Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Iranian Botnet Exposed via Open Directory: 15-Node Relay Network and Active C2

0
Medium
Published: Tue Mar 17 2026 (03/17/2026, 15:07:57 UTC)
Source: AlienVault OTX General

Description

An Iranian threat actor's botnet infrastructure was exposed via an open directory, revealing a 15-node relay network spanning Finland and Iran, an SSH-based botnet framework, and an active command and control (C2) server. The exposed bash history detailed the entire operation, including tunnel deployment, DDoS tool development, and botnet creation. The actor used on-host compilation to evade detection and a Python script for mass SSH deployment. The botnet client, renamed 'hex' on infected hosts, supports automatic reconnection. This botnet is likely financially or personally motivated rather than state-directed and is dual-purposed for censorship circumvention and attack operations. Indicators include multiple IP addresses and domains linked to the infrastructure. The threat poses a medium severity risk due to its potential for DDoS attacks and censorship bypass but requires SSH access and some operational complexity to exploit.

AI-Powered Analysis

AILast updated: 03/17/2026, 19:42:40 UTC

Technical Analysis

This threat involves an Iranian-affiliated malicious actor whose operational infrastructure was inadvertently exposed through an open directory, revealing a sophisticated botnet framework. The botnet consists of a 15-node relay network distributed across Finland and Iran, leveraging SSH for propagation and control. The exposed bash history scripts provide insight into the full lifecycle of the operation, including the deployment of SSH tunnels, development of DDoS tooling (mhddos), and botnet client creation. The attacker employs on-host compilation techniques to avoid detection by traditional antivirus and endpoint security solutions. A Python script facilitates mass deployment of the botnet client via SSH, enabling rapid infection of vulnerable hosts. The botnet client, compiled and renamed as 'hex' on compromised systems, features automatic reconnection capabilities to maintain persistent control. The infrastructure serves dual purposes: enabling censorship circumvention and conducting distributed denial-of-service attacks. The operation appears motivated by financial or personal gain rather than direct state sponsorship. The threat intelligence includes multiple IP addresses and domain names associated with the botnet's command and control servers and relay nodes. While no known exploits are currently in the wild, the exposed operational details increase the risk of replication or targeted mitigation by defenders.

Potential Impact

Organizations worldwide face risks primarily from potential DDoS attacks launched by this botnet, which could disrupt online services and degrade network availability. The botnet's SSH-based propagation method implies that systems with weak or reused SSH credentials are particularly vulnerable, potentially leading to unauthorized access and compromise. The dual-use nature of the infrastructure for censorship bypass also indicates potential abuse in regions with restrictive internet policies, complicating network monitoring and filtering efforts. The exposure of the actor's operational details may lead to increased detection and takedown efforts but also risks enabling copycat operations. Enterprises relying on SSH for remote management, especially those with internet-facing SSH services, are at heightened risk. The botnet's automatic reconnection feature enhances its resilience, making mitigation more challenging. The financial or personal motivation behind the operation suggests ongoing activity and potential evolution of tactics, techniques, and procedures (TTPs).

Mitigation Recommendations

Organizations should enforce strong SSH security practices, including disabling password-based authentication in favor of key-based authentication, implementing multi-factor authentication (MFA) for SSH access, and regularly rotating SSH keys. Network administrators should restrict SSH access to trusted IP ranges and monitor for unusual SSH login attempts or mass connection patterns indicative of automated deployment scripts. Deploying host-based intrusion detection systems (HIDS) and endpoint detection and response (EDR) solutions capable of detecting on-host compilation and suspicious process behaviors can help identify botnet client activity. Regularly audit and harden servers to close unnecessary open ports and services, and apply strict firewall rules to limit outbound connections to known malicious IPs and domains identified in the indicators. Utilize threat intelligence feeds to block or monitor traffic to the listed IP addresses and domains associated with the botnet. Incident response teams should prepare for potential DDoS mitigation strategies, including traffic filtering and rate limiting. Finally, organizations should educate system administrators about the risks of reused or weak SSH credentials and the importance of secure deployment practices.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://hunt.io/blog/iran-botnet-operation-open-directory"]
Adversary
null
Pulse Id
69b96e4d10d70197a0dd1dcb
Threat Score
null

Indicators of Compromise

Ip

ValueDescriptionCopy
ip185.221.239.121
ip185.221.239.160
ip185.221.239.162
ip185.221.239.188
ip185.221.239.198
ip185.221.239.84
ip185.236.38.79
ip185.236.38.81
ip194.147.222.151
ip194.147.222.183
ip5.42.223.60

Hash

ValueDescriptionCopy
hash1e3a7e978953bbe040cc5e0743b926fe3407ab949370b791d2de6655a704ef73
hash5c41c075bfb1fcb85095b539e0c97a07c62379518ae1289677b118c550afb5d0
hash73048cb6506443e482935586edb2af3f6a0c8ca44b061172b5be826a0f1e92f6
hashacfd59afbb50331925cc3980e7c40044807e0a8bf44e0c38f9f0af9988ea060e
hashba318b710978c277a1ad6f2de81d7d2402607036d0c0e777ec75bc6b6e428974

Domain

ValueDescriptionCopy
domainhzf09853311.xyz
domainparsashonam-sub.blog
domainserver21.org
domainbot.kilashin.info
domaindown.celltoocall.com
domainfinland1.server21.org
domainfinland2.server21.org
domainfinland4.server21.org
domainfinland5.server21.org
domainfinland6.server21.org
domainre.dangidog.site
domainrobot5.server21.org
domainsir.ffakhar.ir

Threat ID: 69b9ab21771bdb1749cfc092

Added to database: 3/17/2026, 7:27:29 PM

Last enriched: 3/17/2026, 7:42:40 PM

Last updated: 3/18/2026, 5:13:44 AM

Views: 36

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses