SuperShell C2 Panel at 8[.]216[.]26[.]169:8888
TLP: WHITE Date: 2026-04-03 Analyst: GHOST (Breakglass Intelligence) Classification: Cybercrime / Open-Source C2 Framework Abuse Status: LIVE at time of investigation
Executive Summary
A live SuperShell v2.0.0 command-and-control panel was identified at 8[.]216[.]26[.]169:8888, hosted on Alibaba Cloud Singapore (AS45102). SuperShell is a Chinese-language, open-source C2 framework written in Go that leverages RSSH (reverse SSH) for agent management, supporting Windows, Linux, macOS, and Android targets. The panel was confirmed operational with a WebSocket-based RSSH listener on port 3232. Default credentials were not accepted, indicating a minimally configured operator. ThreatFox intelligence reveals this IP is part of a broader ecosystem of 66+ active SuperShell C2 instances globally, with heavy concentration on Chinese cloud infrastructure (Alibaba, Tencent, ChinaTelecom). The framework provides full post-exploitation capabilities including reverse shells, file management, memfd execution (fileless), and multi-platform payload generation.
Key Findings
- LIVE SuperShell v2.0.0 C2 panel confirmed at hxxp://8[.]216[.]26[.]169:8888/supershell/login
- RSSH WebSocket listener confirmed on port 3232 (400 Bad Request on /ws = WebSocket upgrade expected)
- Chinese-language UI throughout (login, all JS function files, error messages)
- Alibaba Cloud Singapore hosting (AS45102, ASEPL-SG, abuse@alibaba-inc.com)
- 66 unique SuperShell C2 IPs identified via ThreatFox, heavily weighted toward Chinese cloud providers
- Multi-platform targeting: Windows, Linux, macOS (darwin), Android support confirmed via client.js
- Operator capabilities: reverse shell, file upload/download, memfd fileless execution, session management, payload generation, group-based victim organization
- First seen on ThreatFox: 2026-03-26 (our target IP), ecosystem active since at least 2026-01-15
- No default credentials accepted (24 combinations tested against /supershell/login/auth)
- Only 2 ports exposed: SSH (22, OpenSSH 9.6p1 Ubuntu) and SuperShell (8888, nginx 1.18.0 reverse proxy)
- OpenSSH version reveals Ubuntu 24.04 LTS (Noble Numbat) -- 9.6p1-3ubuntu13.15
Infrastructure Analysis
Target Host Profile
| Attribute | Value |
|---|---|
| IP Address | 8[.]216[.]26[.]169 |
| ASN | AS45102 (Alibaba / CNNIC) |
| Provider | Alibaba Cloud (Singapore) Private Limited |
| Abuse Contact | abuse@alibaba-inc.com |
| OS | Ubuntu 24.04 LTS (Noble Numbat) |
| SSH | OpenSSH 9.6p1 Ubuntu-3ubuntu13.15 |
| Web Server | nginx 1.18.0 (reverse proxy to SuperShell Go backend) |
| C2 Panel | SuperShell v2.0.0 at :8888 |
| RSSH Listener | Port 3232 (WebSocket) |
| PTR Record | None |
| Hostnames | None |
Port Summary
| Port | Service | Purpose |
|---|---|---|
| 22/tcp | OpenSSH 9.6p1 | Operator SSH access |
| 3232/tcp | nginx (WebSocket) | RSSH reverse tunnel listener (agent callbacks) |
| 8888/tcp | nginx 1.18.0 -> SuperShell Go | C2 management panel |
Shodan InternetDB Vulnerabilities (Host)
- CVE-2021-3618 (ALPACA - TLS cross-protocol attack)
- CVE-2021-23017 (nginx DNS resolver vulnerability)
- CVE-2023-44487 (HTTP/2 Rapid Reset)
- CVE-2025-23419 (nginx TLS session ticket reuse)
Adjacent IP Analysis
No related SuperShell infrastructure found in the /24. Adjacent IPs (.166-.171) are either unresponsive or have only SSH exposed. The operator is using a single cloud VPS, not a dedicated block.
ThreatFox Intelligence
This IP has 2 ThreatFox entries:
- ID 1776941: 8[.]216[.]26[.]169:8888 -- botnet_cc -- First seen 2026-03-26 -- Reporter: DonPasci
- ID 1779694: hxxp://8[.]216[.]26[.]169:8888/supershell/login/ -- botnet_cc -- First seen 2026-03-31 -- Reporter: antiphishorg
SuperShell Framework Analysis
What Is SuperShell?
