Systemd Timers (T1053.006)

View on ATT&CK

In Playbook

Associated Tactics

  • Execution
  • Persistence
  • Privilege Escalation

Execution (TA0002)

The adversary is trying to run malicious code. Execution consists of techniques that result in adversary-controlled code running on a local or remote system. Techniques that run malicious code are often paired with techniques from all other tactics to achieve broader goals, like exploring a network or stealing data. For example, an adversary might use a remote access tool to run a PowerShell script that does Remote System Discovery.

View on ATT&CK

Procedure Examples

Description Source(s)
Aaron Kili. (2018, January 16). How to Control Systemd Services on Remote Linux Server. Retrieved July 26, 2021. Systemd Remote Control
archlinux. (2020, August 11). systemd/Timers. Retrieved October 12, 2020. archlinux Systemd Timers Aug 2020
Catalin Cimpanu. (2018, July 10). ~x file downloaded in public Arch package compromise. Retrieved April 23, 2019. gist Arch package compromise 10JUL2018
Catalin Cimpanu. (2018, July 10). Malware Found in Arch Linux AUR Package Repository. Retrieved April 23, 2019. Arch Linux Package Systemd Compromise BleepingComputer 10JUL2018
Eli Schwartz. (2018, June 8). acroread package compromised. Retrieved April 23, 2019. acroread package compromised Arch Linux Mail 8JUL2018
Hybrid Analysis. (2018, July 11). HybridAnalsysis of sample 28553b3a9d2ad4361d33d29ac4bf771d008e0073cec01b5561c6348a608f8dd7. Retrieved September 8, 2023. Falcon Sandbox smp: 28553b3a9d
Linux man-pages. (2014, January). systemd(1) - Linux manual page. Retrieved April 23, 2019. Linux man-pages: systemd January 2014