Back to reports
highBotnet

ChanMirai Botnet C2 — Breakglass Intelligence Report

InvestigatedApril 3, 2026PublishedApril 3, 2026
Threat Actors:ProfileAssessment
botx86duckdnsc2ratmiraibotnettorshodan

TLP: WHITE Date: 2026-04-03 Analyst: GHOST (Breakglass Intelligence) Classification: Cybercrime — IoT Botnet (Mirai Variant) Status: ACTIVE INVESTIGATION — C2 infrastructure intermittently online

Executive Summary

A Mirai botnet variant dubbed "ChanMirai" was identified operating from 185.242.3[.]231 via the DuckDNS dynamic DNS domain chanmiraicd1[.]duckdns[.]org. The C2 server, hosted on Felcloud infrastructure within AS60223 (Netiface Limited, UK), exhibited 2,001 consecutive open TCP ports (30000-32000) — a signature pattern of Mirai CNC bot listener infrastructure where each port handles connections from a different bot architecture or campaign. The sample bot_x86.exe was distributed via HTTP from the C2 but is currently offline. The hosting chain traces through DEMENIN B.V. (Netherlands), a known IP reseller in the bulletproof hosting ecosystem, to Netiface Limited, which manages prefixes for multiple shell-company-named organizations including "Ghosty Networks LLC," "DolphinHost Limited," "Rainbow Facilities Inc.," and "Pipe Networks LLC/LTD."

Certificate Transparency logs reveal the operation has been active since at least November 2025, with two Let's Encrypt certificates issued for the C2 domain. Both certificates expired in February 2026 without renewal, suggesting infrastructure rotation. The C2 went dark during the investigation (all ports filtered/closed), consistent with Mirai operator behavior of rapid infrastructure rotation when attention is detected.

Key Findings

  • C2 IP: 185.242.3[.]231 resolving from chanmiraicd1[.]duckdns[.]org (www subdomain also resolves)
  • 2,001 open ports (TCP 30000-32000): Classic Mirai CNC bot listener pattern
  • Apache 2.4.52 on Ubuntu: Web server previously served malware binaries (port 80, now offline)
  • FTP service (port 21, now filtered): Likely used for binary staging
  • Felcloud hosting (185.242.3.0/24): Allocated Jan 27, 2026 — very fresh infrastructure
  • Hosting chain: Felcloud -> AS60223 (Netiface Limited, UK) -> DEMENIN B.V. (Netherlands, upstream)
  • Shodan tagged as "scanner": The C2 IP itself was actively scanning the internet
  • Adjacent IP 185.242.3.25: 892 abuse reports on AbuseIPDB from 129 sources — entire /24 is hostile
  • Multiple shell companies under Netiface: Ghosty Networks, DolphinHost, Rainbow Facilities, Pipe Networks — BPH reseller indicators
  • Sample not yet indexed: bot_x86.exe not found in MalwareBazaar, ThreatFox, or URLhaus — truly FUD at time of discovery
  • "ChanMirai" naming: "cd1" suffix likely indicates "command/C2 domain 1" — single-domain operator

Infrastructure Analysis

Network Infrastructure

IPASNProviderPorts (at peak)ServicesStatus
185.242.3[.]231AS60223Felcloud / Netiface21, 80, 30000-32000Apache 2.4.52, FTP, Mirai CNCOFFLINE (ports filtered as of 2026-04-03)
185.242.3[.]225AS60223Felcloud / Netiface22, 111, 3306SSH, MySQLLIVE
185.242.3[.]232AS60223Felcloud / Netiface22, 80, 8080nginx (404)LIVE
185.242.3[.]25AS60223Felcloud / Netiface22SSHLIVE (892 AbuseIPDB reports, scanner)

Domain Infrastructure

DomainTypeResolutionPurposeStatus
chanmiraicd1[.]duckdns[.]orgDuckDNS DDNS185.242.3[.]231C2 domainRESOLVING (server offline)
www[.]chanmiraicd1[.]duckdns[.]orgDuckDNS DDNS185.242.3[.]231Malware delivery (HTTP)RESOLVING (server offline)

Certificate Analysis (crt.sh)

Two Let's Encrypt certificates were issued for chanmiraicd1[.]duckdns[.]org, establishing an operational timeline:

CertificateNot BeforeNot AfterSerial NumberIssuer
Cert 12025-11-122026-02-1005abefa5e2cca2ccf492c16c046f2012055dLet's Encrypt R13
Cert 22025-11-192026-02-17061bd5baf7567542baea3007ca606977ced3Let's Encrypt R13

Key observations:

