osquery-defense-kit/detection/execution/tiny-executable-events.sql

52 lines
1.3 KiB
SQL

-- Unusually small programs (events-based)
--
-- references:
-- * https://cybersecurity.att.com/blogs/labs-research/shikitega-new-stealthy-malware-targeting-linux
--
-- interval: 30
-- tags: transient process events
SELECT
p.pid,
p.path,
p.cmdline,
file.size,
file.type,
p.mode,
p.cwd,
p.euid,
p.parent,
p.syscall,
pp.path AS parent_path,
pp.name AS parent_name,
pp.cmdline AS parent_cmdline,
pp.euid AS parent_euid,
hash.sha256 AS child_sha256,
phash.sha256 AS parent_sha256,
magic.data AS magic
FROM
process_events p
LEFT JOIN file ON p.path = file.path
LEFT JOIN processes pp ON p.parent = pp.pid
LEFT JOIN hash ON p.path = hash.path
LEFT JOIN hash phash ON pp.path = phash.path
LEFT JOIN magic ON p.path = magic.path
WHERE
p.time > (strftime('%s', 'now') -30)
AND file.size > 0
AND file.size < 10000
AND file.type = 'regular'
AND p.path NOT LIKE '%.sh'
AND p.path NOT LIKE '%.py'
AND p.path NOT LIKE '%.rb'
AND p.path != '/sbin/ldconfig'
AND NOT (
p.path LIKE '/Users/%'
AND magic.data LIKE 'POSIX shell script%'
)
AND p.path NOT LIKE '/private/var/folders/%/T/iTerm2-scrip%sh'
-- Removes a false-positive we've seen on Linux, generated through 'runc init'
AND NOT (
p.path = "/"
AND file.size < 8192
)