297. Hunting for Python Telegram RAT
Hello everyone!
It's not always PowerShell (T1059.001) or Windows Command Shell (T1059.003), more and more often adversaries use alternatives, for example, Python (T1059.006).
Netskope discovered a new Python RAT that leverages the Telegram Bot API as a command and control (C2) channel. The RAT is executed via pythonw.exe:
pythonw.exe C:\Users\User\AppData\Local\Temp\_MEI96282\telegrambt.py
For example, we can hunt for pythonw.exe accessing api[.]telegram[.]org:
event_type: "dnsreqwin"
AND
dns_rname: "api.telegram.org"
AND
proc_file_path: "pythonw.exe"
See you tomorrow!

Comments
Post a Comment