297. Hunting for Python Telegram RAT

Hello everyone!

It's not always PowerShell (T1059.001) or Windows Command Shell (T1059.003), more and more often adversaries use alternatives, for example, Python (T1059.006).

Netskope discovered a new Python RAT that leverages the Telegram Bot API as a command and control (C2) channel. The RAT is executed via pythonw.exe:

pythonw.exe C:\Users\User\AppData\Local\Temp\_MEI96282\telegrambt.py

For example, we can hunt for pythonw.exe accessing api[.]telegram[.]org:

event_type: "dnsreqwin"

AND

dns_rname: "api.telegram.org"

AND

proc_file_path: "pythonw.exe"

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge