ID | Name |
---|---|
T1569.001 | Launchctl |
T1569.002 | Service Execution |
T1569.003 | Systemctl |
Adversaries may abuse systemctl to execute commands or programs. Systemctl is the primary interface for systemd, the Linux init system and service manager. Typically invoked from a shell, Systemctl can also be integrated into scripts or applications.
Adversaries may use systemctl to execute commands or programs as Systemd Services. Common subcommands include: systemctl start
, systemctl stop
, systemctl enable
, systemctl disable
, and systemctl status
.[1]
ID | Name | Description |
---|---|---|
G0139 | TeamTNT |
TeamTNT has created system services to execute cryptocurrency mining software.[2] |
ID | Mitigation | Description |
---|---|---|
M1018 | User Account Management |
Limit user access to |
ID | Data Source | Data Component | Detects |
---|---|---|---|
DS0017 | Command | Command Execution |
Monitor the execution of the Analytic 1 - Suspicious command execution of systemctl
|
DS0022 | File | File Modification |
Every systemd service must have a corresponding unit file on disk which can be monitored. Unit files are located in the Analytic 1 - suspicious modification of service unit files
|
DS0009 | Process | Process Creation |
Monitor for newly executed daemons that may abuse systemctl to execute commands or programs. Analytic 1 - suspicious process execution of systemctl
|
DS0019 | Service | Service Creation |
Monitor the creation or modification of system services via the Analytic 1 - suspicious systemctl service creation
|