Simple MacOS EICAR PoC Payload (#350)

* Add files via upload

* Add files via upload

Co-authored-by: Ciph3rtxt <30738667+Ciph3rtxt@users.noreply.github.com>
This commit is contained in:
Whiskey Xray 2022-02-14 21:40:59 -05:00 committed by GitHub
parent 3184c229c7
commit a5d11747cf
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
3 changed files with 53 additions and 0 deletions

View File

@ -0,0 +1,2 @@
#!/bin/bash
echo 'X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*'\ >Desktop/Malware.txt

View File

@ -0,0 +1,32 @@
#!/bin/bash
# Title: MacOS_EICAR
# Description: Bad USB PoC for MacOS.
# Author: Ciph3rtxt
# Category: PoC
# Target: MacOS
# Attackmodes: HID STORAGE
# Setup
LED R
ATTACKMODE HID STORAGE
GET SWITCH_POSITION
path=/Volumes/BashBunny/payloads/$SWITCH_POSITION
# Execute Attack
LED R
DELAY 200
RUN OSX terminal
Q DELAY 2000
Q STRING cd
Q ENTER
Q DELAY 200
Q STRING chmod a+x $path/eicar.sh
Q ENTER
Q DELAY 200
Q STRING $path/eicar.sh
Q ENTER
Q DELAY 200
# Complete
LED G

View File

@ -0,0 +1,19 @@
# MacOS EICAR PoC
Author: Ciph3rtxt
## Category:
PoC
## Description:
Generates EICAR file to simulate USB (physical access) malware attack.
## Status:
|LED|STATUS|
|-|-|
|Red|Attack|
|Green|Complete|