
Summary
This detection rule is aimed at identifying suspicious outbound network connections made by scripting interpreters to Ethereum blockchain endpoints, which can indicate command and control (C2) activities from adversaries, as seen in the SleepyDuck malware campaigns. The rule employs Elastic Query Language (EQL) to detect such behaviors by examining network logs and process activities associated with macOS systems. It looks for processes typically associated with scripting languages (like Python, Ruby, or shell scripts) that attempt to communicate with domains associated with Ethereum or similar blockchain technologies. Key investigative steps involve analyzing various fields such as process names, command lines, and the specific blockchain endpoints being queried to differentiate between legitimate and malicious activities. The rule also provides guidance on possible false positives involving legitimate uses of blockchain technologies and actions for response and remediation in case of a confirmed threat.
Categories
- Endpoint
- macOS
Data Sources
- Process
- Network Traffic
- Logon Session
ATT&CK Techniques
- T1102
- T1102.002
- T1059
- T1059.004
- T1059.006
- T1059.007
Created: 2026-01-30