OSX Dummy Files
OSX Dummy Malware (https://objective-see.com/blog/blog_0x32.html and https://isc.sans.edu/diary/23816):
Query
SELECT * FROM file \\
WHERE path = '/Library/LaunchDaemons/com.startup.plist' OR \\
path = '/var/root/script.sh' OR \\
path = '/Users/Shared/dumpdummy' OR \\
path = '/tmp/script.sh' OR \\
path = '/tmp/com.startup.plist' OR \\
path = '/tmp/dumpdummy';Additional Query Info
- Version: 1.4.5
- Interval: 3600
JSON
{
"queries": {
"OSX Dummy Files": {
"query": "SELECT * FROM file \\
WHERE path = '/Library/LaunchDaemons/com.startup.plist' OR \\
path = '/var/root/script.sh' OR \\
path = '/Users/Shared/dumpdummy' OR \\
path = '/tmp/script.sh' OR \\
path = '/tmp/com.startup.plist' OR \\
path = '/tmp/dumpdummy';",
"interval": "3600",
"platform": "",
"version": "1.4.5",
"description": "OSX Dummy Malware (https://objective-see.com/blog/blog_0x32.html and https://isc.sans.edu/diary/23816)",
"value": ""
}
}
}