heroui logo

macOS Malware Detected with osquery

Panther Rules

View Source
Summary
This rule detects potential malware activities on macOS systems using osquery. The detection is triggered when a known malicious executable is discovered in the file system. Specifically, the rule scours for executables commonly associated with malware, such as those that could disguise themselves as legitimate applications. If an executable is found that matches the known malicious patterns, it will be reported as a potential threat. The rule is linked to the MITRE ATT&CK framework under TA0042 (Credential Access) and T1588 (Develop Capabilities), which suggests a focus on the gathering and exploitation of user credentials via malware. The user or security analyst is advised to verify the legitimacy of the executable using VirusTotal to ascertain if it has been flagged by multiple antivirus engines. The rule has medium severity and is enabled in a typical osquery deployment designed for continuous monitoring of macOS environments.
Categories
  • macOS
  • Endpoint
Data Sources
  • Process
  • File
  • Application Log
ATT&CK Techniques
  • T1588
Created: 2022-09-02