← Back to SOC feed Coverage →

Suspicious Download and Execute Pattern via Curl/Wget

sigma HIGH SigmaHQ
T1059.004T1203
imProcessCreate
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at SigmaHQ →
Retrieved: 2026-03-25T02:50:08Z · Confidence: low

Hunt Hypothesis

Adversaries may use curl or wget to download and execute malicious scripts in temporary directories to evade detection and establish persistence. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify potential command-and-control communication or initial compromise vectors.

Detection Rule

Sigma (Original)

title: Suspicious Download and Execute Pattern via Curl/Wget
id: a2d9e2f3-0f43-4c7a-bcd9-9acfc0d723aa
status: experimental
description: |
    Detects suspicious use of command-line tools such as curl or wget to download remote
    content - particularly scripts - into temporary directories (e.g., /dev/shm, /tmp), followed by
    immediate execution, indicating potential malicious activity. This pattern is commonly used
    by malicious scripts, stagers, or downloaders in fileless or multi-stage Linux attacks.
references:
    - https://gtfobins.github.io/gtfobins/wget/
    - https://gtfobins.github.io/gtfobins/curl/
author: Aayush Gupta
date: 2025-06-17
tags:
    - attack.execution
    - attack.t1059.004
    - attack.t1203
logsource:
    category: process_creation
    product: linux
detection:
    selection_downloader:
        CommandLine|contains:
            - '/curl'
            - '/wget'
    selection_tmp:
        CommandLine|contains:
            - '/tmp/'
            - '/dev/shm/'
    selection_executor:
        CommandLine|contains: 'sh -c'
    condition: all of selection_*
falsepositives:
    - System update scripts using temporary files
    - Installer scripts or automated provisioning tools
level: high

KQL (Azure Sentinel)

imProcessCreate
| where (TargetProcessCommandLine contains "/curl" or TargetProcessCommandLine contains "/wget") and (TargetProcessCommandLine contains "/tmp/" or TargetProcessCommandLine contains "/dev/shm/") and TargetProcessCommandLine contains "sh -c"

False Positive Guidance

MITRE ATT&CK Context

Original source: https://github.com/SigmaHQ/sigma/blob/master/rules/linux/process_creation/proc_creation_lnx_curl_wget_exec_tmp.yml