nuclei-templates/file/malware/osx-leverage-malware.yaml

25 lines
884 B
YAML
Raw Normal View History

2023-08-01 11:37:58 +00:00
id: osx-leverage-malware
2023-02-28 01:18:13 +00:00
info:
2023-03-09 18:14:31 +00:00
name: OSX Leverage Malware - Detect
2023-02-28 01:18:13 +00:00
author: daffainfo
2023-08-01 09:54:35 +00:00
severity: info
2023-02-28 01:18:13 +00:00
reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_OSX_Leverage.yar
tags: malware,file
file:
- extensions:
- all
matchers:
- type: word
2023-08-01 09:54:35 +00:00
part: raw
2023-02-28 01:18:13 +00:00
words:
- "ioreg -l | grep \"IOPlatformSerialNumber\" | awk -F"
- "+:Users:Shared:UserEvent.app:Contents:MacOS:"
- "rm '/Users/Shared/UserEvent.app/Contents/Resources/UserEvent.icns'"
- "osascript -e 'tell application \"System Events\" to get the hidden of every login item'"
- "osascript -e 'tell application \"System Events\" to get the name of every login item'"
- "osascript -e 'tell application \"System Events\" to get the path of every login item'"
- "serverVisible \x00"
condition: and