heroui logo

Potential Base64 Decoded From Images

Sigma Rules

View Source
Summary
This detection rule identifies a potentially malicious sequence of commands executed in a macOS environment, specifically targeting the obfuscation and extraction of data from image files. It focuses on the use of the 'tail' command to extract a portion of binary data from an image file, followed by the decoding of that data using 'base64'. The rule specifies that the command involved should execute on the bash shell and looks for processes that involve image file types such as .avif, .gif, .jpeg, etc. The malicious activity could indicate attempts to extract hidden data or exploit vulnerabilities in image processing. This behavior is often associated with defense evasion techniques where attackers attempt to hide their activities by using common utilities and file types.
Categories
  • Endpoint
  • macOS
Data Sources
  • Process
Created: 2023-12-20