Skip to main content
Version: 0.2.0

Init module

This kind of event is generated when a kernel module is loaded into the kernel.

module metadata

Due to the nature of init_module syscall, it is fairly complicated to find a reliable way to get access to kernel module data (in pure eBPF) and extract hashing information from it.

Until we find a solution to that issue, we propose to detect suspicious modules loaded based on the loading context (ancestors, loader ...) rather than on the data of the module being loaded.

{
"data": {
"ancestors": "/usr/lib/systemd/systemd|/usr/bin/login|/usr/bin/zsh|/usr/bin/bash|/usr/bin/xinit|/usr/bin/i3|/usr/bin/bash|/usr/bin/urxvt|/usr/bin/zsh|/usr/bin/bash|/usr/bin/sudo|/usr/bin/sudo",
"command_line": "modprobe nbd max_part=42",
"exe": {
"file": "/usr/bin/kmod"
},
"syscall": "finit_module",
"module_name": "nbd",
"args": "max_part=42",
"loaded": true
},
"info": {
"host": "...",
"event": {
"source": "kunai",
"id": 20,
"name": "init_module",
"uuid": "8c96c410-fa7d-a3e5-aebc-9a35ada2557a",
"batch": 34
},
"task": "...",
"parent_task": "...",
"utc_time": "2024-02-13T09:57:06.812604352Z"
}
}