-- Find unexpected regular files in /var/run -- -- false positives: -- * none known -- -- references: -- * https://sandflysecurity.com/blog/bpfdoor-an-evasive-linux-backdoor-technical-analysis/ -- -- tags: persistent -- platform: linux SELECT file.filename, uid, gid, mode, file.ctime, file.atime, file.mtime, file.size, hash.sha256, magic.data FROM file LEFT JOIN hash on file.path = hash.path LEFT JOIN magic ON file.path = magic.path WHERE file.directory = "/var/run" AND file.type = "regular" AND file.filename NOT IN ( 'acpid.pid', 'agetty.reload', 'alsactl.pid', 'apcupsd.pid', 'apport.lock', 'dnf-metadata.lock', 'atd.pid', 'unattended-upgrades.pid', "auditd.pid", "crond.pid", 'crond.reboot', "cron.reboot", "docker.pid", 'firefox-restart-required', 'gdm3.pid', 'gssproxy.pid', 'haproxy.pid', "lightdm.pid", 'mcelog.pid', 'motd', 'nvidia-powerd.pid', 'nvidia_runtimepm_enabled', 'nvidia_runtimepm_supported', 'reboot-required', 'reboot-required.pkgs', 'rsyslogd.pid', 'sm-notify.pid', 'sshd.pid', 'u-d-c-nvidia-drm-was-loaded', 'u-d-c-nvidia-was-loaded', 'unattended-upgrades.lock', 'unattended-upgrades.progress', "utmp", "xtables.lock", 'zed.pid', 'zed.state', 'zfs_fs_name', 'zfs_unlock_complete' ) AND NOT file.filename LIKE 'u-d-c-gpu-0%' GROUP BY file.path;