Skip to content

Hide Navigation Hide TOC

Masquerading as Linux Crond Process (9d4548fa-bba0-4e88-bd66-5d5bf516cda0)

Masquerading occurs when the name or location of an executable, legitimate or malicious, is manipulated or abused for the sake of evading defenses and observation. Several different variations of this technique have been observed.

Cluster A Galaxy A Cluster B Galaxy B Level
Masquerading as Linux Crond Process (9d4548fa-bba0-4e88-bd66-5d5bf516cda0) Sigma-Rules Rename System Utilities - T1036.003 (bd5b58a4-a52d-4a29-bc0d-3f1d3968eb6b) Attack Pattern 1
Rename System Utilities - T1036.003 (bd5b58a4-a52d-4a29-bc0d-3f1d3968eb6b) Attack Pattern Masquerading - T1036 (42e8de7b-37b2-4258-905a-6897815e58e0) Attack Pattern 2