Back to reports

BORZ C2 Panel — Dual-Process Loader with Iranian Missile Theme, Chechen Branding, and Russian Infrastructure

A Slack decoy loader drops Khorramshahr-4 loaded while connecting to a BORZ (wolf) C2 panel on a Moscow ASN. Three geopolitical spheres, zero coherent attribution.

PublishedApril 17, 2026

Case ID: borz-c2-94-232-46-16-20260417-priority-15f859c9 Date: 2026-04-17 Classification: TIER1 — Manual Lead (Score: 95/100) Source: jeffery (community threat intel, manual submission) Status: ACTIVE INVESTIGATION — C2 panel currently OFFLINE Analyst: Ghost OSINT (automated)


Executive Summary

A dual-process loader campaign was reported using a legitimate Slack application as a decoy while downloading and executing a second-stage payload from hxxp://94.232.46[.]16:8081/dl. The payload establishes persistence and connects to botnet C2 on ports 27015 and 27016. A dropped text file references "Khorramshahr-4 loaded" — the name of an active IRGC ballistic missile used in the 2025–2026 Iran conflict. The C2 infrastructure is hosted on a BORZ ("wolf" in Chechen) panel at hxxp://94.232.46[.]16:8081/login.

Key Findings:

  • C2 panel is currently offline (ECONNREFUSED on HTTP and HTTPS as of 2026-04-17)
  • Infrastructure hosted on AS48080 (Dmitriy Panchenko), a Moscow-registered ASN currently listed as inactive/depeered on IPinfo — 0 announced prefixes, suggesting covert transit or BGP manipulation
  • The 94.232.46.0/24 range has extensive abuse history on AbuseIPDB (neighboring .202 has 84,932 reports; .20 has 7,399 reports)
  • BORZ is a previously unreported C2 panel family — no existing public threat intelligence matches
  • Ports 27015/27016 are Valve Source Engine game server ports — historically abused by Gafgyt/Mirai botnets for DDoS amplification
  • No overlap with existing Breakglass investigations or IOC database
  • No confirmed link to known Iranian APT groups (MuddyWater, APT35, APT42, Handala Hack, etc.)
  • Attribution assessment: likely false flag or hacktivist — Iranian missile naming with Russian infrastructure and Chechen panel branding crosses three unrelated geopolitical spheres

1. Infrastructure Analysis

1.1 IP Address & Network

FieldValue
IP Address94.232.46[.]16
ASNAS48080
ASN RegistrantDmitriy Panchenko
ASN RegistryRIPE
ASN Allocated2020-12-17
ASN StatusInactive (0 announced IPv4/IPv6 prefixes as of 2026-04-17)
Registrant AddressShirokaya street 1, bld. 4, apt. 15, 127282, Moscow, Russian Federation
Shodan InternetDBNo data (404)
VirusTotalNo specific detections indexed for this IP
AbuseIPDBNo direct reports for .16; range heavily abused (see §1.2)

1.2 Neighborhood Analysis (94.232.46.0/24)

Multiple IPs in the same /24 have significant abuse histories:

IPAbuseIPDB ReportsRegistrant
94.232.46[.]20284,932Dmitriy Panchenko
94.232.46[.]207,399Dmitriy Panchenko
94.232.46[.]252,251Dmitriy Panchenko
94.232.46[.]171ListedDmitriy Panchenko
94.232.46[.]1536Dmitriy Panchenko
94.232.46[.]1010Dmitriy Panchenko
94.232.46[.]3013Dmitriy Panchenko
94.232.46[.]203ListedRocketCloud.ru

Assessment: This /24 block is controlled by a Moscow-based operator with extensive abuse history. The presence of RocketCloud.ru on one IP suggests reseller/bulletproof hosting characteristics. The ASN being "inactive" with 0 announced prefixes while the IPs were recently active indicates possible BGP hijacking, transit abuse, or deliberate stealth operation — the operator routes traffic through upstream providers without announcing their own prefix space to avoid BGP-based blocklists.