  • Operational since November 2025: First cert issued 2025-11-12, establishing earliest known activity date
  • Certificate renewal: Second cert issued 7 days after the first — suggests configuration testing or automated renewal
  • Both expired February 2026: No renewal observed — operator may have abandoned HTTPS or shifted infrastructure
  • Let's Encrypt via Certbot: Standard choice for automated cert management on Linux servers
  • Current status: No valid certificate — C2 was running HTTP-only or offline by March 2026

Hosting Hierarchy

DEMENIN B.V. (NL) — 56 IP prefixes, upstream reseller
  └── Netiface Limited (UK, AS60223) — LIR, transit via Arelion + TATA
        ├── Felcloud (US-registered, RIPE allocation) — 185.242.3.0/24
        │     └── 185.242.3.231 — ChanMirai C2 ★
        ├── Ghosty Networks LLC (US) — shell company
        ├── DolphinHost Limited (HK) — shell company
        ├── Rainbow Facilities Inc. (US) — shell company
        ├── Pipe Networks LTD/LLC (GB/US) — shell companies
        ├── Proxi-sh Networks Inc. (US) — shell company
        ├── Internet Backbone LTD (GB) — shell company
        ├── HomeLine Broadband LLC (US) — shell company
        └── Liam Kremer / Trivox (DE) — individual operator

RIPE Registration Details

Felcloud (direct host):

  • Org: ORG-FA1428-RIPE
  • Address: 1314 Ogden St Philadelphia, PA 19123 US
  • Abuse: abuse@felcloud[.]net
  • Maintainer: FELCLOUDNET-MNT (referenced by DEMENIN-MNT)
  • Prefix created: 2026-01-27 (2 months before investigation)

Netiface Limited (ASN holder):

  • Org: ORG-NL638-RIPE
  • Address: 1 Link Road, Bishops Stortford, CM23 2ES, UK
  • Abuse: abuse@netiface[.]co[.]uk
  • Maintainer: NFC-MNT
  • ASN created: 2024-01-19

DEMENIN B.V. (upstream reseller):

  • 56 RIPE prefixes under DEMENIN-MNT
  • Netherlands-based
  • Provides IP allocations to Felcloud and similar downstream entities

Port Analysis: Mirai CNC Signature

The 2,001 consecutive open ports (TCP 30000-32000) are a hallmark of Mirai botnet CNC infrastructure:

  1. Bot architecture listeners: Each port typically serves a different CPU architecture (x86, x86_64, ARM, MIPS, MIPSEL, PowerPC, SH4, SPARC, etc.)
  2. Campaign segmentation: Operators may assign port ranges to different campaigns or customers (DDoS-for-hire)
  3. Scale indicator: 2,001 listeners suggests either a large-scale operation or an operator using default/unmodified CNC source code that opens the full range

The "bot_x86.exe" filename explicitly targets x86 architecture. Despite the .exe extension, Mirai variants targeting Linux IoT devices often use this naming convention for x86 ELF binaries.

Malware Analysis

Sample Details

AttributeValue
Filenamebot_x86.exe
Distribution URLhxxp://www[.]chanmiraicd1[.]duckdns[.]org/bot_x86.exe
C2 Domainchanmiraicd1[.]duckdns[.]org
C2 IP185.242.3[.]231
SHA256UNKNOWN — sample not retrieved (C2 offline before download)
FamilyMirai variant (ChanMirai)
PlatformLinux x86 (despite .exe extension)
DetectionFUD — not indexed in MalwareBazaar, ThreatFox, or URLhaus at time of investigation

Expected Behavior (based on Mirai variant analysis)

Given the "chanmirai" naming and infrastructure pattern, this sample likely exhibits:

  • Telnet/SSH brute-forcing with hardcoded credential lists
  • DDoS capabilities: TCP/UDP/HTTP flood attacks
  • Process kill-list: Terminates competing malware, prevents re-infection by rivals
  • Watchdog disable: Prevents device reboot
  • Scanner module: Shodan tagged the IP as "scanner" — confirms active reconnaissance
  • Connection to C2 on high port: Likely connects back to one of the 30000-32000 port range

Threat Actor Profile

Attribution Assessment

  • Confidence: LOW
  • Evidence: Infrastructure naming pattern ("chanmirai"), hosting choices, DuckDNS usage
  • Motivation: Financial (DDoS-for-hire, cryptomining, or proxy-as-a-service)
  • Sophistication: LOW-MEDIUM — uses known Mirai source code with minor customization, relies on DuckDNS for C2 (unsophisticated), uses BPH but through several reseller layers (moderate tradecraft)

OPSEC Assessment

  • DuckDNS usage: Free, no identity verification — good OPSEC choice for disposable infrastructure
  • BPH chain: Multiple layers of resellers (DEMENIN -> Netiface -> Felcloud) — decent insulation
  • Naming convention: "chanmirai" directly references the malware family — poor OPSEC, links infrastructure to capability
  • Rapid shutdown: C2 went dark during investigation — operator may monitor for scanning or received abuse reports

