Rule Library

Sigma Rules

5 rules found for "Pratinav Chandra"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

Launch Agent/Daemon Execution Via Launchctl

Detects the execution of programs as Launch Agents or Launch Daemons using launchctl on macOS.

macOSProcess Creation
TA0004 · Privilege EscalationTA0002 · ExecutionTA0003 · PersistenceT1569.001 · Launchctl+2
Pratinav ChandraMon May 13macos
Detectionmediumtest

System Information Discovery Via Sysctl - MacOS

Detects the execution of "sysctl" with specific arguments that have been used by threat actors and malware. It provides system hardware information. This process is primarily used to detect and avoid virtualization and analysis environments.

macOSProcess Creation
TA0005 · Defense EvasionT1497.001 · System ChecksTA0007 · DiscoveryT1082 · System Information Discovery
Pratinav ChandraMon May 27macos
Detectionmediumtest

Time Machine Backup Deletion Attempt Via Tmutil - MacOS

Detects deletion attempts of MacOS Time Machine backups via the native backup utility "tmutil". An adversary may perform this action before launching a ransonware attack to prevent the victim from restoring their files.

macOSProcess Creation
TA0040 · ImpactT1490 · Inhibit System Recovery
Pratinav ChandraWed May 29macos
Detectionmediumtest

Time Machine Backup Disabled Via Tmutil - MacOS

Detects disabling of Time Machine (Apple's automated backup utility software) via the native macOS backup utility "tmutil". An attacker can use this to prevent backups from occurring.

macOSProcess Creation
TA0040 · ImpactT1490 · Inhibit System Recovery
Pratinav ChandraWed May 29macos
Detectionmediumtest

New File Exclusion Added To Time Machine Via Tmutil - MacOS

Detects the addition of a new file or path exclusion to MacOS Time Machine via the "tmutil" utility. An adversary could exclude a path from Time Machine backups to prevent certain files from being backed up.

macOSProcess Creation
TA0040 · ImpactT1490 · Inhibit System Recovery
Pratinav ChandraWed May 29macos