T1543.001 - Launch Agent
Sub-technique
Tactics:
Persistence Privilege Escalation
Persistence Privilege Escalation
Platforms:
macOS
macOS
Detection:
Not specified
Not specified
Description:
Adversaries may create or modify launch agents to repeatedly execute malicious payloads as part of persistence. When a user logs in, a per-user launchd process is started which loads the parameters for each launch-on-demand user agent from the property list (.plist) file found in <code>/System/Library/LaunchAgents</code>, <code>/Library/LaunchAgents</code>, and <code>~/Library/LaunchAgents</code>.(Citation: AppleDocs Launch Agent Daemons)(Citation: OSX Keydnap malware) (Citation: Antiquated Mac Malware) Property list files use the <code>Label</code>, <code>ProgramArguments </code>, and <code>RunAtLoad</code> keys to identify the Launch Agent's name, executable location, and execution time.(Citation: OSX.Dok Malware) Launch Agents are often installed to perform updates to programs, launch user specified programs at login, or to conduct other developer tasks.
Launch Agents can also be executed using the [Launchctl](https://attack.mitre.org/techniques/T1569/001) command.
Adversaries may install a new Launch Agent that executes at login by placing a .plist file into the appropriate folders with the <code>RunAtLoad</code> or <code>KeepAlive</code> keys set to <code>true</code>.(Citation: Sofacy Komplex Trojan)(Citation: Methods of Mac Malware Persistence) The Launch Agent name may be disguised by using a name from the related operating system or benign software. Launch Agents are created with user level privileges and execute with user level permissions.(Citation: OSX Malware Detection)(Citation: OceanLotus for OS X)
Launch Agents can also be executed using the [Launchctl](https://attack.mitre.org/techniques/T1569/001) command.
Adversaries may install a new Launch Agent that executes at login by placing a .plist file into the appropriate folders with the <code>RunAtLoad</code> or <code>KeepAlive</code> keys set to <code>true</code>.(Citation: Sofacy Komplex Trojan)(Citation: Methods of Mac Malware Persistence) The Launch Agent name may be disguised by using a name from the related operating system or benign software. Launch Agents are created with user level privileges and execute with user level permissions.(Citation: OSX Malware Detection)(Citation: OceanLotus for OS X)
Used by Actors (1)
Malware (20)
InvisibleFerret other
macOS.OSAMiner other
NETWIRE other
Dacls other
Cuckoo Stealer other
FruitFly other
Keydnap other
Green Lambert other
ThiefQuest other
Bundlore other
CrossRAT other
OSX_OCEANLOTUS.D other
Calisto other
MacMa other
Proton other
CoinTicker other
CookieMiner other
Komplex other
Dok other
MacSpy other
Metadata
| MITRE ID: | T1543.001 |
| STIX ID: | attack-pattern--d10cbd34-42e3-... |
| Platforms: | macOS |
| Created: | 13/01/2026 17:48 |
| Updated: | 06/03/2026 16:00 |