
Summary
This detection rule is designed to identify potential malicious activities typically associated with the XCSSET malware variant, specifically focusing on in-memory downloading and compiling of payloads on macOS systems. The rule targets the use of the 'curl' command, which is known for fetching data from URLs, and 'osacompile', which compiles AppleScripts into applets. By examining the command line arguments of process creation events, the rule looks for instances where both of these commands are executed, suggesting that a script may be downloaded and executed without being permanently saved to disk. This behavior is indicative of stealthy tactics employed by adversaries to evade traditional file-based detection mechanisms. The potential for false positives exists but is largely categorized as unknown due to various legitimate uses of these commands.
Categories
- macOS
- Endpoint
Data Sources
- Process
Created: 2023-08-22