SuperShell (github.com/tdragon6/Supershell) is an open-source, Chinese-developed C2 framework written in Go with the following architecture:
- Frontend: Tabler CSS framework, jQuery, toastr notifications
- Backend: Go HTTP server behind nginx reverse proxy
- Agent Protocol: RSSH (reverse SSH over WebSocket) for persistent backdoor access
- Capabilities: Multi-platform payload generation (Windows PE, Linux ELF, macOS Mach-O, Android)
Discovered API Surface (from JS analysis)
Authentication:
- POST /supershell/login/auth -- Login endpoint (JSON: username, password)
Monitor Dashboard (authenticated):
- POST /supershell/monitor/status -- RSSH connection status
- POST /supershell/monitor/clients -- Client count (all + online)
- POST /supershell/monitor/compiled -- Generated payload count/size
- POST /supershell/monitor/server -- Server files count/size
- POST /supershell/monitor/log -- Log size
- POST /supershell/monitor/rssh -- RSSH version and connection count
- POST /supershell/monitor/version -- SuperShell version info
- POST /supershell/monitor/time -- Uptime
Client/Victim Management (authenticated):
- GET /supershell/client -- Client list page
- Client fields: OS (windows/linux/darwin/android), country attribution, online/offline status, session ID
- Session operations: info, shell, files, memfd, advanced
Session Operations (authenticated):
- GET /supershell/session/info?arg={sessid} -- Session details
- GET /supershell/session/shell?arg={sessid} -- Interactive shell
- GET /supershell/session/files?arg={sessid} -- File browser
- GET /supershell/session/memfd?arg={sessid} -- Fileless execution (memfd_create)
- GET /supershell/session/advanced?arg={sessid} -- Advanced operations
Settings (authenticated):
- POST /supershell/setting/update/download/chunk -- Download chunk size
- POST /supershell/setting/update/upload/size -- Max upload size
- POST /supershell/setting/recovery -- Reset to defaults
- POST /supershell/setting/clear/groupmark/useless -- Clean unused group markings
Capability Assessment
| Capability | Evidence |
|---|---|
| Multi-platform agents | OS detection for windows/linux/darwin/android in client.js |
| Reverse shell | /session/shell endpoint, RSSH WebSocket on :3232 |
| File management | /session/files endpoint, upload/download chunk configuration |
| Fileless execution | /session/memfd endpoint (Linux memfd_create syscall) |
| Payload generation | /supershell/monitor/compiled tracks generated payloads |
| Victim attribution | Country flag rendering via get_attribution_html() |
| Group management | Group marking system with cleanup function |
| Session persistence | Online/offline tracking, disconnect vs delete operations |
Global SuperShell C2 Ecosystem
Scale
ThreatFox tracks 66 unique SuperShell C2 instances across the following infrastructure:
Top Hosting Providers (by IP count)
| Provider | ASN | Count | Notes |
|---|---|---|---|
| Alibaba Cloud | AS45102, AS37963 | 10 | Singapore + mainland China allocations |
| CTG Server Limited | AS152194 | 5 | Hong Kong-based, 3 IPs in same /24 (143.92.60.x) |
| ChinaTelecom | AS136188 | 4 | Zhejiang/Ningbo IDC |
| ABC Cloud SDN BHD | AS139923 | 3 | Malaysia-based, 3 IPs in same /24 (102.204.223.x) |
| G-Core Labs (GHOST AS) | AS202422 | 3 | Luxembourg/Netherlands |
| Vultr/Constant Company | AS20473 | 2 | US-based VPS |
| Tencent Cloud | AS45090, AS132203 | 2 | China mainland |
| KAOPU-HK | AS138915 | 2 | Hong Kong |
| Amazon AWS | AS16509 | 2 | Japan (ap-northeast-1) |
| ColoCrossing | AS36352 | 2 | US-based budget hosting |
Geographic Distribution
The SuperShell ecosystem is overwhelmingly China-nexus:
- China-based providers: ~60% of all instances (Alibaba, Tencent, ChinaTelecom, ChinaNet)
- China-adjacent providers: ~20% (HK, SG, MY cloud providers popular with Chinese operators)
- Western providers: ~20% (AWS, Vultr, Contabo, G-Core, Hostinger)
Clustering Indicators
Three notable clusters suggest coordinated or shared infrastructure:
- 143.92.60.13/24/26 (CTG Server) -- 3 IPs in same /24, first seen Feb 21-22
- 102.204.223.152/155/168 (ABC Cloud) -- 3 IPs in same /24, first seen Feb 1-3
- 89.223.95.83/97/104 (G-Core GHOST) -- 3 IPs in same /24, first seen Jan 19-31
Threat Actor Profile
Attribution Assessment
- Confidence: MEDIUM
- Origin: China (Chinese-language C2 framework, Chinese cloud infrastructure preference)
