369. Here's How MonetaStealer Abuses macOS "Security"

Hello everyone!

It’s been a while since we last talked about macOS, so it’s high time to fix that. Today, we’ll look at an example of implementing the technique Credentials from Password Stores: Keychain (T1555.001).

As before, our focus is on real-world threats, and as an example we’ll examine MonetaStealer. This malware actively abuses the built-in macOS security utility, which is designed to work with the macOS security system - primarily the Keychain, certificates, passwords, and access control policies.

For example, the stealer abuses this utility to obtain the key used to decrypt passwords saved in Google Chrome:

security find-generic-password -w -a "Chrome"

The utility is also used to extract data from the Keychain and search for specific keywords:

security dump-keychain 2>/dev/null | grep -i {keyword} | head -20

Both examples can be good targets for hunting (or even detection):

event_type: "processcreatemac"

AND

proc_file_path: "security"

AND

cmdline: ("find-generic-password" OR "dump-keychain")

See you soon!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

068. Detecting RMMs from Ransomware Affiliate's Toolkit: MeshAgent