Persistence (TA0003)(external, opens in a new tab or window)
text code block:host.os.type:linux and event.type:start and event.action:exec and process.parent.name:exim4 and not process.name:( exim4 or start-stop-daemon or run-parts or systemctl or update-exim4.conf or install or plymouth or readlink or grep or stat or cmake or gcc or cppcheck or sort or sshd )
Install detection rules in Elastic Security
Detect Unusual Exim4 Child Process in the Elastic Security detection engine by installing this rule into your Elastic Stack.
To setup this rule, check out the installation guide for Prebuilt Security Detection Rules(external, opens in a new tab or window).