Python-based Triton RAT Targeting Roblox Credentials

Python-based Triton RAT Targeting Roblox Credentials

Researchers identified a Python Remote Access Tool named TritonRAT that targets Roblox credentials and exfiltrates data via a Telegram bot. The malware includes keylogging, credential theft from password stores, Roblox cookie theft, anti-analysis checks, and a secondary payload retrieved from DropBox to establish persistence. #TritonRAT #Roblox #Telegram #ProtonDrive #DropBox

Keypoints

  • TritonRAT is a Python-based RAT that uses Telegram for command and data exfiltration.
  • It steals Roblox cookies (.ROBLOSECURITY) from multiple browsers to access Roblox sessions.
  • The malware harvests credentials from password stores across several apps and decrypts them for theft.
  • Persistence is achieved via VBScript and BAT scripts that create scheduled tasks and download ProtonDrive from DropBox.
  • It includes anti-analysis checks and supports remote commands and screen/video/clipboard capture to enable broad data collection.

MITRE Techniques

  • [T1053.005] Scheduled Task/Job – Three scheduled tasks are created to start on logon of any user. (‘Three scheduled tasks are created to start on logon of any user.’)
  • [T1059.006] Command and Scripting Interpreter: Python – The Python script also contains code to create a VBScript and a BAT script which are executed with Powershell. (‘The Python script also contains code to create a VBScript and a BAT script which are executed with Powershell.’)
  • [T1082] System Information Discovery – Function that gathers and exfiltrates system information. (‘Function that gathers and exfiltrates system information’)
  • [T1016] System Network Configuration Discovery – Gather Wifi Information and System Network Configuration Discovery. (‘Gather Wifi Information’ and ‘System Network Configuration Discovery’)
  • [T1105] Ingress Tool Transfer – Retrieves ProtonDrive.exe from DropBox, stores it in a hidden folder and executes it with admin privileges. (‘retrieves a binary named ProtonDrive.exe from DropBox, stores it in a hidden folder and executes it with admin privileges.’)
  • [T1562.001] Impair Defenses: Disable or Modify Tools – The VBScript disables Windows Defender. (‘disables Windows Defender.’)
  • [T1132] Data Encoding – Telegram token and chat ID encoded in Base64. (‘Telegram token and chat ID encoded in Base64’)
  • [T1021] Remote Services – All exfiltrated data is sent to Telegram via a Telegram bot. (‘All the exfiltrated data is sent to Telegram via a Telegram bot.’)
  • [T1056.001] Input Capture: Keylogging – Keylogging feature is included. (‘Keylogging.’)
  • [T1555] Credentials from Password Stores – Iterates over password stores, decrypts them and saves the passwords in a text file. (‘decrypts them and saves the passwords in a text file.’)
  • [T1539] Steal Web Session Cookie – Searches for Roblox security cookies (.ROBLOSECURITY) in Opera, Chrome, Edge, Chromium, Firefox and Brave, and exfiltrates them. (‘Roblox security cookies (.ROBLOSECURITY) in Opera, Chrome, Edge, Chromium, Firefox and Brave, if found the cookies are stored in a text file and exfiltrated.’)
  • [T1546.015] Event Triggered Execution: Screensaver – Event Triggered Execution: Screensaver. (‘Event Triggered Execution: Screensaver’)
  • [T1113] Screen Capture – Screen capture functionality is present. (‘Screen Capture’)
  • [T1125] Video Capture – Webcam/video capture capability. (‘Video Capture’)
  • [T1115] Clipboard Data – Downloads and steals clipboard data. (‘Clipboard Data’)
  • [T1497] Virtualization/Sandbox Evasion – Checks for blacklisted processes to evade analysis. (‘checks for β€œblacklisted” processes which include popular tools such as xdbg, ollydbg, FakeNet, and antivirus products.’)
  • [T1020] Automated Exfiltration – Exfiltrated data is automatically sent to Telegram. (‘All the exfiltrated data is sent to Telegram via a Telegram bot’)

Indicators of Compromise

  • [File] ProtonDrive.exe – Payload binary referenced by the BAT script and used for persistence.
  • [Hash] Ea04f1c4016383e0846aba71ac0b0c9c
  • [Hash] 076dccb222d0869870444fea760c7f2b564481faea80604c02abf74f1963c265
  • [Hash] 0975fdadbbd60d90afdcb5cc59ad58a22bfdb2c2b00a5da6bb1e09ae702b95e7
  • [Hash] 1f4e1aa937e81e517bccc3bd8a981553a2ef134c11471195f88f3799720eaa9c
  • [Hash] 200fdb4f94f93ec042a16a409df383afeedbbc73282ef3c30a91d5f521481f24

Read more: https://darktrace.com/blog/python-based-triton-rat-targeting-roblox-credentials