MITRE ATT&CK Mapping

TacticTechniqueIDApplication
Initial AccessExploit Public-Facing ApplicationT1190Telnet/SSH brute force of IoT devices
ExecutionCommand and Scripting InterpreterT1059Shell commands on compromised devices
PersistenceBoot or Logon Autostart ExecutionT1547Watchdog disable, cron persistence
Defense EvasionObfuscated Files or InformationT1027FUD binary (zero vendor detections)
DiscoveryNetwork Service DiscoveryT1046Scanner tag — active internet scanning
Lateral MovementRemote ServicesT1021Telnet/SSH credential spraying
Command and ControlApplication Layer ProtocolT1071Custom binary protocol on TCP 30000-32000
Command and ControlDynamic ResolutionT1568DuckDNS dynamic DNS for C2
ImpactNetwork Denial of ServiceT1498DDoS attack capability

IOC Summary

Network Indicators

chanmiraicd1[.]duckdns[.]org
www[.]chanmiraicd1[.]duckdns[.]org
185.242.3[.]231
hxxp://www[.]chanmiraicd1[.]duckdns[.]org/bot_x86.exe

Infrastructure Indicators

185.242.3[.]0/24 (Felcloud — full range hostile)
AS60223 (Netiface Limited)
abuse@felcloud[.]net
FELCLOUDNET-MNT (RIPE maintainer)

Behavioral Indicators

  • 2,001 consecutive TCP ports open (30000-32000)
  • Apache 2.4.52 on Ubuntu serving malware binaries
  • Scanner activity from C2 IP
  • FTP service for binary staging

Immediate (24-48 hours)

  • Block 185.242.3[.]231 at perimeter firewalls
  • Block chanmiraicd1[.]duckdns[.]org at DNS resolver level
  • Consider blocking the entire 185.242.3[.]0/24 range (high abuse concentration)
  • Monitor for connections to TCP ports 30000-32000 on any external IP

Short-term (1-2 weeks)

  • Add DuckDNS domain monitoring for new "chanmirai" variations
  • Deploy Suricata rules (below) for Mirai CNC detection
  • Audit IoT devices for default credentials (Telnet/SSH)
  • Check firewall logs for historical connections to 185.242.3[.]0/24

Medium-term (1-3 months)

  • Evaluate blocking all DuckDNS subdomains at corporate DNS (high false-positive risk, but DuckDNS is overwhelmingly used for malware)
  • Deploy IoT network segmentation
  • Implement credential monitoring for IoT/embedded device fleet

Abuse Reports

To Felcloud

To: abuse@felcloud.net
Subject: Active Mirai Botnet C2 on 185.242.3.231

Your IP 185.242.3.231 is hosting an active Mirai botnet command-and-control server.
The server was observed with 2,001 open TCP ports (30000-32000) serving as bot listeners,
and distributing malware via HTTP (bot_x86.exe). The C2 domain is chanmiraicd1.duckdns.org.

Please take immediate action to suspend this customer.

Evidence:
- Shodan scan showing ports 21, 80 open with "scanner" tag
- Full port scan showing TCP 30000-32000 open (Mirai CNC signature)
- HTTP malware distribution URL: http://www.chanmiraicd1.duckdns.org/bot_x86.exe

To Netiface Limited

To: abuse@netiface.co.uk
Subject: Mirai Botnet Infrastructure in Felcloud allocation (185.242.3.0/24)

Your downstream customer Felcloud (185.242.3.0/24) is hosting Mirai botnet C2
infrastructure. IP 185.242.3.231 was running a CNC server with 2,001 bot listener ports.
Multiple IPs in this /24 are flagged on AbuseIPDB (185.242.3.25 has 892 reports).

Please investigate and take appropriate action on the Felcloud allocation.

To DuckDNS

To: abuse@duckdns.org
Subject: Malicious subdomain: chanmiraicd1.duckdns.org

The subdomain chanmiraicd1.duckdns.org is being used as C2 for a Mirai botnet variant.
It resolves to 185.242.3.231 which hosts bot listener infrastructure.
Please suspend this subdomain registration.

References

  • Source tip: @smica83 on X/Twitter — reported FUD bot_x86.exe sample from chanmiraicd1.duckdns.org
  • Mirai source code: https://github.com/jgamblin/Mirai-Source-Code (reference for CNC port patterns)
  • AbuseIPDB: 185.242.3.25 — 892 abuse reports confirming hostile /24
  • Shodan InternetDB: 185.242.3.231 — Apache 2.4.52, FTP, scanner tag
  • RIPE NCC: FELCLOUDNET-MNT, DEMENIN-MNT, NFC-MNT registration data

GHOST — Breakglass Intelligence "One indicator. Total infrastructure."

Share