1.3 Port Services

PortProtocolService Assessment
8081TCPBORZ C2 panel (HTTP) — /login (admin panel), /dl (payload distribution)
27015TCP/UDPValve Source Engine port — likely botnet C2 channel or DDoS amplification relay
27016TCP/UDPSource TV / secondary game server — likely botnet C2 channel

Port 27015/27016 Analysis: These are the default ports for Valve Source Engine dedicated game servers (Counter-Strike, TF2, Left 4 Dead, Garry's Mod). They have been historically abused by:

  • Gafgyt botnet variants — for DDoS amplification via A2S query reflection
  • Mirai variants — targeting game servers with VSE (Valve Source Engine) attack module
  • Botnet C2 channels — using game server protocols as covert communication channels to blend with legitimate gaming traffic

The use of these ports suggests the botnet component either:

  1. Repurposes game server infrastructure for C2 communication (protocol blending)
  2. Operates a DDoS-for-hire service using game server amplification
  3. Uses game server protocol as a covert channel to evade network-layer detection

2. Malware Analysis

2.1 Infection Chain

┌──────────────────────────┐
│  STAGE 0: Initial Access │
│  Dual-process loader     │
│  (delivery unknown)      │
└──────────┬───────────────┘
           │
           ▼
┌──────────────────────────────────┐
│  STAGE 1: Decoy + Loader        │
│  Process A: Launch Slack.exe     │
│  Process B: Download from        │
│    hxxp://94.232.46[.]16:8081/dl │
└──────────┬───────────────────────┘
           │
           ▼
┌──────────────────────────────────┐
│  STAGE 2: Payload Execution      │
│  - Establish persistence         │
│  - Drop "Khorramshahr-4 loaded"  │
│  - Connect to botnet C2:         │
│    94.232.46[.]16:27015          │
│    94.232.46[.]16:27016          │
└──────────────────────────────────┘

2.2 Behavioral Indicators

BehaviorDetail
Decoy ApplicationLegitimate Slack desktop application launched as distraction
Payload DownloadHTTP GET to hxxp://94.232.46[.]16:8081/dl
PersistenceMechanism unknown (requires sample analysis)
Artifact DropTXT file containing "Khorramshahr-4 loaded"
C2 CommunicationConnects to 94.232.46[.]16 on ports 27015 and 27016
C2 ProtocolLikely Source Engine query protocol or custom binary protocol

2.3 Payload Status

The payload endpoint (/dl) is currently OFFLINE. The C2 panel at port 8081 refused all connections on 2026-04-17. This could indicate:

  • Operator took infrastructure offline after detection
  • IP was null-routed by upstream provider
  • Temporary maintenance / infrastructure rotation
  • The ASN depeering may have severed routing

Action Required: Monitor for infrastructure resurrection. The operator may re-deploy on a different IP within the same /24 or on new infrastructure.


3. C2 Panel: BORZ

3.1 Panel Characteristics

FieldValue
Panel NameBORZ
Meaning"Wolf" in Chechen language (Борз)
Login URLhxxp://94.232.46[.]16:8081/login
Payload URLhxxp://94.232.46[.]16:8081/dl
Known FamilyNo — BORZ does not match any known C2 panel family in public reporting
Public ReportingNone found — no threat intel vendors, OSINT databases, or security research references this panel

3.2 Assessment

BORZ appears to be a custom or emerging C2 framework not yet documented by the security community. The name's Chechen origin combined with Russian hosting infrastructure and Iranian military theming creates a deliberate multi-cultural attribution puzzle. This could indicate:

  1. Cybercriminal tooling — a commercial C2-as-a-Service product with cosmetic theming
  2. Hacktivist creation — ideologically motivated actor using provocative naming
  3. False flag operation — deliberate attribution confusion mixing Iranian, Chechen, and Russian indicators
  4. New threat actor — previously unknown group with multicultural membership or interests

4. Attribution Analysis

4.1 "Khorramshahr-4" Reference

The Khorramshahr-4 is a real, actively deployed IRGC medium-range ballistic missile:

