Iranian Botnet Exposed via Open Directory: 15-Node Relay Network and Active C2
An Iranian threat actor's botnet infrastructure was exposed via an open directory, revealing a 15-node relay network spanning Finland and Iran, an SSH-based botnet framework, and an active command and control (C2) server. The exposed bash history detailed the entire operation, including tunnel deployment, DDoS tool development, and botnet creation. The actor used on-host compilation to evade detection and a Python script for mass SSH deployment. The botnet client, renamed 'hex' on infected hosts, supports automatic reconnection. This botnet is likely financially or personally motivated rather than state-directed and is dual-purposed for censorship circumvention and attack operations. Indicators include multiple IP addresses and domains linked to the infrastructure. The threat poses a medium severity risk due to its potential for DDoS attacks and censorship bypass but requires SSH access and some operational complexity to exploit.
AI Analysis
Technical Summary
This threat involves an Iranian-affiliated malicious actor whose operational infrastructure was inadvertently exposed through an open directory, revealing a sophisticated botnet framework. The botnet consists of a 15-node relay network distributed across Finland and Iran, leveraging SSH for propagation and control. The exposed bash history scripts provide insight into the full lifecycle of the operation, including the deployment of SSH tunnels, development of DDoS tooling (mhddos), and botnet client creation. The attacker employs on-host compilation techniques to avoid detection by traditional antivirus and endpoint security solutions. A Python script facilitates mass deployment of the botnet client via SSH, enabling rapid infection of vulnerable hosts. The botnet client, compiled and renamed as 'hex' on compromised systems, features automatic reconnection capabilities to maintain persistent control. The infrastructure serves dual purposes: enabling censorship circumvention and conducting distributed denial-of-service attacks. The operation appears motivated by financial or personal gain rather than direct state sponsorship. The threat intelligence includes multiple IP addresses and domain names associated with the botnet's command and control servers and relay nodes. While no known exploits are currently in the wild, the exposed operational details increase the risk of replication or targeted mitigation by defenders.
Potential Impact
Organizations worldwide face risks primarily from potential DDoS attacks launched by this botnet, which could disrupt online services and degrade network availability. The botnet's SSH-based propagation method implies that systems with weak or reused SSH credentials are particularly vulnerable, potentially leading to unauthorized access and compromise. The dual-use nature of the infrastructure for censorship bypass also indicates potential abuse in regions with restrictive internet policies, complicating network monitoring and filtering efforts. The exposure of the actor's operational details may lead to increased detection and takedown efforts but also risks enabling copycat operations. Enterprises relying on SSH for remote management, especially those with internet-facing SSH services, are at heightened risk. The botnet's automatic reconnection feature enhances its resilience, making mitigation more challenging. The financial or personal motivation behind the operation suggests ongoing activity and potential evolution of tactics, techniques, and procedures (TTPs).
Mitigation Recommendations
Organizations should enforce strong SSH security practices, including disabling password-based authentication in favor of key-based authentication, implementing multi-factor authentication (MFA) for SSH access, and regularly rotating SSH keys. Network administrators should restrict SSH access to trusted IP ranges and monitor for unusual SSH login attempts or mass connection patterns indicative of automated deployment scripts. Deploying host-based intrusion detection systems (HIDS) and endpoint detection and response (EDR) solutions capable of detecting on-host compilation and suspicious process behaviors can help identify botnet client activity. Regularly audit and harden servers to close unnecessary open ports and services, and apply strict firewall rules to limit outbound connections to known malicious IPs and domains identified in the indicators. Utilize threat intelligence feeds to block or monitor traffic to the listed IP addresses and domains associated with the botnet. Incident response teams should prepare for potential DDoS mitigation strategies, including traffic filtering and rate limiting. Finally, organizations should educate system administrators about the risks of reused or weak SSH credentials and the importance of secure deployment practices.
Affected Countries
Iran, Finland, United States, Germany, United Kingdom, Netherlands, France, Canada, Australia
Indicators of Compromise
- ip: 185.221.239.121
- hash: 1e3a7e978953bbe040cc5e0743b926fe3407ab949370b791d2de6655a704ef73
- hash: 5c41c075bfb1fcb85095b539e0c97a07c62379518ae1289677b118c550afb5d0
- hash: 73048cb6506443e482935586edb2af3f6a0c8ca44b061172b5be826a0f1e92f6
- hash: acfd59afbb50331925cc3980e7c40044807e0a8bf44e0c38f9f0af9988ea060e
- hash: ba318b710978c277a1ad6f2de81d7d2402607036d0c0e777ec75bc6b6e428974
- ip: 185.221.239.160
- ip: 185.221.239.162
- ip: 185.221.239.188
- ip: 185.221.239.198
- ip: 185.221.239.84
- ip: 185.236.38.79
- ip: 185.236.38.81
- ip: 194.147.222.151
- ip: 194.147.222.183
- ip: 5.42.223.60
- domain: hzf09853311.xyz
- domain: parsashonam-sub.blog
- domain: server21.org
- domain: bot.kilashin.info
- domain: down.celltoocall.com
- domain: finland1.server21.org
- domain: finland2.server21.org
- domain: finland4.server21.org
- domain: finland5.server21.org
- domain: finland6.server21.org
- domain: re.dangidog.site
- domain: robot5.server21.org
- domain: sir.ffakhar.ir
Iranian Botnet Exposed via Open Directory: 15-Node Relay Network and Active C2
Description
An Iranian threat actor's botnet infrastructure was exposed via an open directory, revealing a 15-node relay network spanning Finland and Iran, an SSH-based botnet framework, and an active command and control (C2) server. The exposed bash history detailed the entire operation, including tunnel deployment, DDoS tool development, and botnet creation. The actor used on-host compilation to evade detection and a Python script for mass SSH deployment. The botnet client, renamed 'hex' on infected hosts, supports automatic reconnection. This botnet is likely financially or personally motivated rather than state-directed and is dual-purposed for censorship circumvention and attack operations. Indicators include multiple IP addresses and domains linked to the infrastructure. The threat poses a medium severity risk due to its potential for DDoS attacks and censorship bypass but requires SSH access and some operational complexity to exploit.
