On Linux and macOS systems, multiple methods are supported for creating pre-scheduled and periodic background jobs: cron, (Citation: Die.net Linux crontab Man Page) at, (Citation: Die.net Linux at Man Page) and launchd. (Citation: AppleDocs Scheduling Timed Jobs) Unlike [Scheduled Task](https://attack.mitre.org/techniques/T1053) on Windows systems, job scheduling on Linux-based systems cannot be done remotely unless used in conjunction within an established remote session, like secure shell (SSH).System-wide cron jobs are installed by modifying
/etc/crontab
file,/etc/cron.d/
directory or other locations supported by the Cron daemon, while per-user cron jobs are installed using crontab with specifically formatted crontab files. (Citation: AppleDocs Scheduling Timed Jobs) This works on macOS and Linux systems.Those methods allow for commands or scripts to be executed at specific, periodic intervals in the background without user interaction. An adversary may use job scheduling to execute programs at system startup or on a scheduled basis for Persistence, (Citation: Janicab) (Citation: Methods of Mac Malware Persistence) (Citation: Malware Persistence on OS X) (Citation: Avast Linux Trojan Cron Persistence) to conduct Execution as part of Lateral Movement, to gain root privileges, or to run a process under the context of a specific account.
The at program is another means on POSIX-based systems, including macOS and Linux, to schedule a program or script job for execution at a later date and/or time, which could also be used for the same purposes.
Each launchd job is described by a different configuration property list (plist) file similar to Launch Daemon or Launch Agent, except there is an additional key called
StartCalendarInterval
with a dictionary of time values. (Citation: AppleDocs Scheduling Timed Jobs) This only works on macOS and OS X.
This test replaces the current user's crontab file with the contents of the referenced file. This technique was used by numerous IoT automated exploitation attacks.
Supported Platforms: macOS, Linux
Name | Description | Type | Default Value |
---|---|---|---|
command | Command to execute | string | /tmp/evil.sh |
tmp_cron | Temporary reference file to hold evil cron schedule | path | /tmp/persistevil |
echo "* * * * * #{command}" > #{tmp_cron} && crontab #{tmp_cron}
This test adds a script to a cron folder configured to execute on a schedule. This technique was used by the threat actor Rocke during the exploitation of Linux web servers.
Supported Platforms: macOS, Linux
Name | Description | Type | Default Value |
---|---|---|---|
command | Command to execute | string | echo 'Hello from Atomic Red Team' > /tmp/atomic.log |
cron_script_name | Name of file to store in cron folder | string | persistevil |
echo "#{command}" > /etc/cron.daily/#{cron_script_name}
This test adds persistence via a plist to execute via the macOS Event Monitor Daemon.
Supported Platforms: macOS, Linux
name atomicredteam enabled eventTypes startup actions command /usr/bin/say user root arguments -v Tessa I am a persistent startup item. type RunCommand-
Place an empty file in /private/var/db/emondClients/
-
sudo touch /private/var/db/emondClients/randomflag