FieldDetail
TypeMedium-Range Ballistic Missile (MRBM)
DeveloperAerospace Industries Organization (AIO), Iran
OperatorIslamic Revolutionary Guard Corps (IRGC)
Range2,000 km
Warhead1,500 kg (MIRV/cluster capable)
PropulsionHypergolic fuel, 12-minute launch prep
Unveiled25 May 2023
DeployedFebruary 2026 (IRGC "missile cities")
Combat UseStrikes on Tel Aviv, Ben Gurion Airport (2026); US bases in Qatar/Bahrain (March 2026)

Significance: The "Khorramshahr-4 loaded" artifact string directly references an active weapons system used in ongoing military operations. This is either:

  • Genuine IRGC cyber-kinetic signaling — using a missile name as a calling card (low confidence — Iranian APTs typically use Farsi strings, not English transliterations; no known Iranian APT uses Russian infrastructure or Chechen branding)
  • False flag / intimidation — non-Iranian actor leveraging current events for psychological impact (medium-high confidence)
  • Hacktivist bravado — pro-Iranian hacktivist group signaling support for IRGC operations (medium confidence)

4.2 Attribution Matrix

IndicatorPoints TowardPoints Away From
"BORZ" (Chechen for wolf)Chechen/Caucasus actorIranian state actor
Khorramshahr-4 referenceIranian alignment/sympathyRussian/Chechen origin
AS48080 Moscow hostingRussian infrastructureIranian state infrastructure (typically Hosterdaddy/AS136557, NameCheap)
Slack decoy techniqueSophistication (APT-level TTP)Commodity malware
Dual-process loaderCommon in Iranian APT chains (decoy PDF + loader)Pattern also used by Chinese, Russian, North Korean APTs
Game server ports (27015/27016)Botnet/DDoS operationNation-state espionage
No Telegram C2Unusual for Iranian APTs (MuddyWater, MOIS groups favor Telegram)
Custom C2 panelNew actor or private toolingEstablished APT (would reuse known tools)

4.3 Attribution Assessment

HypothesisConfidence
False flag / multi-national hacktivist groupHIGH (60%)
Cybercriminal botnet operator with provocative themingMEDIUM (25%)
IRGC-affiliated proxy using cutout infrastructureLOW (10%)
Chechen/Caucasus nationalist cyber groupLOW (5%)

Rationale: The mixing of Iranian missile naming (Khorramshahr-4), Chechen linguistic branding (BORZ = wolf), and Russian hosting infrastructure (AS48080, Moscow) is inconsistent with known Iranian APT operational patterns. Known Iranian groups (MuddyWater, APT35, APT42, Handala Hack, FAD Team) use:

  • Hosterdaddy (AS136557), NameCheap, M247, EDIS GmbH for hosting — not Dmitriy Panchenko/AS48080
  • Telegram API, Wasabi S3, MEGA for C2/exfil — not game server ports
  • Decoy PDFs, KeePass, Telegram authenticator executables — Slack as a decoy is atypical
  • Farsi-language artifacts — English-language "Khorramshahr-4 loaded" is atypical

5. MITRE ATT&CK Mapping

TacticTechniqueIDEvidence
Initial AccessPhishing / Malicious FileT1566Dual-process loader distribution (method TBD)
ExecutionUser Execution: Malicious FileT1204.002User executes loader, triggers Slack + payload
Defense EvasionMasquerading: Match Legitimate NameT1036.005Slack used as decoy to appear legitimate
Defense EvasionIndicator Removal: File DeletionT1070.004Likely cleanup of loader after execution
PersistenceBoot or Logon Autostart ExecutionT1547Persistence mechanism (requires sample)
Command and ControlApplication Layer ProtocolT1071C2 via port 8081 HTTP
Command and ControlNon-Standard PortT1571C2 on ports 27015, 27016 (game server ports)
Command and ControlProtocol TunnelingT1572Possible game protocol tunneling on 27015/27016
Command and ControlIngress Tool TransferT1105Payload download from /dl endpoint
DiscoverySystem Information DiscoveryT1082Likely (standard botnet behavior)
ImpactResource HijackingT1496Possible DDoS botnet participation

