Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

DinDoor Backdoor: Deno Runtime Abuse and 20 Active C2 Servers

0
Medium
Published: Thu Apr 23 2026 (04/23/2026, 14:16:02 UTC)
Source: AlienVault OTX General

Description

DinDoor is a Deno-based backdoor delivered via MSI files that exploits the Deno runtime to execute obfuscated JavaScript for command and control communications and system fingerprinting. Two analyzed samples show different execution behaviors: one writes JavaScript to disk while the other executes entirely in memory. Both samples use identical fingerprinting algorithms generating unique victim identifiers. One sample contains an embedded JWT exposing campaign metadata and the domain serialmenot[.]com, identified as multi-tenant infrastructure serving multiple threat actors including state-sponsored groups and cybercriminals. Analysis of HTTP response headers enabled identification of 20 active C2 servers across 15 autonomous systems, many using bulletproof hosting providers. The malicious infrastructure uses Caddy proxy with distinctive headers allowing network-based detection.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/24/2026, 09:36:03 UTC

Technical Analysis

DinDoor is a Deno runtime-based backdoor distributed via MSI installers that execute obfuscated JavaScript for C2 communication and system fingerprinting. Two analyzed samples differ in execution: one persists JavaScript on disk, the other executes solely in memory. Both generate unique victim identifiers using identical fingerprinting algorithms. Embedded JWT tokens in one sample expose campaign metadata and a domain (serialmenot[.]com) linked to multi-tenant infrastructure serving multiple threat actors, including state-sponsored and cybercriminal groups. Network analysis revealed 20 active C2 servers across 15 autonomous systems, many leveraging bulletproof hosting. The infrastructure uses the Caddy proxy with unique HTTP headers, which can be used for detection. The malware is associated with the MuddyWater threat actor. No patches or vendor advisories are available, and no known active exploitation has been reported.

Potential Impact

DinDoor enables attackers to maintain persistent command and control over compromised systems through obfuscated JavaScript executed in the Deno runtime environment. It performs system fingerprinting to uniquely identify victims, facilitating targeted operations. The use of multi-tenant infrastructure and bulletproof hosting complicates takedown efforts and attribution. The presence of multiple active C2 servers indicates ongoing campaign activity. While no known exploits in the wild have been reported, the malware's capabilities pose a medium risk of unauthorized access and data exfiltration.

Mitigation Recommendations

No official patch or remediation is currently available for DinDoor. Since this is malware delivered via MSI files exploiting the Deno runtime, organizations should focus on preventing initial infection vectors such as blocking malicious MSI files and monitoring for suspicious Deno runtime activity. Network defenders can leverage detection of distinctive Caddy proxy HTTP headers to identify potential C2 communications. Given the lack of vendor advisories or patches, continuous monitoring and threat intelligence updates are recommended to respond to emerging indicators.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://hunt.io/blog/dindoor-deno-runtime-backdoor-msi-analysis"]
Adversary
MuddyWater
Pulse Id
69ea29a2df2a3f26872b6e15
Threat Score
null

Indicators of Compromise

Domain

ValueDescriptionCopy
domainineracaspsl.site
domainserialmenot.com
domainjusttalken.com
domainhngfbgfbfb.cyou
domainagilemast3r.duckdns.org
domaingrafana.healthydefinitetrunk.com
domainaeeracaspsl.site
domainannaionovna.com
domainbitatits.surf
domaingeneralnewlong.com
domainilspaeysoff.site
domainlandmas.info
domainmyspaeysoff.site
domainbandage.healthydefinitetrunk.com
domainsurgery.healthydefinitetrunk.com

Hash

ValueDescriptionCopy
hash2a09bbb3d1ddb729ea7591f197b5955453aa3769c6fb98a5ef60c6e4b7df23a5
hash5c057af2f358fc10107d5ccdb39938ad
hashe2e8516b4f275e8c636620b7377ee3b9f9f47bb0
hash7b793c54a927da36649eb62b9481d5bcf1e9220035d95bbfb85f44a6cc9541ae
hash6d56ec35c1bb1e44a8d6ee201845aa05
hash197fb8bf3d6064a9f3272b8222cab6d5cf4f24de

Ip

ValueDescriptionCopy
ip138.124.240.76
ip138.124.240.77
ip178.16.52.191
ip185.218.19.117
ip192.109.200.151
ip193.233.82.43
ip193.24.123.25
ip194.48.141.192
ip199.217.99.189
ip199.91.220.142
ip199.91.220.216
ip2.26.117.169
ip2.27.122.16
ip209.99.189.170
ip45.135.180.200
ip45.151.106.88
ip85.192.27.152

Url

ValueDescriptionCopy
urlhttp://serialmenot.com/mv2/

Threat ID: 69eb361f87115cfb680ef893

Added to database: 4/24/2026, 9:21:35 AM

Last enriched: 4/24/2026, 9:36:03 AM

Last updated: 4/25/2026, 5:47:11 AM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses