369. Here's How MonetaStealer Abuses macOS "Security"
Hello everyone!
It’s been a while since we last talked about macOS, so it’s high time to fix that. Today, we’ll look at an example of implementing the technique Credentials from Password Stores: Keychain (T1555.001).
As before, our focus is on real-world threats, and as an example we’ll examine MonetaStealer. This malware actively abuses the built-in macOS security utility, which is designed to work with the macOS security system - primarily the Keychain, certificates, passwords, and access control policies.
For example, the stealer abuses this utility to obtain the key used to decrypt passwords saved in Google Chrome:
security find-generic-password -w -a "Chrome"
The utility is also used to extract data from the Keychain and search for specific keywords:
security dump-keychain 2>/dev/null | grep -i {keyword} | head -20
Both examples can be good targets for hunting (or even detection):
event_type: "processcreatemac"
AND
proc_file_path: "security"
AND
cmdline: ("find-generic-password" OR "dump-keychain")
See you soon!

Comments
Post a Comment