← Back to SOC feed Coverage →

MacOceanLotusBackdoor

kql MEDIUM Azure-Sentinel
DeviceProcessEvents
backdoorhuntingmicrosoftofficial
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at Azure-Sentinel →
Retrieved: 2026-05-05T11:00:00Z · Confidence: medium

Hunt Hypothesis

The MacOceanLotusBackdoor rule detects potential OceanLotus malware activity by identifying suspicious backdoor processes commonly associated with this advanced threat on macOS systems. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify and mitigate persistent, stealthy malware that could exfiltrate data or establish long-term access within the network.

KQL Query

DeviceProcessEvents
| where Timestamp > ago(14d)
| where FileName in~ ("screenassistantd","spellagentd")
| top 100 by Timestamp 

Analytic Rule Definition

id: 02b7dd9d-397a-4726-9761-1130b663f8cf
name: MacOceanLotusBackdoor
description: |
  Backdoor processes associated with OceanLotus Mac Malware Backdoor.
  References:.
  Https://blog.trendmicro.com/trendlabs-security-intelligence/new-macos-backdoor-linked-to-oceanlotus-found/.
  OS platforms: Macintosh.
requiredDataConnectors:
- connectorId: MicrosoftThreatProtection
  dataTypes:
  - DeviceProcessEvents
query: |
  DeviceProcessEvents
  | where Timestamp > ago(14d)
  | where FileName in~ ("screenassistantd","spellagentd")
  | top 100 by Timestamp 

Required Data Sources

Sentinel TableNotes
DeviceProcessEventsEnsure this data connector is enabled

References

False Positive Guidance

Original source: https://github.com/Azure/Azure-Sentinel/blob/main/Hunting Queries/Microsoft 365 Defender/Campaigns/MacOceanLotusBackdoor.yaml