2023-08-07 17:33:27 +00:00
|
|
|
id: macos-bella-malware
|
|
|
|
|
|
|
|
info:
|
|
|
|
name: Bella Malware - Detect
|
|
|
|
author: daffainfo
|
|
|
|
severity: info
|
|
|
|
reference: https://github.com/airbnb/binaryalert/blob/master/rules/public/malware/macos/malware_macos_bella.yara
|
2023-08-08 17:29:20 +00:00
|
|
|
tags: malware,file,macos-bella
|
2023-08-07 17:33:27 +00:00
|
|
|
file:
|
|
|
|
- extensions:
|
|
|
|
- all
|
|
|
|
|
|
|
|
matchers-condition: or
|
|
|
|
matchers:
|
|
|
|
- type: word
|
|
|
|
part: raw
|
|
|
|
words:
|
|
|
|
- "Verified! [2FV Enabled] Account ->"
|
|
|
|
- "There is no root shell to perform this command. See [rooter] manual entry."
|
|
|
|
- "Attempt to escalate Bella to root through a variety of attack vectors."
|
|
|
|
- "BELLA IS NOW RUNNING. CONNECT TO BELLA FROM THE CONTROL CENTER."
|
|
|
|
condition: or
|
|
|
|
|
|
|
|
- type: word
|
|
|
|
part: raw
|
|
|
|
words:
|
|
|
|
- "user_pass_phish"
|
|
|
|
- "bella_info"
|
|
|
|
- "get_root"
|
|
|
|
condition: and
|
|
|
|
|
|
|
|
- type: word
|
|
|
|
part: raw
|
|
|
|
words:
|
|
|
|
- "Please specify a bella server."
|
|
|
|
- "What port should Bella connect on [Default is 4545]:"
|
2023-10-14 11:27:55 +00:00
|
|
|
condition: and
|
2023-10-20 11:41:13 +00:00
|
|
|
|
|
|
|
# digest: 490a00463044022020ad29e486e7bd8f7024226d48a543032ac746afc8e929c68a189b2c3d312b9a02207489384ec2fcb05068a934ad391a9fcbdae8d9b1774000a5d2a643b12a2cd62a:922c64590222798bb761d5b6d8e72950
|