Greetings!
I have been recently getting following messages -
agent.name: agent-010 agent.ip: 172.30.1.100 data.title: Trojaned version of file detected. data.file: /bin/diff data.file: /usr/bin/diff location: rootcheck full_log: Trojaned version of file '/usr/bin/diff' detected. Signature used: 'bash|^/bin/sh|file\.h|proc\.h|/dev/[^n]|^/bin/.*sh' (Generic).Came across following links -
https://github.com/wazuh/wazuh/issues/19346
https://groups.google.com/g/wazuh/c/L6xp5oeGhmA
Could you please suggest what exactly is to be done for the same?
Environment -
Wazuh 4.3.10 on AWS EKS
Thanks,KS
Hi Khul Sat, Thank you for reaching out to us.
It appears to be a known issue
Currently to solve the issue, on the Wazuh manager you only need to change on /etc/shared/default/rootkit_trojans.txt this line:
diff !bash|^/bin/sh|file\.h|proc\.h|/dev/[^n]|^/bin/.*sh!
to this one:
diff !bash|^/bin/sh|file\.h|proc\.h|^/bin/.*sh!
After restarting the service, the issue should be resolved, as shown in the attached image.

--
You received this message because you are subscribed to the Google Groups "Wazuh | Mailing List" group.
To unsubscribe from this group and stop receiving emails from it, send an email to wazuh+un...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/wazuh/d769c498-a7de-410a-ae71-6c640c7a48e5n%40googlegroups.com.
I also do not have much expertise in Kubernetes architecture. I am sharing some resources that you may find useful.
https://discuss.elastic.co/t/modify-elastic-yml-file-in-kubernetes-pod/103612
Also as a workaround, this is a false positive you can overwrite the rule to silence the rule with level 0.
You can do this from the Web interface.
Ref:
https://documentation.wazuh.com/current/user-manual/ruleset/rules/custom.html
<rule id="510" level="0" overwrite="yes">
Rootchcek is used for malware detection. There are other ways to detect malware like Virustotal, Yara, etc with FIM. You can also follow those.
https://documentation.wazuh.com/current/user-manual/capabilities/malware-detection/fim-yara.html
I hope you find this information helpful.