← Back to SOC feed Coverage →

Group Has Been Deleted Via Groupdel

sigma MEDIUM SigmaHQ
T1531
imProcessCreate
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at SigmaHQ →
Retrieved: 2026-03-25T02:50:08Z · Confidence: medium

Hunt Hypothesis

The Group Has Been Deleted Via Groupdel detection rule identifies adversaries attempting to remove user groups to evade detection or persist within an environment by eliminating audit trails. SOC teams should proactively hunt for this behavior in Azure Sentinel to uncover potential lateral movement or privilege escalation tactics that may indicate a deeper compromise.

Detection Rule

Sigma (Original)

title: Group Has Been Deleted Via Groupdel
id: 8a46f16c-8c4c-82d1-b121-0fdd3ba70a84
status: test
description: Detects execution of the "groupdel" binary. Which is used to delete a group. This is sometimes abused by threat actors in order to cover their tracks
references:
    - https://linuxize.com/post/how-to-delete-group-in-linux/
    - https://www.cyberciti.biz/faq/linux-remove-user-command/
    - https://www.cybrary.it/blog/0p3n/linux-commands-used-attackers/
    - https://linux.die.net/man/8/groupdel
author: Tuan Le (NCSGroup)
date: 2022-12-26
tags:
    - attack.impact
    - attack.t1531
logsource:
    product: linux
    category: process_creation
detection:
    selection:
        Image|endswith: '/groupdel'
    condition: selection
falsepositives:
    - Legitimate administrator activities
level: medium

KQL (Azure Sentinel)

imProcessCreate
| where TargetProcessName endswith "/groupdel"

False Positive Guidance

MITRE ATT&CK Context

Original source: https://github.com/SigmaHQ/sigma/blob/master/rules/linux/process_creation/proc_creation_lnx_groupdel.yml