Netskope discovered a new Python-based remote access trojan that impersonates a Minecraft client named âNursultan Clientâ and uses the Telegram Bot API as its command-and-control channel to steal Discord tokens, capture screenshots and webcam images, and perform system reconnaissance. The sample includes a hardcoded Telegram bot token and allowed user ID, demonstrates cross-platform C2 capabilities despite flawed Windows persistence, and appears to be a Malware-as-a-Service offering signed âby fifetkaâ. #NursultanClient #TelegramBotAPI
Keypoints
- Netskope found a multi-function Python RAT packaged with PyInstaller that masquerades as âNursultan Clientâ to trick gamers.
- The malware uses the Telegram Bot API as its C2 channel with a hardcoded bot token and allowed Telegram user ID to receive commands and exfiltrate data.
- Main capabilities include stealing Discord authentication tokens, system profiling (/info), screenshots and webcam capture (/screenshot, /camera), and showing/opening arbitrary text, URLs, and images.
- The malwareâs core C2 and several surveillance features use cross-platform libraries and can operate on Windows, Linux, and Darwin, though persistence and some features are Windows-specific.
- Persistence attempts create a âNursultanClientâ registry Run key but are likely to fail due to incorrect paths when compiled with PyInstaller.
- The author signs reports as âby fifetkaâ and the malwareâs design suggests a MaaS model where the ALLOWED_USERS ID serves as a simple licensing mechanism.
- Despite broad functionality, coding mistakes, lack of advanced anti-analysis, and flawed persistence indicate the author is not highly sophisticated.
MITRE Techniques
- [T1543] Create or Modify System Process â Adds a registry Run key named âNursultanClientâ under HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRun to achieve persistence; âattempts to add itself to the Windows startup process by creating a registry key named âNursultanClient’â.
- [T1588] Acquire Infrastructure â Uses Telegram Bot API as a C2 channel with a hardcoded bot token and allowed user IDs to manage infected hosts; âcontains a hardcoded Telegram Bot Token (â8362039368:AAGj_jyw6oYftV2QQYiYoUslJOmXq6bsAYsâ) and a hardcoded list of allowed Telegram user IDs (â6804277757â)â.
- [T1056] Input Capture â Captures screenshots and webcam photos via commands (/screenshot, /camera) and exfiltrates the images over Telegram; âallow the attacker to capture a live screenshot of the victimâs desktop or take a photo using the computerâs webcamâ.
- [T1537] Transfer Data to Cloud Account â Exfiltrates stolen Discord tokens, system profiles, and captured media through the Telegram bot channel to the attacker; âAll data is exfiltrated to the attacker through this same Telegram channelâ.
- [T1530] Data from Cloud Storage Objects â Searches local browser and Discord client storage (LevelDB, SQLite, .ldb/.log) to locate Discord authentication tokens and exfiltrates them; âsearches for tokens in the local storage files (â.ldbâ and â.logâ) of Discord clients⌠and user data directories of major web browsersâ.
- [T1204] User Execution â Uses social engineering by masquerading as a legitimate Minecraft client and displaying a fake installation progress bar to trick users into running the executable; âprints a fake installation progress bar to the console, using the name âNursultan clientâ to impersonate legitimate softwareâ.
- [T1304] Social Engineering â Displays attacker-sent text or images as pop-ups or opens attacker-sent URLs in the victimâs browser for adware/phishing purposes; âIf the attacker sends a text message⌠the text is displayed on the victimâs screen in a pop-up message boxâ and images are opened in the default viewer.
Indicators of Compromise
- [File Hash] Sample executable â SHA256: 847ef096af4226f657cdd5c8b9c9e2c924d0dbab24bb9804d4b3afaf2ddf5a61
- [Telegram Bot Token] Embedded C2 credential â 8362039368:AAGj_jyw6oYftV2QQYiYoUslJOmXq6bsAYs
- [Telegram User ID] Allowed operator identifier â 6804277757
- [Registry Key] Persistence artifact (Windows) â HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRun -> âNursultanClientâ
- [File/Artifact Names] Targeted storage locations for token theft â Discord local storage files (â.ldbâ, â.logâ), browser user data LevelDB/SQLite (e.g., Chrome, Edge, Firefox, Opera, Brave)
Read more: https://www.netskope.com/blog/new-python-rat-targets-gamers-via-minecraft