EXPLORE
← Back to Explore
sigmamediumHunting

Telegram API Access

Detects suspicious requests to Telegram API without the usual Telegram User-Agent

MITRE ATT&CK

defense-evasioncommand-and-control

Detection Query

selection:
  cs-host: api.telegram.org
filter:
  c-useragent|contains:
    - Telegram
    - Bot
condition: selection and not filter

Author

Florian Roth (Nextron Systems)

Created

2018-06-05

Data Sources

proxy

Tags

attack.defense-evasionattack.command-and-controlattack.t1071.001attack.t1102.002
Raw Content
title: Telegram API Access
id: b494b165-6634-483d-8c47-2026a6c52372
status: test
description: Detects suspicious requests to Telegram API without the usual Telegram User-Agent
references:
    - https://researchcenter.paloaltonetworks.com/2018/03/unit42-telerat-another-android-trojan-leveraging-telegrams-bot-api-to-target-iranian-users/
    - https://blog.malwarebytes.com/threat-analysis/2016/11/telecrypt-the-ransomware-abusing-telegram-api-defeated/
    - https://www.welivesecurity.com/2016/12/13/rise-telebots-analyzing-disruptive-killdisk-attacks/
author: Florian Roth (Nextron Systems)
date: 2018-06-05
modified: 2023-05-18
tags:
    - attack.defense-evasion
    - attack.command-and-control
    - attack.t1071.001
    - attack.t1102.002
logsource:
    category: proxy
detection:
    selection:
        cs-host: 'api.telegram.org' # Often used by Bots
    filter:
        c-useragent|contains:
            # Used https://core.telegram.org/bots/samples for this list
            - 'Telegram'
            - 'Bot'
    condition: selection and not filter
falsepositives:
    - Legitimate use of Telegram bots in the company
level: medium