heroui logo

Potential XCSSET Malware Infection

Sigma Rules

View Source
Summary
This detection rule targets the XCSSET malware, a macOS trojan known to infect development projects primarily through Xcode, modifying applications in a way that compromises user credentials and sensitive information. The rule identifies malicious execution patterns associated with XCSSET by analyzing process creation events. The detection logic involves several selections that focus on command line arguments and parent-child process relationships indicative of the trojan's behavior. Instances are tracked where processes related to `curl`, `osacompile`, and `plutil` are executed with specific command line arguments that suggest an infection attempt. The rule includes provisions to minimize false positives, although some uncertainty remains. If executed by a parent process named `/bash`, with specific command line inclusions, these actions are flagged for review to help security teams respond to potential threats effectively.
Categories
  • macOS
  • Endpoint
  • Application
Data Sources
  • Process
Created: 2022-10-17