Suspicious Nohup Execution

Rule Info

Name
Suspicious Nohup Execution
Author
Joseliyo Sanchez, @Joseliyo_Jstnk
Description
Detects execution of binaries located in potentially suspicious locations via "nohup"
Date
2023-06-02 00:00:00
Modified
None
Id
457df417-8b9d-4912-85f3-9dbda39c3645
Tags
attack.execution DEMO
Type
Community Rule

Rule History

Author
Title
Date
Commit
github-actions[bot]
Merge PR #4791 from @nasbench - Promote older rules status from `experimental` to `test`
2024-04-01
jstnk9
feat: new linux rules related to GobRAT malware (#4272)
2023-06-02