← Back to SOC feed Coverage →

Linux Doas Tool Execution

sigma LOW SigmaHQ
T1548
imProcessCreate
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at SigmaHQ →
Retrieved: 2026-03-25T02:50:08Z · Confidence: high

Hunt Hypothesis

Adversaries may use the doas tool to escalate privileges by executing commands as root without proper authorization. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify potential privilege escalation attempts that could lead to deeper system compromise.

Detection Rule

Sigma (Original)

title: Linux Doas Tool Execution
id: 067d8238-7127-451c-a9ec-fa78045b618b
status: stable
description: Detects the doas tool execution in linux host platform. This utility tool allow standard users to perform tasks as root, the same way sudo does.
references:
    - https://research.splunk.com/endpoint/linux_doas_tool_execution/
    - https://www.makeuseof.com/how-to-install-and-use-doas/
author: Sittikorn S, Teoderick Contreras
date: 2022-01-20
tags:
    - attack.defense-evasion
    - attack.privilege-escalation
    - attack.t1548
logsource:
    product: linux
    category: process_creation
detection:
    selection:
        Image|endswith: '/doas'
    condition: selection
falsepositives:
    - Unlikely
level: low

KQL (Azure Sentinel)

imProcessCreate
| where TargetProcessName endswith "/doas"

False Positive Guidance

MITRE ATT&CK Context

Original source: https://github.com/SigmaHQ/sigma/blob/master/rules/linux/process_creation/proc_creation_lnx_doas_execution.yml