Rule Category

MALWARE-OTHER --

Alert Message

MALWARE-OTHER PUA.Unix.Adware.Macsearch-8347867-0 download attempt

Rule Explanation

This rule alerts when an attempt to download an executable matching ClamAV signature PUA.Unix.Adware.Macsearch-8347867-0 is detected

What To Look For

This rule alerts when an attempt to download an executable matching ClamAV signature PUA.Unix.Adware.Macsearch-8347867-0 is detected

Known Usage

No public information

False Positives

No known false positives

Contributors

Cisco Talos Intelligence Group

MITRE ATT&CK Framework

Tactic:

Technique:

For reference, see the MITRE ATT&CK vulnerability types here: https://attack.mitre.org

Additional Links

Rule Vulnerability

Memory Corruption

Memory Corruption is any vulnerability that allows the modification of the content of memory locations in a way not intended by the developer. Memory corruption results are inconsistent; they could lead to fatal errors and system crashes or data leakage; some have no effect at all.

CVE Additional Information