bbfc026c95
* new hunting queries for macOS DPRK * added docker hunting queries
1.9 KiB
1.9 KiB
Potential Python Stealer Activity
Metadata
-
Author: Elastic
-
Description: Detects the execution of a Python script followed by at least three consecutive open actions on files within a 30-second window. This behavior may indicate an attempt to access or exfiltrate sensitive data such as browser files, credentials, or configuration files.
-
UUID:
107fe9a2-6743-4136-a055-fa070fd38f2f -
Integration: endpoint
-
Language:
[EQL] -
Source File: Potential Python Stealer Activity
Query
sequence by process.entity_id with maxspan=30s
[process where event.type == "start" and event.action == "exec" and
process.name like~ "python*" and process.args_count == 2 and
process.args like ("/Users/*", "/tmp/*", "/private/tmp/*")]
[file where event.action == "open"]
[file where event.action == "open"]
[file where event.action == "open"]
Notes
- This hunt identifies Python-based access to multiple files shortly after script execution, a pattern common to stealers.
- Adjustments may be needed to focus on high-value file paths (e.g., browser data, tokens, configuration files).
- Further pivoting on
file.path,process.entity_id, andprocess.argsis recommended for triage.
MITRE ATT&CK Techniques
References
- https://www.elastic.co/security-labs/dprk-code-of-conduct
- https://unit42.paloaltonetworks.com/slow-pisces-new-custom-malware/
- https://slowmist.medium.com/cryptocurrency-apt-intelligence-unveiling-lazarus-groups-intrusion-techniques-a1a6efda7d34
- https://x.com/safe/status/1897663514975649938
- https://www.sygnia.co/blog/sygnia-investigation-bybit-hack/
License
Elastic License v2