Skip to content

Hide Navigation Hide TOC

Masquerading as Linux Crond Process (9d4548fa-bba0-4e88-bd66-5d5bf516cda0)

Masquerading occurs when the name or location of an executable, legitimate or malicious, is manipulated or abused for the sake of evading defenses and observation. Several different variations of this technique have been observed.

Cluster A Galaxy A Cluster B Galaxy B Level
Rename Legitimate Utilities - T1036.003 (bd5b58a4-a52d-4a29-bc0d-3f1d3968eb6b) Attack Pattern Masquerading as Linux Crond Process (9d4548fa-bba0-4e88-bd66-5d5bf516cda0) Sigma-Rules 1
Rename Legitimate Utilities - T1036.003 (bd5b58a4-a52d-4a29-bc0d-3f1d3968eb6b) Attack Pattern Masquerading - T1036 (42e8de7b-37b2-4258-905a-6897815e58e0) Attack Pattern 2