
Summary
This rule aims to detect the use of binary padding techniques on macOS systems, which may be employed by adversaries to obfuscate malware. Binary padding involves adding junk data to executable files to alter their on-disk representation without changing their functionality. This behavior can be indicative of attempts to evade detection by security measures. The rule consists of two primary detection mechanisms: one using the command-line tool `truncate` to modify file sizes by adding junk data, and another using `dd`, a utility for converting and copying files, specifically looking for cases where `/dev/zero`, `/dev/random`, and `/dev/urandom` are used as input. A match in either of these conditions triggers the alert, signifying a potential malicious activity related to malware obfuscation.
Categories
- macOS
- Endpoint
Data Sources
- Process
ATT&CK Techniques
- T1027.001
Created: 2020-10-19