Skip to content

Hide Navigation Hide TOC

Linux Setuid Capability Set on a Binary via Setcap Utility (ed447910-bc30-4575-a598-3a2e49516a7a)

Detects the use of the 'setcap' utility to set the 'setuid' capability (cap_setuid) on a binary file. This capability allows a non privileged process to make arbitrary manipulations of user IDs (UIDs), including setting its current UID to a value that would otherwise be restricted (i.e. UID 0, the root user). This behavior can be used by adversaries to backdoor a binary in order to escalate privileges again in the future if needed.

Cluster A Galaxy A Cluster B Galaxy B Level
Linux Setuid Capability Set on a Binary via Setcap Utility (ed447910-bc30-4575-a598-3a2e49516a7a) Sigma-Rules Abuse Elevation Control Mechanism - T1548 (67720091-eee3-4d2d-ae16-8264567f6f5b) Attack Pattern 1
Linux Setuid Capability Set on a Binary via Setcap Utility (ed447910-bc30-4575-a598-3a2e49516a7a) Sigma-Rules Compromise Host Software Binary - T1554 (960c3c86-1480-4d72-b4e0-8c242e84a5c5) Attack Pattern 1