Actor(s): Lazarus Group
There is no description at this point.
rule osx_3cx_backdoor_w0 { meta: author = "threatintel@volexity.com" date = "2023-03-30" description = "Detects the MACOS version of the ICONIC loader." hash1 = "a64fa9f1c76457ecc58402142a8728ce34ccba378c17318b3340083eeb7acc67" reference = "https://www.reddit.com/r/crowdstrike/comments/125r3uu/20230329_situational_awareness_crowdstrike/" memory_suitable = 1 license = "See license at https://github.com/volexity/threat-intel/blob/main/LICENSE.txt" malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/osx.3cx_backdoor" malpedia_version = "20230331" malpedia_rule_date = "20230331" malpedia_hash = "" malpedia_license = "" malpedia_sharing = "TLP:WHITE" strings: $str1 = "3CX Desktop App" xor(0x01-0xff) $str2 = "__tutma=" xor(0x01-0xff) $str3 = "Mozilla/5.0" xor(0x01-0xff) condition: all of them }
If your designated proposal does not fit in any other category, feel free to write a free-text in the comment field below. Changes regarding references should be proposed on the Malpedia library page.
Your suggestion will be reviewed before being published. Thank you for contributing!
YYYY-MM-DD
YYYY-MM
YYYY