OSX Dummy Malware (https://objective-see.com/blog/blog_0x32.html and https://isc.sans.edu/diary/23816): Artifacts created by this malware
Query:
SELECT * FROM file \ WHERE path = '/Library/LaunchDaemons/com.startup.plist' OR \ path = '/var/root/script.sh' OR \ path = '/Users/Shared/dumpdummy' OR \ path = '/tmp/script.sh' OR \ path = '/tmp/com.startup.plist' OR \ path = '/tmp/dumpdummy';Additional Query Info:
Version: 1.4.5
Platform: darwin
Interval: 3600
JSON:
{ "queries": { "OSX_Dummy_Files": { "query" : "SELECT * FROM file \ WHERE path = '/Library/LaunchDaemons/com.startup.plist' OR \ path = '/var/root/script.sh' OR \ path = '/Users/Shared/dumpdummy' OR \ path = '/tmp/script.sh' OR \ path = '/tmp/com.startup.plist' OR \ path = '/tmp/dumpdummy';", "interval" : "3600", "platform" : "darwin", "version": "1.4.5", "description" : "OSX Dummy Malware (https://objective-see.com/blog/blog_0x32.html and https://isc.sans.edu/diary/23816)", "value" : "Artifacts created by this malware" } } }