IoT_Malware_Abuse

IoT Intrusion Payload Infrastructure Abuse Report


[Top Page view in: Github Code or Github Page]

IoT Intrusion Payload Infrastructure Abuse Report for December 2020 (up to Christmas day)

This report is compiled from the data recorded in December 2020 (up to Christmas day).

The global heatmap of the recorded data can be viewed below, following by the report’s detail.

1. The most abused ASN/Hosters/Countries (45)

No Hoster name ASN Ctry Amount of abuse
1 AS-COLOCROSSING AS36352 US 9
2 DIGITALOCEAN AS14061 US 8
3 SERVERION-AS AS213035 NL 6
4 GIGANET-HU AS42864 HU 3
5 OVH AS16276 FR 2
6 PONYNET/FRANTECH AS53667 US 2
7 HOSTWINDS AS54290 US 2
8 MICROSOFT AS8075 US 1
9 VMSNETWORKS AS398468 US 1
10 AS-CHOOPA AS20473 US 1
11 HVC-AS AS29802 US 1
12 PPTECHNOLOGY AS48090 UK 1
13 M247 AS9009 UK 1
14 SKB-ENTERPRISE AS64425 NL 1
15 BELCLOUD AS44901 BG 1
16 MYLOC-AS AS24961 DE 1
17 AS-HOSTINGER AS47583 CY 1
18 YURTEH-AS AS30860 UA 1
19 PIHL-AS AS213058 RU 1
20 BLADESERVERS AS206898 AU 1

2. The most abused broadband by P2P payloads (404)

P2P infection sources in GeoIP map:

No Country P2P-IP Total
1 Taiwan 70
2 USA 63
3 Korea 43
4 Brazil 25
5 Mexico 21
6 Israel 20
7 Spain 18
8 Vietnam 16
9 Italy 13
10 Turkey 8
11 Iran 8
12 Malaysia 8
13 India 7
14 China 6
15 Romania 6
16 Russia 5
17 Indonesia 5
18 Ukraine 4
19 UK 4
20 Australia 3

3. The record of loader names per infection source IP (54)

No Payload IP loader script name
1 104.168.96.11 bins.sh
2 104.248.238.30 yoyobins.sh
3 107.173.125.167 gtop.sh
4 107.173.91.136 bins.sh
5 108.174.62.168 gtop.sh
6 134.209.195.231 Snoopy.sh
7 139.59.105.123 bins.sh
8 142.93.255.221 yoyobins.sh
9 144.202.65.86 bins.sh
10 167.172.42.154 8UsA.sh
11 167.71.81.188 8UsA.sh
12 185.132.53.218 SnOoPy.sh
13 185.132.53.218 bins.sh
14 185.172.110.213 net.sh
15 185.239.242.93 bobbabins.sh
16 185.239.242.93 pXdN91.sh
17 185.244.39.248 angelbins.sh
18 192.119.86.133 EkSgbins.sh
19 192.227.147.157 pwnInfect.sh
20 193.239.147.144 8UsA.sh
21 193.239.147.144 Fourloko.sh
22 193.239.147.144 Sakura.sh
23 193.239.147.245 bin.sh
24 193.42.137.107 pXdN91.sh
25 198.23.157.36 bins.sh
26 198.98.55.83 test.sh
27 2.57.122.227 EkSgbins.sh
28 209.141.34.144 virum.sh
29 212.73.150.149 EkSgbins.sh
30 23.254.229.253 update.sh
31 23.94.4.168 bins.sh
32 23.94.4.170 8UsA.sh
33 23.94.4.170 pXdN91.sh
34 23.95.246.244 EkSgbins.sh
35 23.95.246.244 modzbins.sh
36 37.46.150.158 Yumeko.sh
37 45.15.25.65 lordhades.sh
38 45.153.203.116 8UsA.sh
39 45.153.203.152 aodbins.sh
40 45.95.168.113 GhOul.sh
41 45.95.168.113 bins.sh
42 45.95.169.200 Sakura.sh
43 45.95.169.218 virum.sh
44 46.21.147.68 8UsA.sh
45 5.196.162.1 GhOul.sh
46 5.196.162.1 bins.sh
47 51.81.91.243 bins.sh
48 52.255.172.167 ASUNA.sh
49 62.182.86.37 ISIS.sh
50 68.183.28.103 EkSgbins.sh
51 68.183.97.186 Snoopy.sh
52 89.249.65.230 EkSgbins.sh
53 91.234.99.47 Mercury.sh
54 91.234.99.47 Pemex.sh
No Loader uniq filename (27)
1 8UsA.sh
2 ASUNA.sh
3 EkSgbins.sh
4 Fourloko.sh
5 GhOul.sh
6 ISIS.sh
7 Mercury.sh
8 Pemex.sh
9 Sakura.sh
10 SnOoPy.sh
11 Snoopy.sh
12 Yumeko.sh
13 angelbins.sh
14 aodbins.sh
15 bin.sh
16 bins.sh
17 bobbabins.sh
18 gtop.sh
19 lordhades.sh
20 modzbins.sh
21 net.sh
22 pXdN91.sh
23 pwnInfect.sh
24 test.sh
25 update.sh
26 virum.sh
27 yoyobins.sh

