Skip to content

Hide Navigation Hide TOC

Masquerading as Linux Crond Process (9d4548fa-bba0-4e88-bd66-5d5bf516cda0)

Masquerading occurs when the name or location of an executable, legitimate or malicious, is manipulated or abused for the sake of evading defenses and observation. Several different variations of this technique have been observed.

Cluster A Galaxy A Cluster B Galaxy B Level
Masquerading as Linux Crond Process (9d4548fa-bba0-4e88-bd66-5d5bf516cda0) Sigma-Rules Rename Legitimate Utilities - T1036.003 (bd5b58a4-a52d-4a29-bc0d-3f1d3968eb6b) Attack Pattern 1
Masquerading - T1036 (42e8de7b-37b2-4258-905a-6897815e58e0) Attack Pattern Rename Legitimate Utilities - T1036.003 (bd5b58a4-a52d-4a29-bc0d-3f1d3968eb6b) Attack Pattern 2