
Summary
The detection rule identifies the execution traces of the WizardUpdate malware, which is a macOS trojan known for stealing sensitive data and facilitating other malicious payloads. The rule operates by monitoring process creation events on macOS systems, specifically looking for suspicious command executions that are characteristic of this malware. It utilizes two selection criteria: the first checks for processes that end with '/sh' and have command-line arguments indicating a curl execution with eval, which are common in script-based exploits; the second checks for processes ending with '/curl' that indicate potential interactions with an intermediate malicious agent. The condition is met if any of the selections are satisfied, indicating a high-risk scenario likely involving WizardUpdate activity. This detection can help prevent data theft and security breaches associated with this trojan variant.
Categories
- macOS
- Endpoint
Data Sources
- Process
Created: 2022-10-17