Uncommon Linux shell command execution

Cortex XSIAM Analytics Alert Reference by Alert name

Product
Cortex XSIAM
Last date published
2026-01-04
Category
Analytics Alert Reference
Index by
Alert name

Synopsis

Activation Period

14 Days

Training Period

30 Days

Test Period

N/A (single event)

Deduplication Period

1 Day

Required Data

  • Requires:
    • XDR Agent

Detection Modules

Detector Tags

Shell Analytics

ATT&CK Tactic

Execution (TA0002)

ATT&CK Technique

Severity

Informational

Description

An unusual process execution of a shell command on Linux. This action may indicate possible exploitation or shell command execution via a backdoor.

Attacker's Goals

An attacker may attempt to execute a malicious shell command on the system.

Investigative actions

  • Check whether the executing process is benign, and if this was a desired behavior as part of its normal execution flow.
  • Check the executed shell command (and possible child processes) for malicious actions.

Variations

Uncommon Linux shell command execution by a BAS solution

Synopsis

ATT&CK Tactic

Execution (TA0002)

ATT&CK Technique

Severity

High

Description

An unusual process execution of a shell command on Linux. This action may indicate possible exploitation or shell command execution via a backdoor.

Attacker's Goals

An attacker may attempt to execute a malicious shell command on the system.

Investigative actions

  • Check whether the executing process is benign, and if this was a desired behavior as part of its normal execution flow.
  • Check the executed shell command (and possible child processes) for malicious actions.


Uncommon Linux shell command execution disabling firewall

Synopsis

ATT&CK Tactic

ATT&CK Technique

Severity

High

Description

An unusual process execution of a shell command on Linux. This action may indicate possible exploitation or shell command execution via a backdoor.

Attacker's Goals

An attacker may attempt to execute a malicious shell command on the system.

Investigative actions

  • Check whether the executing process is benign, and if this was a desired behavior as part of its normal execution flow.
  • Check the executed shell command (and possible child processes) for malicious actions.


Uncommon Linux shell command execution, possibly running LinPEAS

Synopsis

ATT&CK Tactic

ATT&CK Technique

Severity

High

Description

An unusual process execution of a shell command on Linux. This action may indicate possible exploitation or shell command execution via a backdoor.

Attacker's Goals

An attacker may attempt to execute a malicious shell command on the system.

Investigative actions

  • Check whether the executing process is benign, and if this was a desired behavior as part of its normal execution flow.
  • Check the executed shell command (and possible child processes) for malicious actions.


Uncommon Linux shell command execution using exploitation tool

Synopsis

ATT&CK Tactic

Execution (TA0002)

ATT&CK Technique

Severity

High

Description

An unusual process execution of a shell command on Linux. This action may indicate possible exploitation or shell command execution via a backdoor.

Attacker's Goals

An attacker may attempt to execute a malicious shell command on the system.

Investigative actions

  • Check whether the executing process is benign, and if this was a desired behavior as part of its normal execution flow.
  • Check the executed shell command (and possible child processes) for malicious actions.


Uncommon Linux shell command execution taking a screenshot

Synopsis

ATT&CK Tactic

ATT&CK Technique

Severity

Low

Description

An unusual process execution of a shell command on Linux. This action may indicate possible exploitation or shell command execution via a backdoor.

Attacker's Goals

An attacker may attempt to execute a malicious shell command on the system.

Investigative actions

  • Check whether the executing process is benign, and if this was a desired behavior as part of its normal execution flow.
  • Check the executed shell command (and possible child processes) for malicious actions.


Uncommon Linux shell command execution trying to gather information about the system

Synopsis

ATT&CK Tactic

ATT&CK Technique

Severity

Low

Description

An unusual process execution of a shell command on Linux. This action may indicate possible exploitation or shell command execution via a backdoor.

Attacker's Goals

An attacker may attempt to execute a malicious shell command on the system.

Investigative actions

  • Check whether the executing process is benign, and if this was a desired behavior as part of its normal execution flow.
  • Check the executed shell command (and possible child processes) for malicious actions.


Uncommon Linux shell command execution loading a kernel module

Synopsis

ATT&CK Tactic

ATT&CK Technique

Severity

Low

Description

An unusual process execution of a shell command on Linux. This action may indicate possible exploitation or shell command execution via a backdoor.

Attacker's Goals

An attacker may attempt to execute a malicious shell command on the system.

