Rule Library

Sigma Rules

515 rules found for "Red Canary"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

Chmod Suspicious Directory

Detects chmod targeting files in abnormal directory paths.

LinuxProcess Creation
TA0005 · Defense Evasionattack.t1222.002
Christopher Peacock+1Fri Jun 03linux
Detectionmediumtest

Suspicious Curl File Upload - Linux

Detects a suspicious curl process start the adds a file to a web request

LinuxProcess Creation
TA0010 · ExfiltrationTA0011 · Command and ControlT1567 · Exfiltration Over Web ServiceT1105 · Ingress Tool Transfer
Nasreddine Bencherchali (Nextron Systems)+1Thu Sep 15linux
Detectionhightest

History File Deletion

Detects events in which a history file gets deleted, e.g. the ~/bash_history to remove traces of malicious activity

LinuxProcess Creation
TA0040 · ImpactT1565.001 · Stored Data Manipulation
Florian Roth (Nextron Systems)Mon Jun 20linux
Detectionmediumtest

Print History File Contents

Detects events in which someone prints the contents of history files to the commandline or redirects it to a file for reconnaissance

LinuxProcess Creation
TA0043 · ReconnaissanceT1592.004 · Client Configurations
Florian Roth (Nextron Systems)Mon Jun 20linux
Detectionlowtest

Linux Network Service Scanning Tools Execution

Detects execution of network scanning and reconnaisance tools. These tools can be used for the enumeration of local or remote network services for example.

LinuxProcess Creation
TA0007 · DiscoveryT1046 · Network Service Discovery
Alejandro Ortuno+2Wed Oct 21linux
Detectioninformationalstable

System Information Discovery

Detects system information discovery commands

LinuxProcess Creation
TA0007 · DiscoveryT1082 · System Information Discovery
Ömer Günal+1Thu Oct 08linux
Detectionlowtest

System Network Connections Discovery - Linux

Detects usage of system utilities to discover system network connections

LinuxProcess Creation
TA0007 · DiscoveryT1049 · System Network Connections Discovery
Daniil Yugoslavskiy+1Mon Oct 19linux
Detectioninformationaltest

System Network Discovery - Linux

Detects enumeration of local network configuration

LinuxProcess Creation
TA0007 · DiscoveryT1016 · System Network Configuration Discovery
Ömer Günal and remotephone+1Tue Oct 06linux
Detectionmediumtest

MacOS Emond Launch Daemon

Detects additions to the Emond Launch Daemon that adversaries may use to gain persistence and elevate privileges.

macOSFile Event
TA0003 · PersistenceTA0004 · Privilege Escalationattack.t1546.014
Alejandro Ortuno+1Fri Oct 23macos
Detectionlowtest

Startup Item File Created - MacOS

Detects the creation of a startup item plist file, that automatically get executed at boot initialization to establish persistence. Adversaries may use startup items automatically executed at boot initialization to establish persistence. Startup items execute during the final phase of the boot process and contain shell scripts or other executable files along with configuration information used by the system to determine the execution order for all startup items.

macOSFile Event
TA0003 · PersistenceTA0004 · Privilege EscalationT1037.005 · Startup Items
Alejandro Ortuno+1Wed Oct 14macos
Detectionmediumtest

MacOS Scripting Interpreter AppleScript

Detects execution of AppleScript of the macOS scripting language AppleScript.

macOSProcess Creation
TA0002 · ExecutionT1059.002 · AppleScript
Alejandro Ortuno+1Wed Oct 21macos
Detectionlowtest

Decode Base64 Encoded Text -MacOs

Detects usage of base64 utility to decode arbitrary base64-encoded text

macOSProcess Creation
TA0005 · Defense EvasionT1027 · Obfuscated Files or Information
Daniil Yugoslavskiy+1Mon Oct 19macos
Detectionhightest

Binary Padding - MacOS

Adversaries may use binary padding to add junk data and change the on-disk representation of malware. This rule detect using dd and truncate to add a junk data to file.

macOSProcess Creation
TA0005 · Defense EvasionT1027.001 · Binary Padding
Igor Fits+2Mon Oct 19macos
Detectionmediumtest

File Time Attribute Change

Detect file time attribute change to hide new or changes to existing files

macOSProcess Creation
TA0005 · Defense EvasionT1070.006 · Timestomp
Igor Fits+2Mon Oct 19macos
Detectionmediumtest

Indicator Removal on Host - Clear Mac System Logs

Detects deletion of local audit logs

macOSProcess Creation
TA0005 · Defense EvasionT1070.002 · Clear Linux or Mac System Logs
remotephone+1Sun Oct 11macos
Detectionlowtest

Creation Of A Local User Account

Detects the creation of a new user account. Such accounts may be used for persistence that do not require persistent remote access tools to be deployed on the system.

