Detection Library
highexperimentalLinuxOCIT1105

Linux Agent Dropping And Launching Executable Content

Detects AI agent processes writing executable files (binaries, scripts with execute permissions) to disk, which is the dropper stage of an agent-mediated malware delivery attack.

Updated Jan 10, 2025 · OCI AI Security Team

agentic-aicode-executiondropperlinuxociowasp-asi05

Problem Statement

Dropping executable binaries to disk and launching them is the most direct way to achieve persistent code execution outside the agent's Python/Node runtime. This behavior indicates the agent has been used as a dropper for traditional malware targeting the underlying OCI compute instance.

Sample Logs

{"timestamp":"2025-01-10T13:45:00Z","computer_name":"oci-worker-22","user":"agent_svc","image":"/usr/bin/python3","target_filename":"/tmp/implant.elf","event_type":"CreateFile"}

Required Fields

image
target_filename
user
computer_name

False Positives

  • ·Python ctypes or cffi usage that compiles and writes shared objects (.so) as part of native extension loading
  • ·Legitimate native binary tools extracted from Python wheels during installation

Tuning Guidance

Pair file drop events with subsequent execution events for the same filename. Alert with high confidence only when drop is followed by execution. Hash new binaries against a known-good allowlist.