IMPORTANT: This documentation is no longer updated. Refer to Elastic's version policy and the latest documentation.

File Deletion via Shred

edit

Identifies file deletions using the shred command. Malware or other files dropped or created on a system by an adversary may leave traces behind as to what was done within a network and how. Adversaries may remove these files over the course of an intrusion to keep their footprint low or remove them at the end as part of the post-intrusion cleanup process.

Rule type: query

Rule indices:

  • auditbeat-*

Severity: low

Risk score: 21

Runs every: 5 minutes

Searches indices from: now-6m (Date Math format, see also Additional look-back time)

Maximum signals per execution: 100

Tags:

  • Elastic
  • Linux

Version: 1

Added (Elastic Stack release): 7.8.0

Rule query

edit
event.action:(executed or process_started) and process.name:shred and
process.args:("-u" or "--remove" or "-z" or "--zero")

Threat mapping

edit

Framework: MITRE ATT&CKTM