hunting/macos/queries/execution_suspicious_python_app_execution_via_streamlit.toml (40 lines of code) (raw):
[hunt]
author = "Elastic"
name = "Suspicious Python App Execution via Streamlit"
uuid = "04d4b300-bf2f-4e86-8fab-c51502a1db32"
description = """
Detects execution of a Python application using Streamlit followed shortly by an outbound network connection. This pattern was seen in the Safe/ByBit breach and may indicate abuse of Streamlit to stage or serve a malicious interface during initial access operations.
"""
integration = ["endpoint"]
language = ["EQL"]
license = "Elastic License v2"
mitre = ["T1059.006", "T1105"]
notes = [
"This hunt identifies Python apps run via Streamlit from user directories, immediately followed by external network activity.",
"Streamlit-based payloads may abuse the framework to present fake interfaces or interactive apps during initial access.",
"Outbound connection filtering avoids internal IPs and infrastructure — can be tuned to your network space."
]
query = [
'''
sequence by process.entity_id with maxspan=2m
[process where event.type == "start" and event.action == "exec" and
process.name like~ "python*" and
process.args like ("/Users/*/Downloads/*streamlit", "/Users/*/Desktop/*streamlit", "/Users/*/Documents/*streamlit") and
process.args == "run" and process.args : "*.py" and
process.args_count == 4]
[network where event.type == "start" and destination.domain != null and
not cidrmatch(destination.ip,
"240.0.0.0/4", "233.252.0.0/24", "224.0.0.0/4", "198.19.0.0/16", "192.18.0.0/15",
"192.0.0.0/24", "10.0.0.0/8", "127.0.0.0/8", "169.254.0.0/16", "172.16.0.0/12",
"192.0.2.0/24", "192.31.196.0/24", "192.52.193.0/24", "192.168.0.0/16", "192.88.99.0/24",
"100.64.0.0/10", "192.175.48.0/24", "198.18.0.0/15", "198.51.100.0/24", "203.0.113.0/24",
"::1", "FE80::/10", "FF00::/8")]
'''
]
references = [
"https://www.elastic.co/security-labs/dprk-code-of-conduct",
"https://unit42.paloaltonetworks.com/slow-pisces-new-custom-malware/",
"https://slowmist.medium.com/cryptocurrency-apt-intelligence-unveiling-lazarus-groups-intrusion-techniques-a1a6efda7d34",
"https://x.com/safe/status/1897663514975649938",
"https://www.sygnia.co/blog/sygnia-investigation-bybit-hack/"
]