sigma |
proc_creation_macos_system_network_discovery.yml |
Image: '/usr/bin/defaults' |
DRL 1.0 |
sigma |
proc_creation_win_bad_opsec_sacrificial_processes.yml |
title: Bad Opsec Defaults Sacrificial Processes With Improper Arguments |
DRL 1.0 |
sigma |
proc_creation_win_bad_opsec_sacrificial_processes.yml |
description: 'Detects attackers using tooling with bad opsec defaults e.g. spawning a sacrificial process to inject a capability into the process without taking into account how the process is normally run, one trivial example of this is using rundll32.exe without arguments as a sacrificial process (default in CS, now highlighted by c2lint), running WerFault without arguments (Kraken - credit am0nsec), and other examples.' |
DRL 1.0 |
malware-ioc |
oceanlotus-macOS.misp.event.json |
"description": "To prevent normal users from accidentally changing special files on a system, most operating systems have the concept of a \u2018hidden\u2019 file. These files don\u2019t show up when a user browses the file system with a GUI or when using normal commands on the command line. Users must explicitly ask to show the hidden files either via a series of Graphical User Interface (GUI) prompts or with command line switches (<code>dir \/a<\/code> for Windows and <code>ls \u2013a<\/code> for Linux and macOS).\n\nAdversaries can use this to their advantage to hide files and folders anywhere on the system for persistence and evading a typical user or system analysis that does not incorporate investigation of hidden files.\n\n### Windows\n\nUsers can mark specific files as hidden by using the attrib.exe binary. Simply do <code>attrib +h filename<\/code> to mark a file or folder as hidden. Similarly, the \u201c+s\u201d marks a file as a system file and the \u201c+r\u201d flag marks the file as read only. Like most windows binaries, the attrib.exe binary provides the ability to apply these changes recursively \u201c\/S\u201d.\n\n### Linux\/Mac\n\nUsers can mark specific files as hidden simply by putting a \u201c.\u201d as the first character in the file or folder name (Citation: Sofacy Komplex Trojan) (Citation: Antiquated Mac Malware). Files and folder that start with a period, \u2018.\u2019, are by default hidden from being viewed in the Finder application and standard command-line utilities like \u201cls\u201d. Users must specifically change settings to have these files viewable. For command line usages, there is typically a flag to see all files (including hidden ones). To view these files in the Finder Application, the following command must be executed: <code>defaults write com.apple.finder AppleShowAllFiles YES<\/code>, and then relaunch the Finder Application.\n\n### Mac\n\nFiles on macOS can be marked with the UF_HIDDEN flag which prevents them from being seen in Finder.app, but still allows them to be seen in Terminal.app (Citation: WireLurker).\nMany applications create these hidden files and folders to store information so that it doesn\u2019t clutter up the user\u2019s workspace. For example, SSH utilities create a .ssh folder that\u2019s hidden and contains the user\u2019s known hosts and keys.", |
© ESET 2014-2018 |
atomic-red-team |
T1016.md |
Using defaults , additional arguments can be added to see filtered details, such as globalstate for global configuration ("Is it on or off?"), firewall for common application allow rules, and explicitauths for specific rules configured by the user. |
MIT License. © 2018 Red Canary |
atomic-red-team |
T1016.md |
sudo defaults read /Library/Preferences/com.apple.alf |
MIT License. © 2018 Red Canary |
atomic-red-team |
T1037.002.md |
sudo defaults write com.apple.loginwindow LoginHook /Library/Scripts/AtomicRedTeam.sh |
MIT License. © 2018 Red Canary |
atomic-red-team |
T1037.002.md |
defaults write com.apple.loginwindow LoginHook /Library/Scripts/AtomicRedTeam.sh |
MIT License. © 2018 Red Canary |
atomic-red-team |
T1047.md |
| node | Computer the action is being executed against but defaults to the localhost. | string | 127.0.0.1| |
MIT License. © 2018 Red Canary |
atomic-red-team |
T1059.001.md |
| obfuscated_code | Defaults to: Invoke-Expression with a “Write-Host” line. | String | JgAgACgAZwBjAG0AIAAoACcAaQBlAHsAMAB9ACcAIAAtAGYAIAAnAHgAJwApACkAIAAoACIAVwByACIAKwAiAGkAdAAiACsAIgBlAC0ASAAiACsAIgBvAHMAdAAgACcASAAiACsAIgBlAGwAIgArACIAbABvACwAIABmAHIAIgArACIAbwBtACAAUAAiACsAIgBvAHcAIgArACIAZQByAFMAIgArACIAaAAiACsAIgBlAGwAbAAhACcAIgApAA==| |
MIT License. © 2018 Red Canary |
atomic-red-team |
T1543.002.md |
if [ $(cat /etc/os-release | grep -i ID=ubuntu) ] || [ $(cat /etc/os-release | grep -i ID=kali) ]; then update-rc.d T1543.002 defaults; elif [ $(cat /etc/os-release | grep -i ‘ID=”centos”’) ]; then chkconfig T1543.002 on ; else echo “Please run this test on Ubnutu , kali OR centos” ; fi ; |
MIT License. © 2018 Red Canary |
atomic-red-team |
T1547.007.md |
Mac Defaults |
MIT License. © 2018 Red Canary |
atomic-red-team |
T1547.007.md |
sudo defaults write com.apple.loginwindow LoginHook #{script} |
MIT License. © 2018 Red Canary |
atomic-red-team |
T1547.007.md |
sudo defaults delete com.apple.loginwindow LoginHook |
MIT License. © 2018 Red Canary |
atomic-red-team |
T1548.003.md |
In the wild, malware has disabled tty_tickets to potentially make scripting easier by issuing echo \'Defaults !tty_tickets\' >> /etc/sudoers (Citation: cybereason osx proton). In order for this change to be reflected, the malware also issued killall Terminal . As of macOS Sierra, the sudoers file has tty_tickets enabled by default.</blockquote> |
MIT License. © 2018 Red Canary |
atomic-red-team |
T1548.003.md |
sudo sh -c “echo Defaults “’!’“tty_tickets » /etc/sudoers” |
MIT License. © 2018 Red Canary |
atomic-red-team |
T1564.001.md |
defaults write com.apple.finder AppleShowAllFiles YES |
MIT License. © 2018 Red Canary |
atomic-red-team |
T1564.001.md |
defaults write com.apple.finder AppleShowAllFiles NO |
MIT License. © 2018 Red Canary |
signature-base |
apt_eqgrp.yar |
$x5 = “-p DEST_PORT, –dest_port=DEST_PORT defaults: telnet=23, ssh=22 (optional) - Change to LOCAL redirect port” fullword ascii |
CC BY-NC 4.0 |
signature-base |
apt_eqgrp_apr17.yar |
$s2 = “You may enter between 1 and 6 ports to change the defaults.” fullword ascii |
CC BY-NC 4.0 |
signature-base |
thor-hacktools.yar |
$s0 = “port - Port to listen on, defaults to 2323” fullword ascii |
CC BY-NC 4.0 |
signature-base |
thor-webshells.yar |
$s0 = “action=mysqlread&mass=loadmass">load all defaults” |
CC BY-NC 4.0 |
stockpile |
10fad81e-3f68-47be-83b6-fbee7711c6a9.yml |
defaults to the current user's Recycle Bin (Windows) and /tmp (Linux). Payload files include default values for all |
Apache-2.0 |