Rule Library

Sigma Rules

5 rules found

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

MacOS Emond Launch Daemon

Detects additions to the Emond Launch Daemon that adversaries may use to gain persistence and elevate privileges.

macOSFile Event
TA0003 · PersistenceTA0004 · Privilege Escalationattack.t1546.014
Alejandro Ortuno+1Fri Oct 23macos
Detectionlowtest

Startup Item File Created - MacOS

Detects the creation of a startup item plist file, that automatically get executed at boot initialization to establish persistence. Adversaries may use startup items automatically executed at boot initialization to establish persistence. Startup items execute during the final phase of the boot process and contain shell scripts or other executable files along with configuration information used by the system to determine the execution order for all startup items.

macOSFile Event
TA0003 · PersistenceTA0004 · Privilege EscalationT1037.005 · Startup Items
Alejandro Ortuno+1Wed Oct 14macos
Emerging Threathighexperimental

Atomic MacOS Stealer - Persistence Indicators

Detects creation of persistence artifacts placed by Atomic MacOS Stealer in macOS systems. Recent Atomic MacOS Stealer variants have been observed dropping these to maintain persistent access after compromise.

macOSFile Event
TA0003 · PersistenceTA0004 · Privilege EscalationTA0005 · Defense EvasionT1564.001 · Hidden Files and Directories+2
Jason Phang Vern - Onn+1Sat Nov 222025
Emerging Threathighexperimental

Axios NPM Compromise File Creation Indicators - MacOS

Detects file creation events linked to the Axios NPM supply chain compromise on macOS devices. Axios is a popular JavaScript HTTP client. On March 30, 2026, malicious versions (1.14.1, 0.30.4) were published to npm, injecting a dependency (plain-crypto-js@4.2.1) that executed a postinstall script as a cross-platform RAT dropper.

macOSFile Event
TA0001 · Initial AccessT1195.002 · Compromise Software Supply ChainTA0011 · Command and ControlT1105 · Ingress Tool Transfer+1
Swachchhanda Shrawan Poudel (Nextron Systems)Wed Apr 012026
Threat Huntmediumtest

Python Path Configuration File Creation - MacOS

Detects creation of a Python path configuration file (.pth) in Python library folders, which can be maliciously abused for code execution and persistence. Modules referenced by these files are run at every Python startup (v3.5+), regardless of whether the module is imported by the calling script. Default paths are '\lib\site-packages\*.pth' (Windows) and '/lib/pythonX.Y/site-packages/*.pth' (Unix and macOS).

macOSFile Event
TA0002 · ExecutionT1059.006 · Pythondetection.threat-hunting
Andreas Braathen (mnemonic.io)Thu Apr 25macos