Files
sigma-rules/hunting/macos/queries/credential_access_potential_python_stealer.toml
T
Terrance DeJesus bbfc026c95 [New Hunt] New Hunting Queries for DPRK ByBit (#4644)
* new hunting queries for macOS DPRK

* added docker hunting queries
2025-04-23 16:41:23 -04:00

34 lines
1.6 KiB
TOML

[hunt]
author = "Elastic"
name = "Potential Python Stealer Activity"
uuid = "107fe9a2-6743-4136-a055-fa070fd38f2f"
description = """
Detects the execution of a Python script followed by at least three consecutive open actions on files within a 30-second window. This behavior may indicate an attempt to access or exfiltrate sensitive data such as browser files, credentials, or configuration files.
"""
integration = ["endpoint"]
language = ["EQL"]
license = "Elastic License v2"
mitre = ["T1059.006", "T1552.001"]
notes = [
"This hunt identifies Python-based access to multiple files shortly after script execution, a pattern common to stealers.",
"Adjustments may be needed to focus on high-value file paths (e.g., browser data, tokens, configuration files).",
"Further pivoting on `file.path`, `process.entity_id`, and `process.args` is recommended for triage."
]
query = [
'''
sequence by process.entity_id with maxspan=30s
[process where event.type == "start" and event.action == "exec" and
process.name like~ "python*" and process.args_count == 2 and
process.args like ("/Users/*", "/tmp/*", "/private/tmp/*")]
[file where event.action == "open"]
[file where event.action == "open"]
[file where event.action == "open"]
'''
]
references = [
"https://www.elastic.co/security-labs/dprk-code-of-conduct",
"https://unit42.paloaltonetworks.com/slow-pisces-new-custom-malware/",
"https://slowmist.medium.com/cryptocurrency-apt-intelligence-unveiling-lazarus-groups-intrusion-techniques-a1a6efda7d34",
"https://x.com/safe/status/1897663514975649938",
"https://www.sygnia.co/blog/sygnia-investigation-bybit-hack/"
]