Skip to content

Latest commit

 

History

History
50 lines (39 loc) · 1.59 KB

Behavior - TelegramC2.md

File metadata and controls

50 lines (39 loc) · 1.59 KB

Threat Hunting for telegram as a Commmand & Control channel

Query Information

MITRE ATT&CK Technique(s)

Technique ID Title Link
T1071.001 Application Layer Protocol: Web Protocols https://attack.mitre.org/techniques/T1071/001

Description

Telegram can be used as a C2 channel, this can be done by leveraging the Telegram API. Multiple actors have used this in the wild, also for exfiltration methods (see references). With this detection rule we focus on the api if telegram (api.telegram.org).

Risk

An actor can use telgram as a Command & Control channel, while the attackers disguise the communication as Telegram traffic.

References

Defender For Endpoint

DeviceNetworkEvents
| where RemoteUrl contains "api.telegram.org"
| project 
    Timestamp,
    DeviceName,
    InitiatingProcessFileName,
    InitiatingProcessCommandLine,
    InitiatingProcessAccountName,
    InitiatingProcessAccountDomain

Sentinel

DeviceNetworkEvents
| where RemoteUrl contains "api.telegram.org"
| project 
    TimeGenerated,
    DeviceName,
    InitiatingProcessFileName,
    InitiatingProcessCommandLine,
    InitiatingProcessAccountName,
    InitiatingProcessAccountDomain