Detectionmediumtest

MacOS Emond Launch Daemon

Detects additions to the Emond Launch Daemon that adversaries may use to gain persistence and elevate privileges.

Convert In Phoenix Studio

Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.

Launch
Alejandro Ortuno, oscd.communityCreated Fri Oct 23Updated Sat Nov 2723c43900-e732-45a4-8354-63e4a6c187cemacos
Log Source
macOSFile Event
ProductmacOS← raw: macos
CategoryFile Event← raw: file_event

Events for file system activity including creation, modification, and deletion.

Detection Logic
Detection Logic2 selectors
detection:
    selection_1:
        TargetFilename|contains: '/etc/emond.d/rules/'
        TargetFilename|endswith: '.plist'
    selection_2:
        TargetFilename|contains: '/private/var/db/emondClients/'
    condition: 1 of selection_*
False Positives

Legitimate administration activities

MITRE ATT&CK
Rule Metadata
Rule ID
23c43900-e732-45a4-8354-63e4a6c187ce
Status
test
Level
medium
Type
Detection
Created
Fri Oct 23
Modified
Sat Nov 27
Path
rules/macos/file_event/file_event_macos_emond_launch_daemon.yml
Raw Tags
attack.persistenceattack.privilege-escalationattack.t1546.014
View on GitHub