AI-Powered Analysis
Technical Analysis
This threat involves an Iranian-affiliated malicious actor whose operational infrastructure was inadvertently exposed through an open directory, revealing a sophisticated botnet framework. The botnet consists of a 15-node relay network distributed across Finland and Iran, leveraging SSH for propagation and control. The exposed bash history scripts provide insight into the full lifecycle of the operation, including the deployment of SSH tunnels, development of DDoS tooling (mhddos), and botnet client creation. The attacker employs on-host compilation techniques to avoid detection by traditional antivirus and endpoint security solutions. A Python script facilitates mass deployment of the botnet client via SSH, enabling rapid infection of vulnerable hosts. The botnet client, compiled and renamed as 'hex' on compromised systems, features automatic reconnection capabilities to maintain persistent control. The infrastructure serves dual purposes: enabling censorship circumvention and conducting distributed denial-of-service attacks. The operation appears motivated by financial or personal gain rather than direct state sponsorship. The threat intelligence includes multiple IP addresses and domain names associated with the botnet's command and control servers and relay nodes. While no known exploits are currently in the wild, the exposed operational details increase the risk of replication or targeted mitigation by defenders.
Potential Impact
Organizations worldwide face risks primarily from potential DDoS attacks launched by this botnet, which could disrupt online services and degrade network availability. The botnet's SSH-based propagation method implies that systems with weak or reused SSH credentials are particularly vulnerable, potentially leading to unauthorized access and compromise. The dual-use nature of the infrastructure for censorship bypass also indicates potential abuse in regions with restrictive internet policies, complicating network monitoring and filtering efforts. The exposure of the actor's operational details may lead to increased detection and takedown efforts but also risks enabling copycat operations. Enterprises relying on SSH for remote management, especially those with internet-facing SSH services, are at heightened risk. The botnet's automatic reconnection feature enhances its resilience, making mitigation more challenging. The financial or personal motivation behind the operation suggests ongoing activity and potential evolution of tactics, techniques, and procedures (TTPs).
Mitigation Recommendations
Organizations should enforce strong SSH security practices, including disabling password-based authentication in favor of key-based authentication, implementing multi-factor authentication (MFA) for SSH access, and regularly rotating SSH keys. Network administrators should restrict SSH access to trusted IP ranges and monitor for unusual SSH login attempts or mass connection patterns indicative of automated deployment scripts. Deploying host-based intrusion detection systems (HIDS) and endpoint detection and response (EDR) solutions capable of detecting on-host compilation and suspicious process behaviors can help identify botnet client activity. Regularly audit and harden servers to close unnecessary open ports and services, and apply strict firewall rules to limit outbound connections to known malicious IPs and domains identified in the indicators. Utilize threat intelligence feeds to block or monitor traffic to the listed IP addresses and domains associated with the botnet. Incident response teams should prepare for potential DDoS mitigation strategies, including traffic filtering and rate limiting. Finally, organizations should educate system administrators about the risks of reused or weak SSH credentials and the importance of secure deployment practices.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://hunt.io/blog/iran-botnet-operation-open-directory"]
- Adversary
- null
- Pulse Id
- 69b96e4d10d70197a0dd1dcb
- Threat Score
- null
Indicators of Compromise
Ip
| Value | Description | Copy |
|---|---|---|
ip185.221.239.121 | — | |
ip185.221.239.160 | — | |
ip185.221.239.162 | — | |
ip185.221.239.188 | — | |
ip185.221.239.198 | — | |
ip185.221.239.84 | — | |
ip185.236.38.79 | — | |
ip185.236.38.81 | — | |
ip194.147.222.151 | — | |
ip194.147.222.183 | — | |
ip5.42.223.60 | — |
Hash
| Value | Description | Copy |
|---|---|---|
hash1e3a7e978953bbe040cc5e0743b926fe3407ab949370b791d2de6655a704ef73 | — | |
hash5c41c075bfb1fcb85095b539e0c97a07c62379518ae1289677b118c550afb5d0 | — | |
hash73048cb6506443e482935586edb2af3f6a0c8ca44b061172b5be826a0f1e92f6 | — | |
hashacfd59afbb50331925cc3980e7c40044807e0a8bf44e0c38f9f0af9988ea060e | — | |
hashba318b710978c277a1ad6f2de81d7d2402607036d0c0e777ec75bc6b6e428974 | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainhzf09853311.xyz | — | |
domainparsashonam-sub.blog | — | |
domainserver21.org | — | |
domainbot.kilashin.info | — | |
domaindown.celltoocall.com | — | |
domainfinland1.server21.org | — | |
domainfinland2.server21.org | — | |
domainfinland4.server21.org | — | |
domainfinland5.server21.org | — | |
domainfinland6.server21.org | — | |
domainre.dangidog.site | — | |
domainrobot5.server21.org | — | |
domainsir.ffakhar.ir | — |
Threat ID: 69b9ab21771bdb1749cfc092
Added to database: 3/17/2026, 7:27:29 PM
Last enriched: 3/17/2026, 7:42:40 PM
Last updated: 3/18/2026, 5:13:44 AM
Views: 36
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.