
Summary
This rule is designed to detect suspicious behavior on macOS systems where malicious actors attempt to disguise their executable files by appending a space character at the end of the filename. This tactic leverages the tendency of users and systems to overlook such alterations, thereby enabling attacks more easily. By adding a space, adversaries can make their malicious files appear as legitimate applications or processes without raising immediate suspicion. The detection logic is straightforward: it monitors process creation events for command lines or image paths that end with a space character. The condition for alerting is triggered if either the command line or the image path matches this characteristic. It's important to note that some legitimate applications may also include trailing spaces, resulting in potential false positives, particularly where commands are mistyped or when binaries accidentally conform to this filename pattern. The implementation of this rule assists cybersecurity teams in identifying and mitigating threats that could exploit such evasion techniques.
Categories
- macOS
- Endpoint
Data Sources
- Process
ATT&CK Techniques
- T1036.006
Created: 2021-11-20