Telegram Bot API Request
Detects suspicious DNS queries to api.telegram.org used by Telegram Bots of any kind
Sigma rule (View on GitHub)
1title: Telegram Bot API Request
2id: c64c5175-5189-431b-a55e-6d9882158251
3status: test
4description: Detects suspicious DNS queries to api.telegram.org used by Telegram Bots of any kind
5references:
6 - https://core.telegram.org/bots/faq
7 - https://researchcenter.paloaltonetworks.com/2018/03/unit42-telerat-another-android-trojan-leveraging-telegrams-bot-api-to-target-iranian-users/
8 - https://blog.malwarebytes.com/threat-analysis/2016/11/telecrypt-the-ransomware-abusing-telegram-api-defeated/
9 - https://www.welivesecurity.com/2016/12/13/rise-telebots-analyzing-disruptive-killdisk-attacks/
10author: Florian Roth (Nextron Systems)
11date: 2018-06-05
12modified: 2022-10-09
13tags:
14 - attack.command-and-control
15 - attack.t1102.002
16logsource:
17 category: dns
18detection:
19 selection:
20 query: 'api.telegram.org' # Telegram Bot API Request https://core.telegram.org/bots/faq
21 condition: selection
22falsepositives:
23 - Legitimate use of Telegram bots in the company
24level: medium
References
Related rules
- Telegram API Access
- ADSI-Cache File Creation By Uncommon Tool
- APT User Agent
- APT40 Dropbox Tool User Agent
- Activity from Anonymous IP Addresses