Local Groups Discovery - MacOs
Detects enumeration of local system groups
Sigma rule (View on GitHub)
1title: Local Groups Discovery - MacOs
2id: 89bb1f97-c7b9-40e8-b52b-7d6afbd67276
3status: test
4description: Detects enumeration of local system groups
5references:
6 - https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1069.001/T1069.001.md
7author: Ömer Günal, Alejandro Ortuno, oscd.community
8date: 2020-10-11
9modified: 2022-11-27
10tags:
11 - attack.discovery
12 - attack.t1069.001
13logsource:
14 category: process_creation
15 product: macos
16detection:
17 selection_1:
18 Image|endswith: '/dscacheutil'
19 CommandLine|contains|all:
20 - '-q'
21 - 'group'
22 selection_2:
23 Image|endswith: '/cat'
24 CommandLine|contains: '/etc/group'
25 selection_3:
26 Image|endswith: '/dscl'
27 CommandLine|contains|all:
28 - '-list'
29 - '/groups'
30 condition: 1 of selection*
31falsepositives:
32 - Legitimate administration activities
33level: informational
References
Related rules
- AD Groups Or Users Enumeration Using PowerShell - PoshModule
- AD Groups Or Users Enumeration Using PowerShell - ScriptBlock
- BloodHound Collection Files
- HackTool - Bloodhound/Sharphound Execution
- Local Groups Discovery - Linux