Skip to content

<<< Hide Navigation Hide TOC >>>

Suspicious Commands Linux (1543ae20-cbdf-4ec1-8d12-7664d667a825)

Detects relevant commands often related to malware or hacking activity

Galaxy ColorsAttack Pat...Sigma-Rule...
Rows: 2
Loading extensions...
Collapse filters
Use the filters above each column to filter and limit table data. Advanced searches can be performed by using the following operators:
<, <=, >, >=, =, *, !, {, }, ||,&&, [empty], [nonempty], rgx:
Learn more

TableFilter v0.7.2

https://www.tablefilter.com/
©2015-2025 Max Guglielmi
?
Cluster A Galaxy A Cluster B Galaxy B Level
Unix Shell - T1059.004 (a9d4b653-6915-42af-98b2-5758c4ceee56) Attack Pattern Suspicious Commands Linux (1543ae20-cbdf-4ec1-8d12-7664d667a825) Sigma-Rules 1
Command and Scripting Interpreter - T1059 (7385dfaf-6886-4229-9ecd-6fd678040830) Attack Pattern Unix Shell - T1059.004 (a9d4b653-6915-42af-98b2-5758c4ceee56) Attack Pattern 2