
Summary
The ColdRoot detection rule is designed to identify potential malware-related activities associated with the ColdRoot RAT via the osquery framework on macOS systems. This rule utilizes the Splunk platform to analyze data generated from osquery agents that are specifically configured with the osx-attacks configuration pack. The primary focus of this detection is to track events linked to the starting and operations of ColdRoot, which should be detected through specific alert triggers present in the osquery alerts database, particularly observing the pack named `pack_osx-attacks_OSX_ColdRoot_RAT_Launchd` and `pack_osx-attacks_OSX_ColdRoot_RAT_Files`. By aggregating these alerts within 30-second intervals, the rule compiles statistical insights on the number of paths associated with each incident, attributing them to the hosts and users involved. Given that the rule is marked deprecated, it is essential for users to consider alternative detection approaches while maintaining awareness of the ColdRoot threat landscape.
Categories
- macOS
- Endpoint
Data Sources
- Application Log
Created: 2024-11-14