macOSProcess Creation
T1136.001 · Local AccountTA0003 · Persistence
Alejandro Ortuno+1Tue Oct 06macos
Detectionmediumtest

Hidden User Creation

Detects creation of a hidden user account on macOS (UserID < 500) or with IsHidden option

macOSProcess Creation
TA0005 · Defense EvasionT1564.002 · Hidden Users
Daniil Yugoslavskiy+1Sat Oct 10macos
Detectionmediumtest

Credentials from Password Stores - Keychain

Detects passwords dumps from Keychain

macOSProcess Creation
TA0006 · Credential AccessT1555.001 · Keychain
Tim Ismilyaev+2Mon Oct 19macos
Detectionmediumtest

Disable Security Tools

Detects disabling security tools

macOSProcess Creation
TA0005 · Defense EvasionT1562.001 · Disable or Modify Tools
Daniil Yugoslavskiy+1Mon Oct 19macos
Detectionmediumtest

User Added To Admin Group Via Dscl

Detects attempts to create and add an account to the admin group via "dscl"

macOSProcess Creation
TA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial AccessTA0004 · Privilege Escalation+1
Sohan G (D4rkCiph3r)Sun Mar 19macos
Detectionmediumtest

User Added To Admin Group Via DseditGroup

Detects attempts to create and/or add an account to the admin group, thus granting admin privileges.

macOSProcess Creation
TA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial AccessTA0004 · Privilege Escalation+1
Sohan G (D4rkCiph3r)Tue Aug 22macos
Detectionmediumtest

Root Account Enable Via Dsenableroot

Detects attempts to enable the root account via "dsenableroot"

macOSProcess Creation
TA0004 · Privilege EscalationTA0005 · Defense EvasionT1078 · Valid AccountsT1078.001 · Default Accounts+3
Sohan G (D4rkCiph3r)Tue Aug 22macos
Detectioninformationaltest

File and Directory Discovery - MacOS

Detects usage of system utilities to discover files and directories

macOSProcess Creation
TA0007 · DiscoveryT1083 · File and Directory Discovery
Daniil Yugoslavskiy+1Mon Oct 19macos
Detectionhightest

Credentials In Files

Detecting attempts to extract passwords with grep and laZagne

macOSProcess Creation
TA0006 · Credential AccessT1552.001 · Credentials In Files
Igor Fits+2Mon Oct 19macos
Detectionlowtest

GUI Input Capture - macOS

Detects attempts to use system dialog prompts to capture user credentials

macOSProcess Creation
TA0009 · CollectionTA0006 · Credential AccessT1056.002 · GUI Input Capture
remotephone+1Tue Oct 13macos
Detectionmediumtest

Suspicious Installer Package Child Process

Detects the execution of suspicious child processes from macOS installer package parent process. This includes osascript, JXA, curl and wget amongst other interpreters

macOSProcess Creation
T1059 · Command and Scripting InterpreterT1059.007 · JavaScriptT1071 · Application Layer ProtocolT1071.001 · Web Protocols+2
Sohan G (D4rkCiph3r)Sat Feb 18macos
Detectionhightest

JXA In-memory Execution Via OSAScript

Detects possible malicious execution of JXA in-memory via OSAScript

macOSProcess Creation
T1059.002 · AppleScriptT1059.007 · JavaScriptTA0002 · Execution
Sohan G (D4rkCiph3r)Tue Jan 31macos
Detectionmediumtest

Launch Agent/Daemon Execution Via Launchctl

Detects the execution of programs as Launch Agents or Launch Daemons using launchctl on macOS.

macOSProcess Creation
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1569.001 · Launchctl+2
Pratinav ChandraMon May 13macos
Detectionlowtest

Local System Accounts Discovery - MacOs

Detects enumeration of local systeam accounts on MacOS

macOSProcess Creation
TA0007 · DiscoveryT1087.001 · Local Account
Alejandro Ortuno+1Thu Oct 08macos
Detectioninformationaltest

Local Groups Discovery - MacOs

Detects enumeration of local system groups

macOSProcess Creation
TA0007 · DiscoveryT1069.001 · Local Groups
Ömer Günal+2Sun Oct 11macos
Detectionlowtest

MacOS Network Service Scanning

Detects enumeration of local or remote network services.

macOSProcess Creation
TA0007 · DiscoveryT1046 · Network Service Discovery
Alejandro Ortuno+1Wed Oct 21macos
Detectioninformationaltest

Network Sniffing - MacOs

Detects the usage of tooling to sniff network traffic. An adversary may place a network interface into promiscuous mode to passively access data in transit over the network, or use span ports to capture a larger amount of data.

macOSProcess Creation
TA0007 · DiscoveryTA0006 · Credential AccessT1040 · Network Sniffing
Alejandro Ortuno+1Wed Oct 14macos
Detectionhightest