- Motivation: Unknown -- SuperShell is a general-purpose C2 used by multiple operators
- Sophistication: LOW-MEDIUM (using open-source framework as-is, default port 8888, no domain, no TLS on C2 panel, no CDN/proxy obfuscation)
- OPSEC Failures:
- No domain name (direct IP access)
- No TLS encryption on C2 panel (HTTP only on :8888)
- Default SuperShell port (8888)
- Login page leaks version (v2.0.0)
- Static JS files expose full API surface and capability set
- Alibaba Cloud hosting with traceable abuse contact
MITRE ATT&CK Mapping
| Tactic | Technique | ID | Application |
|---|---|---|---|
| Command and Control | Application Layer Protocol: Web Protocols | T1071.001 | HTTP-based C2 panel |
| Command and Control | Proxy: Multi-hop Proxy | T1090.003 | RSSH reverse tunnel over WebSocket |
| Execution | Command and Scripting Interpreter | T1059 | Interactive reverse shell |
| Defense Evasion | Reflective Code Loading | T1620 | memfd_create fileless execution |
| Exfiltration | Exfiltration Over C2 Channel | T1041 | File download via RSSH tunnel |
| Resource Development | Acquire Infrastructure: Virtual Private Server | T1583.003 | Alibaba Cloud VPS |
| Resource Development | Develop Capabilities: Malware | T1587.001 | SuperShell payload generation |
IOC Summary
Network Indicators (Primary Target)
| Type | Value | Context |
|---|---|---|
| IP:Port | 8[.]216[.]26[.]169:8888 | SuperShell C2 panel |
| IP:Port | 8[.]216[.]26[.]169:3232 | RSSH WebSocket listener |
| URL | hxxp://8[.]216[.]26[.]169:8888/supershell/login | C2 login page |
| URL | hxxp://8[.]216[.]26[.]169:8888/supershell/login/auth | Authentication API |
Network Indicators (Related SuperShell Infrastructure -- Top 10 by recency)
| IP:Port | ASN | Provider | First Seen |
|---|---|---|---|
| 167[.]179[.]66[.]31:8888 | AS20473 | Vultr | 2026-03-29 |
| 45[.]205[.]2[.]53:8888 | AS40065 | CNSERVERS | 2026-03-29 |
| 8[.]217[.]174[.]149:8888 | AS45102 | Alibaba | 2026-03-27 |
| 168[.]93[.]224[.]183:8888 | AS4766 | Korea Telecom | 2026-03-26 |
| 222[.]190[.]151[.]53:8888 | AS4134 | ChinaNet | 2026-03-26 |
| 185[.]196[.]9[.]3:8888 | AS42624 | Swiss Network | 2026-03-24 |
| 107[.]148[.]2[.]52:3350 | AS398993 | PEG-TY | 2026-03-21 |
| 148[.]135[.]76[.]20:8888 | AS35916 | MULTA | 2026-03-21 |
| 43[.]112[.]66[.]41:8888 | AS45102 | Alibaba | 2026-03-19 |
| 38[.]54[.]40[.]38:8888 | AS138915 | KAOPU-HK | 2026-03-16 |
Behavioral Indicators
| Type | Value | Context |
|---|---|---|
| HTTP Title | Supershell - 登录 | Chinese login page title |
| URL Path | /supershell/login | Default SuperShell login path |
| URL Path | /supershell/login/auth | Authentication API endpoint |
| URL Path | /supershell/monitor | Dashboard (post-auth) |
| URL Path | /supershell/client | Victim list (post-auth) |
| URL Path | /supershell/session/{type}?arg={id} | Session management |
| Default Port | 8888 | Most common SuperShell port |
| JS Files | /static/js/func/*.js | Framework function files |
| Logo | /static/img/logo.svg | SuperShell branding |
| WebSocket | Port 3232 /ws | RSSH reverse tunnel |
YARA Rules
See yara_rules/supershell_c2.yar
Suricata Rules
See suricata_rules.rules
Recommended Actions
Immediate (24-48 hours)
- Block 8[.]216[.]26[.]169 at perimeter firewall (all ports)
- Search proxy/firewall logs for connections to :8888 and :3232 on this IP
- Hunt for the 66 SuperShell IPs listed in ThreatFox across network telemetry
- Alert on HTTP traffic containing "/supershell/" in URI path
Short-term (1-2 weeks)
- Deploy Suricata rules for SuperShell detection
- Monitor for RSSH WebSocket connections on non-standard ports
- Submit samples to sandboxes if SuperShell payloads are found on endpoints
Medium-term (1-3 months)
- Develop hunting queries for memfd_create abuse (fileless execution on Linux)
- Monitor ThreatFox SuperShell tag for new infrastructure
- Consider proactive scanning for SuperShell login pages on Alibaba/Tencent IP ranges
Abuse Reports
Alibaba Cloud
- To: abuse@alibaba-inc.com
- Subject: Active C2 Server on Alibaba Cloud -- 8.216.26.169
- Evidence: SuperShell C2 panel at :8888, RSSH listener at :3232, ThreatFox entries
References
- SuperShell GitHub: https://github.com/tdragon6/Supershell
- RSSH Project: https://github.com/NHAS/reverse_ssh
- ThreatFox SuperShell tag: https://threatfox.abuse.ch/browse/tag/Supershell/
- Censys reference: https://search.censys.io/hosts/8.216.26.169