PTRACE_TRACEME used to prevent process debugging

이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우 언제든지 연락주시기 바랍니다.

Goal

Detect usage of the ptrace system call with the PTRACE_TRACEME argument, indicating a program actively attempting to avoid debuggers attaching to the process. This behavior is typically indicative of malware activity.

Strategy

The ptrace system call provides a means for one process to observe and control the execution of another process. This system call allows a process to modify the execution of another process, including changing memory and register values. One limitation of this system call is that a process can only have one trace, and malicious actors have been observed making use of this limitation to prevent debuggers from attaching to malicious processes for the purpose of forensics or analysis.

Triage and response

  1. Check the name of the process using TRACEME
  2. If this file is not known or authorized, contain the host or container and roll back to a known good configuration. Initiate the incident response process. Requires Agent version 7.35 or greater
PREVIEWING: dgreen15/github-error-fix