Investigative actions

  • Check whether the executing process is benign, and if this was a desired behavior as part of its normal execution flow.
  • Check the executed shell command (and possible child processes) for malicious actions.


Uncommon Linux shell command execution, possibly granting file execution permissions

Synopsis

ATT&CK Tactic

ATT&CK Technique

Severity

Low

Description

An unusual process execution of a shell command on Linux. This action may indicate possible exploitation or shell command execution via a backdoor.

Attacker's Goals

An attacker may attempt to execute a malicious shell command on the system.

Investigative actions

  • Check whether the executing process is benign, and if this was a desired behavior as part of its normal execution flow.
  • Check the executed shell command (and possible child processes) for malicious actions.


Uncommon Linux shell command execution running a network tool

Synopsis

ATT&CK Tactic

ATT&CK Technique

Severity

Low

Description

An unusual process execution of a shell command on Linux. This action may indicate possible exploitation or shell command execution via a backdoor.

Attacker's Goals

An attacker may attempt to execute a malicious shell command on the system.

Investigative actions

  • Check whether the executing process is benign, and if this was a desired behavior as part of its normal execution flow.
  • Check the executed shell command (and possible child processes) for malicious actions.


Uncommon Linux shell command execution setting a scheduled task

Synopsis

ATT&CK Tactic

Execution (TA0002)

ATT&CK Technique

Severity

Low

Description

An unusual process execution of a shell command on Linux. This action may indicate possible exploitation or shell command execution via a backdoor.

Attacker's Goals

An attacker may attempt to execute a malicious shell command on the system.

Investigative actions

  • Check whether the executing process is benign, and if this was a desired behavior as part of its normal execution flow.
  • Check the executed shell command (and possible child processes) for malicious actions.


Uncommon Linux shell command execution running a process kill command

Synopsis

ATT&CK Tactic

Execution (TA0002)

ATT&CK Technique

Severity

Low

Description

An unusual process execution of a shell command on Linux. This action may indicate possible exploitation or shell command execution via a backdoor.

Attacker's Goals

An attacker may attempt to execute a malicious shell command on the system.

Investigative actions

  • Check whether the executing process is benign, and if this was a desired behavior as part of its normal execution flow.
  • Check the executed shell command (and possible child processes) for malicious actions.


Uncommon Linux shell command execution with su/sudo elevation

Synopsis

ATT&CK Tactic

Execution (TA0002)

ATT&CK Technique

Severity

Informational

Description

An unusual process execution of a shell command on Linux. This action may indicate possible exploitation or shell command execution via a backdoor.

Attacker's Goals

An attacker may attempt to execute a malicious shell command on the system.

Investigative actions

  • Check whether the executing process is benign, and if this was a desired behavior as part of its normal execution flow.
  • Check the executed shell command (and possible child processes) for malicious actions.


Uncommon Linux shell command execution accessing history (e.g. bash history or login records)

Synopsis

ATT&CK Tactic

ATT&CK Technique

Severity

Informational

Description

An unusual process execution of a shell command on Linux. This action may indicate possible exploitation or shell command execution via a backdoor.

Attacker's Goals

An attacker may attempt to execute a malicious shell command on the system.

Investigative actions

  • Check whether the executing process is benign, and if this was a desired behavior as part of its normal execution flow.
  • Check the executed shell command (and possible child processes) for malicious actions.


Uncommon Linux shell command execution from a scripting language interpreter

Synopsis

ATT&CK Tactic

Execution (TA0002)

ATT&CK Technique

Severity

Informational

Description

An unusual process execution of a shell command on Linux. This action may indicate possible exploitation or shell command execution via a backdoor.

Attacker's Goals

An attacker may attempt to execute a malicious shell command on the system.

Investigative actions

  • Check whether the executing process is benign, and if this was a desired behavior as part of its normal execution flow.
  • Check the executed shell command (and possible child processes) for malicious actions.


Uncommon Linux shell command execution executed from within a web server

Synopsis

ATT&CK Tactic

Execution (TA0002)

ATT&CK Technique

Severity

Informational

Description

An unusual process execution of a shell command on Linux. This action may indicate possible exploitation or shell command execution via a backdoor.

Attacker's Goals

An attacker may attempt to execute a malicious shell command on the system.

Investigative actions

  • Check whether the executing process is benign, and if this was a desired behavior as part of its normal execution flow.
  • Check the executed shell command (and possible child processes) for malicious actions.