6. IOC Table

Network Indicators

TypeValueContextConfidenceStatus
IPv494.232.46[.]16Primary C2 serverHIGHOFFLINE (2026-04-17)
URLhxxp://94.232.46[.]16:8081/loginBORZ C2 panel loginHIGHOFFLINE
URLhxxp://94.232.46[.]16:8081/dlPayload download endpointHIGHOFFLINE
IP:Port94.232.46[.]16:27015Botnet C2 channelHIGHUNKNOWN
IP:Port94.232.46[.]16:27016Botnet C2 channelHIGHUNKNOWN
IP:Port94.232.46[.]16:8081BORZ panel HTTPHIGHOFFLINE
ASNAS48080Dmitriy Panchenko, Moscow, RUMEDIUMINACTIVE

Host Indicators

TypeValueContextConfidence
File Content"Khorramshahr-4 loaded"Dropped TXT artifactHIGH
ProcessSlack.exe (legitimate)Decoy applicationMEDIUM
BehaviorDual-process executionLoader spawns Slack + payloadHIGH

Infrastructure Pivot Indicators

TypeValueContextConfidence
IP Range94.232.46[.]0/24Same hosting block, high abuseMEDIUM
IPv494.232.46[.]202Same range, 84,932 abuse reportsLOW
IPv494.232.46[.]20Same range, 7,399 abuse reportsLOW
RegistrantDmitriy PanchenkoASN operatorMEDIUM
HostingRocketCloud.ruRelated hosting brand on .203LOW

7. Recommendations

Immediate Actions

  1. Block all traffic to/from 94.232.46[.]16 on all ports (firewall/IDS)
  2. Block the entire 94.232.46[.]0/24 range if operationally feasible (high abuse neighborhood)
  3. Hunt for network connections to 94.232.46[.]16 on ports 8081, 27015, 27016 in SIEM/NDR
  4. Hunt for the string "Khorramshahr-4 loaded" on endpoints (EDR file content scan)
  5. Hunt for anomalous Slack.exe process trees (Slack spawning from non-standard parent processes)
  6. Monitor for infrastructure resurrection — the operator may re-deploy on adjacent IPs

Sample Acquisition (Priority)

  1. Acquire payload sample — check MalwareBazaar, VirusTotal, Any.Run for submissions from 94.232.46[.]16:8081/dl
  2. Request sample from submitter (jeffery) if available
  3. Deploy honeypot monitoring the /dl endpoint for when the panel comes back online

Intelligence Sharing

  1. Submit IOCs to MISP, OTX, ThreatFox
  2. File abuse report with RIPE NCC for AS48080
  3. Notify Slack security team about brand abuse in decoy loader
  4. Share with CISA/IC3 given the Iranian military naming connection

8. Intelligence Gaps

GapPriorityAction
No malware sample availableCRITICALAcquire from submitter or monitor /dl endpoint
C2 panel offline — cannot assess panel capabilitiesHIGHMonitor for resurrection; check web archives
Persistence mechanism unknownHIGHRequires sample analysis
C2 protocol on 27015/27016 unknownHIGHRequires PCAP or sample analysis
No reverse DNS for 94.232.46[.]16MEDIUMCheck historical passive DNS databases
SSL/TLS certificate history unknownMEDIUMCheck crt.sh, Censys for historical certs
Payload hash unknownCRITICALCannot check VT/MalwareBazaar without hash
Full port scan not conductedMEDIUMRequires active scanning authorization
Actor identity/group unknownMEDIUMContinue OSINT monitoring for BORZ panel sightings

Appendix A: YARA Rules

See: yara_rules.yar

Appendix B: STIX 2.1 Bundle

See: stix_bundle.json

No overlap found with existing Breakglass investigations in the current IOC database. The IP 94.232.46[.]16 does not appear in any prior investigation.

Appendix D: Sources

Share