d-c-nvidia-was-loaded', 'ufw.lock', 'unattended-upgrades.lock', 'unattended-upgrades.pid', 'unattended-upgrades.progress', 'utmp', 'xtables.lock', 'zed.pid', 'zed.state', 'zfs_fs_name', 'zfs_unlock_complete' ) AND NOT file.filename LIKE 'u-d-c-gpu-0%' GROUP BY file.path;