Skip to content

Commit b356ca6

Browse files
committed
Add threat hunting rule for single-character binary execution
Detects execution of binaries with single-character names (e.g., r.exe, a.exe) which are commonly used by attackers to evade detection or as quick implants. Reference: CERT Polska Energy Sector Incident Report 2025
1 parent 76f4a42 commit b356ca6

File tree

3 files changed

+90
-0
lines changed

3 files changed

+90
-0
lines changed
Lines changed: 30 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,30 @@
1+
title: Single Character Binary Execution
2+
id: d9f65919-9d42-4f5a-86a4-7d894258e5a7
3+
related:
4+
- id: 87376963-de41-4a56-8694-7412118697eb
5+
type: similar
6+
- id: bab56d17-5154-416f-bea0-a725fdd18f42
7+
type: similar
8+
status: experimental
9+
description: |
10+
Detects execution of binaries with single-character names (e.g., 'a', 'x').
11+
Attackers may use short filenames to evade detection, reduce forensic footprint, or as quick implants.
12+
references:
13+
- https://cert.pl/uploads/docs/CERT_Polska_Energy_Sector_Incident_Report_2025.pdf
14+
author: Norbert Jasniewicz (AlphaSOC)
15+
date: 2026-02-14
16+
tags:
17+
- attack.defense-evasion
18+
- attack.t1036
19+
- detection.threat-hunting
20+
logsource:
21+
product: linux
22+
category: process_creation
23+
detection:
24+
selection:
25+
Image|endswith: '/?'
26+
condition: selection
27+
falsepositives:
28+
- Legitimate software using single-character executable names
29+
- Some compilers may generate single character binaries by default
30+
level: low
Lines changed: 30 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,30 @@
1+
title: Single Character Binary Execution
2+
id: bab56d17-5154-416f-bea0-a725fdd18f42
3+
related:
4+
- id: 87376963-de41-4a56-8694-7412118697eb
5+
type: similar
6+
- id: d9f65919-9d42-4f5a-86a4-7d894258e5a7
7+
type: similar
8+
status: experimental
9+
description: |
10+
Detects execution of binaries with single-character names (e.g., 'a', 'o').
11+
Attackers may use short filenames to evade detection, reduce forensic footprint, or as quick implants.
12+
references:
13+
- https://cert.pl/uploads/docs/CERT_Polska_Energy_Sector_Incident_Report_2025.pdf
14+
author: Norbert Jasniewicz (AlphaSOC)
15+
date: 2026-02-14
16+
tags:
17+
- attack.defense-evasion
18+
- attack.t1036
19+
- detection.threat-hunting
20+
logsource:
21+
product: macos
22+
category: process_creation
23+
detection:
24+
selection:
25+
Image|endswith: '/?'
26+
condition: selection
27+
falsepositives:
28+
- Legitimate software using single-character executable names
29+
- Some compilers may generate single character binaries by default
30+
level: low
Lines changed: 30 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,30 @@
1+
title: Single Character Binary Execution
2+
id: 87376963-de41-4a56-8694-7412118697eb
3+
related:
4+
- id: bab56d17-5154-416f-bea0-a725fdd18f42
5+
type: similar
6+
- id: d9f65919-9d42-4f5a-86a4-7d894258e5a7
7+
type: similar
8+
status: experimental
9+
description: |
10+
Detects execution of binaries with single-character names (e.g., 'r.exe').
11+
Attackers may use short filenames to evade detection, reduce forensic footprint, or as quick implants.
12+
references:
13+
- https://cert.pl/uploads/docs/CERT_Polska_Energy_Sector_Incident_Report_2025.pdf
14+
author: Norbert Jasniewicz (AlphaSOC)
15+
date: 2026-02-14
16+
tags:
17+
- attack.defense-evasion
18+
- attack.t1036
19+
- detection.threat-hunting
20+
logsource:
21+
product: windows
22+
category: process_creation
23+
detection:
24+
selection:
25+
Image|endswith: '\\?.exe'
26+
condition: selection
27+
falsepositives:
28+
- Legitimate software using single-character executable names
29+
- Some compilers may generate single character binaries by default
30+
level: low

0 commit comments

Comments
 (0)