OSX Dummy Files

OSX Dummy Malware (https://objective-see.com/blog/blog_0x32.html and https://isc.sans.edu/diary/23816):

Query

SELECT * FROM file \\
         WHERE path = '/Library/LaunchDaemons/com.startup.plist' OR \\
           path = '/var/root/script.sh' OR \\
           path = '/Users/Shared/dumpdummy' OR \\
           path = '/tmp/script.sh' OR \\
           path = '/tmp/com.startup.plist' OR \\
           path = '/tmp/dumpdummy';

Additional Query Info

  • Version: 1.4.5
  • Interval: 3600

JSON

{
  "queries": {
    "OSX Dummy Files": {
      "query": "SELECT * FROM file \\
         WHERE path = '/Library/LaunchDaemons/com.startup.plist' OR \\
           path = '/var/root/script.sh' OR \\
           path = '/Users/Shared/dumpdummy' OR \\
           path = '/tmp/script.sh' OR \\
           path = '/tmp/com.startup.plist' OR \\
           path = '/tmp/dumpdummy';",
      "interval": "3600",
      "platform": "",
      "version": "1.4.5",
      "description": "OSX Dummy Malware (https://objective-see.com/blog/blog_0x32.html and https://isc.sans.edu/diary/23816)",
      "value": ""
    }
  }
}