id: macshell-c2-jarm info: name: Macshell C2 JARM - Detect author: pussycat0x severity: info description: | MacShellSwift is a proof of concept MacOS post-exploitation tool written in Swift using encrypted sockets. This tool has been tested both pre and post-Catalina. I rewrote a prior tool of mine MacShell (one of my repos) and changed the client to Swift instead of python. This tool consists of two parts: a server script and a client binary. I wrote this tool to help blue teamers proactively guage detections against macOS post-exploitation methods that use macOS internal calls. Red teams can also find this of use for getting ideas around using Swift for macOS post-exploitation reference: - https://github.com/cedowens/C2-JARM - https://github.com/cedowens/MacShellSwift metadata: max-request: 1 tags: c2,ir,osint,macshell,jarm tcp: - inputs: - data: 2E type: hex host: - "{{Hostname}}" matchers: - type: dsl dsl: - "jarm(Hostname) == '2ad000000000000000000000000000eeebf944d0b023a00f510f06a29b4f46'" # digest: 4b0a00483046022100f884d4f33db5af0900b13753aae7d1e6127444cf3d0e779a29101ff37fc3aed5022100c20eecad0178ed06db60b3e043c5f7933d3de28dce80caf7515ceed4538e2da1:922c64590222798bb761d5b6d8e72950