Suspicious Microsoft Office Child Process - MacOS

Detects suspicious child processes spawning from microsoft office suite applications such as word or excel. This could indicates malicious macro execution

macOSProcess Creation
TA0002 · ExecutionTA0003 · PersistenceT1059.002 · AppleScriptT1137.002 · Office Test+1
Sohan G (D4rkCiph3r)Tue Jan 31macos
Detectionhightest

OSACompile Run-Only Execution

Detects potential suspicious run-only executions compiled using OSACompile

macOSProcess Creation
T1059.002 · AppleScriptTA0002 · Execution
Sohan G (D4rkCiph3r)Tue Jan 31macos
Detectionhightest

Potential Persistence Via PlistBuddy

Detects potential persistence activity using LaunchAgents or LaunchDaemons via the PlistBuddy utility

macOSProcess Creation
TA0004 · Privilege EscalationTA0003 · PersistenceT1543.001 · Launch AgentT1543.004 · Launch Daemon
Sohan G (D4rkCiph3r)Sat Feb 18macos
Detectioninformationaltest

Macos Remote System Discovery

Detects the enumeration of other remote systems.

macOSProcess Creation
TA0007 · DiscoveryT1018 · Remote System Discovery
Alejandro Ortuno+1Thu Oct 22macos
Detectionmediumtest

Scheduled Cron Task/Job - MacOs

Detects abuse of the cron utility to perform task scheduling for initial or recurring execution of malicious code. Detection will focus on crontab jobs uploaded from the tmp folder.

macOSProcess Creation
TA0002 · ExecutionTA0003 · PersistenceTA0004 · Privilege EscalationT1053.003 · Cron
Alejandro Ortuno+1Tue Oct 06macos
Detectionlowtest

Screen Capture - macOS

Detects attempts to use screencapture to collect macOS screenshots

macOSProcess Creation
TA0009 · CollectionT1113 · Screen Capture
remotephone+1Tue Oct 13macos
Detectionmediumtest

Security Software Discovery - MacOs

Detects usage of system utilities (only grep for now) to discover security software discovery

macOSProcess Creation
TA0007 · DiscoveryT1518.001 · Security Software Discovery
Daniil Yugoslavskiy+1Mon Oct 19macos
Detectionlowtest

Space After Filename - macOS

Detects attempts to masquerade as legitimate files by adding a space to the end of the filename.

macOSProcess Creation
TA0005 · Defense EvasionT1036.006 · Space after Filename
remotephoneSat Nov 20macos
Detectionlowtest

Split A File Into Pieces

Detection use of the command "split" to split files into parts and possible transfer.

macOSProcess Creation
TA0010 · ExfiltrationT1030 · Data Transfer Size Limits
Igor Fits+2Thu Oct 15macos
Detectionmediumtest

Osacompile Execution By Potentially Suspicious Applet/Osascript

Detects potential suspicious applet or osascript executing "osacompile".

macOSProcess Creation
TA0002 · ExecutionT1059.002 · AppleScript
Sohan G (D4rkCiph3r)+1Mon Apr 03macos
Detectionmediumtest

Suspicious History File Operations

Detects commandline operations on shell history files

macOSProcess Creation
TA0006 · Credential AccessT1552.003 · Bash History
Mikhail Larin+1Sat Oct 17macos
Detectionmediumtest

Potential In-Memory Download And Compile Of Payloads

Detects potential in-memory downloading and compiling of applets using curl and osacompile as seen used by XCSSET malware

macOSProcess Creation
TA0011 · Command and ControlTA0002 · ExecutionT1059.007 · JavaScriptT1105 · Ingress Tool Transfer
Sohan G (D4rkCiph3r)+1Tue Aug 22macos
Detectioninformationaltest

System Network Discovery - macOS

Detects enumeration of local network configuration

macOSProcess Creation
TA0007 · DiscoveryT1016 · System Network Configuration Discovery
remotephone+1Tue Oct 06macos
Detectionmediumtest

User Added To Admin Group Via Sysadminctl

Detects attempts to create and add an account to the admin group via "sysadminctl"

macOSProcess Creation
TA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial AccessTA0004 · Privilege Escalation+1
Sohan G (D4rkCiph3r)Sun Mar 19macos
Detectioninformationaltest

System Network Connections Discovery - MacOs

Detects usage of system utilities to discover system network connections

macOSProcess Creation
TA0007 · DiscoveryT1049 · System Network Connections Discovery
Daniil Yugoslavskiy+1Mon Oct 19macos
Detectioninformationaltest

System Shutdown/Reboot - MacOs

Adversaries may shutdown/reboot systems to interrupt access to, or aid in the destruction of, those systems.

macOSProcess Creation
TA0040 · ImpactT1529 · System Shutdown/Reboot
Igor Fits+2Mon Oct 19macos