4. The ISP networks where the attacks are coming from (abused ISP)

No Payload C2 IP FQDN ASN Network prefix ASN-ID Country ISP Name
1 104.168.96.11 104-168-96-11-host.colocrossing.com. 36352 104.168.96.0/24 AS-COLOCROSSING US AS-COLOCROSSING
2 104.248.238.30 runner.gitlab. 14061 104.248.224.0/20 DIGITALOCEAN-ASN US DIGITALOCEAN-ASN
3 107.173.125.167 107-173-125-167-host.colocrossing.com. 36352 107.173.125.0/24 AS-COLOCROSSING US AS-COLOCROSSING
4 107.173.91.136 107-173-91-136-host.colocrossing.com. 36352 107.173.88.0/22 AS-COLOCROSSING US AS-COLOCROSSING
5 108.174.62.168 108-174-62-168-host.colocrossing.com. 36352 108.174.62.0/23 AS-COLOCROSSING US AS-COLOCROSSING
6 134.209.195.231   14061 134.209.192.0/20 DIGITALOCEAN-ASN US DIGITALOCEAN-ASN
7 139.59.105.123   14061 139.59.96.0/20 DIGITALOCEAN-ASN US DIGITALOCEAN-ASN
8 142.93.255.221   14061 142.93.240.0/20 DIGITALOCEAN-ASN US DIGITALOCEAN-ASN
9 144.202.65.86 144.202.65.86. 20473 144.202.64.0/20 AS-CHOOPA US AS-CHOOPA
10 167.172.42.154   14061 167.172.32.0/20 DIGITALOCEAN-ASN US DIGITALOCEAN-ASN
11 167.71.81.188   14061 167.71.80.0/20 DIGITALOCEAN-ASN US DIGITALOCEAN-ASN
12 185.132.53.218   24961 185.132.53.0/24 MYLOC-AS DE IP Backbone of myLoc managed IT AG
13 185.172.110.213   206898 185.172.110.0/23 BLADESERVERS AU BLADESERVERS
14 185.239.242.93   213035 185.239.242.0/24 SERVERION-AS NL Serverion B.V.
15 185.244.39.248   64425 185.244.39.0/24 SKB-ENTERPRISE NL SKB-ENTERPRISE
16 192.119.86.133 client-192-119-86-133.hostwindsdns.com. 54290 192.119.64.0/18 HOSTWINDS US HOSTWINDS
17 192.227.147.157 192-227-147-157-host.colocrossing.com. 36352 192.227.147.0/24 AS-COLOCROSSING US AS-COLOCROSSING
18 193.239.147.144   213035 193.239.147.0/24 SERVERION-AS NL Serverion B.V.
19 193.239.147.245   213035 193.239.147.0/24 SERVERION-AS NL Serverion B.V.
20 193.42.137.107   398468 193.42.137.0/24 VMSNETWORKS US VMSNETWORKS
21 198.23.157.36 198-23-157-36-host.colocrossing.com. 36352 198.23.156.0/22 AS-COLOCROSSING US AS-COLOCROSSING
22 198.98.55.83   53667 198.98.48.0/20 PONYNET US PONYNET
23 2.57.122.227   48090 2.57.122.0/24 PPTECHNOLOGY GB PPTECHNOLOGY
24 209.141.34.144   53667 209.141.32.0/19 PONYNET US PONYNET
25 212.73.150.149   44901 212.73.150.0/24 BELCLOUD BG BELCLOUD
26 23.254.229.253 client-23-254-229-253.hostwindsdns.com. 54290 23.254.224.0/21 HOSTWINDS US HOSTWINDS
27 23.94.4.168 23-94-4-168-host.colocrossing.com. 36352 23.94.4.0/22 AS-COLOCROSSING US AS-COLOCROSSING
28 23.94.4.170 23-94-4-170-host.colocrossing.com. 36352 23.94.4.0/22 AS-COLOCROSSING US AS-COLOCROSSING
29 23.95.246.244 23-95-246-244-host.colocrossing.com. 36352 23.95.246.0/24 AS-COLOCROSSING US AS-COLOCROSSING
30 37.46.150.158   213035 37.46.150.0/24 SERVERION-AS NL Serverion B.V.
31 45.15.25.65   47583 45.15.24.0/22 AS-HOSTINGER CY AS-HOSTINGER
32 45.153.203.116   213035 45.153.203.0/24 SERVERION-AS NL Serverion B.V.
33 45.153.203.152   213035 45.153.203.0/24 SERVERION-AS NL Serverion B.V.
34 45.95.168.113 maxko-hosting.com. 42864 45.95.168.0/22 GIGANET-HU HU GigaNet Internet Service Provider Co
35 45.95.169.200 maxko-hosting.com. 42864 45.95.168.0/22 GIGANET-HU HU GigaNet Internet Service Provider Co
36 45.95.169.218 maxko-hosting.com. 42864 45.95.168.0/22 GIGANET-HU HU GigaNet Internet Service Provider Co
37 46.21.147.68 68.147.21.46.in-addr.arpa. 29802 46.21.147.0/24 HVC-AS US HVC-AS
38 5.196.162.1 ip1.ip-5-196-162.eu. 16276 5.196.0.0/16 OVH FR OVH
39 51.81.91.243 ip51-81-91-243.fantasy.ovh. 16276 51.81.0.0/17 OVH FR OVH
40 52.255.172.167   8075 52.224.0.0/11 MICROSOFT-CORP-MSN-A US MICROSOFT-CORP-MSN-A
41 62.182.86.37 host-37.dedicated.vsys.host. 30860 62.182.86.0/24 YURTEH-AS UA YURTEH-AS
42 68.183.28.103   14061 68.183.16.0/20 DIGITALOCEAN-ASN US DIGITALOCEAN-ASN
43 68.183.97.186   14061 68.183.96.0/20 DIGITALOCEAN-ASN US DIGITALOCEAN-ASN
44 89.249.65.230 no-rdns.m247.com. 9009 89.249.65.0/24 M247 GB M247
45 91.234.99.47   213058 91.234.99.0/24 PIHL-AS RU PIHL-AS

(please re-check the network details above due to a possible geodb or network database inaccuracy)


Fri Dec 25 19:23:00 JST 2020 @unixfreaxjp

MalwareMustDie,NPO (malwaremustdie.org)