Skip to content

OSX Leverage Malware - Detect

ID: osx-leverage-malware

Severity: info

Author: daffainfo

Tags: malware,file

id: osx-leverage-malware
info:
name: OSX Leverage Malware - Detect
author: daffainfo
severity: info
reference: https://github.com/Yara-Rules/rules/blob/master/malware/MALW_OSX_Leverage.yar
tags: malware,file
file:
- extensions:
- all
matchers:
- type: word
part: raw
words:
- "ioreg -l | grep \"IOPlatformSerialNumber\" | awk -F"
- "+:Users:Shared:UserEvent.app:Contents:MacOS:"
- "rm '/Users/Shared/UserEvent.app/Contents/Resources/UserEvent.icns'"
- "osascript -e 'tell application \"System Events\" to get the hidden of every login item'"
- "osascript -e 'tell application \"System Events\" to get the name of every login item'"
- "osascript -e 'tell application \"System Events\" to get the path of every login item'"
- "serverVisible \0"
condition: and
# digest: 4a0a0047304502204967993b9a6aa09347f515b492800f8c828fc0e4c372cbab195f29292939833b022100cf496c5563a5079c3a3253a72fd1d09e1f9384ee931d1785be6530a869936854:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "file/malware/osx-leverage-malware.yaml"

View on Github