nuclei-templates/network/jarm/c2/macshell-c2-jarm.yaml

25 lines
1.3 KiB
YAML
Raw Normal View History

2023-07-14 08:02:24 +00:00
id: macshell-c2-jarm
info:
name: Macshell C2 JARM - Detect
author: pussycat0x
severity: info
description: |
MacShellSwift is a proof of concept MacOS post-exploitation tool written in Swift using encrypted sockets. This tool has been tested both pre and post-Catalina. I rewrote a prior tool of mine MacShell (one of my repos) and changed the client to Swift instead of python. This tool consists of two parts: a server script and a client binary. I wrote this tool to help blue teamers proactively guage detections against macOS post-exploitation methods that use macOS internal calls. Red teams can also find this of use for getting ideas around using Swift for macOS post-exploitation
reference:
- https://github.com/cedowens/C2-JARM
- https://github.com/cedowens/MacShellSwift
metadata:
max-request: 1
tags: jarm,network,c2,ir,osint,cti,macshell,tcp
2023-07-14 08:02:24 +00:00
tcp:
- inputs:
- data: 2E
type: hex
host:
- "{{Hostname}}"
matchers:
- type: dsl
dsl:
2023-10-14 11:27:55 +00:00
- "jarm(Hostname) == '2ad000000000000000000000000000eeebf944d0b023a00f510f06a29b4f46'"
# digest: 4b0a004830460221009def2dedd6407dd75c5c483d23433c26db21f4c0eb882c5ef7c34c1798a7bd77022100dfdfde1e5c1ff408ce00ed8ad446154627cc8b1520a51ac30332ea2e7e69c69e:922c64590222798bb761d5b6d8e72950