Overview
This page analyzes server logs and operational history recovered from MuddyWater infrastructure, including the AMEEN ALKHALIJ WordPress server logs, operator shell history, and failed operation logs.AMEEN ALKHALIJ Server Logs
Server Information
Log File:ameen-alkhalij.nu.logDomain: ameen-alkhalij.nu
Server Type: WordPress hosting (likely compromised infrastructure)
Log Period: January 8-9, 2025
Total Entries: 250+ entries (truncated at line 250)
Attack Pattern Analysis
WordPress Exploitation Attempts
The server logs show extensive automated scanning and exploitation attempts against WordPress installations: Setup Config Scanning (Primary Pattern):- Jan 8, 18:06 - 23:48: 38 attempts from various Cloudflare IPs
- Jan 9, 00:09 - 11:56: Continued attempts every 15-20 minutes
- User-Agent:
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36
404: WordPress not installed at that path409: Setup already configured (WordPress exists)
XML-RPC Exploitation
Between 04:39-04:43 on January 9, a concentrated XML-RPC attack occurred: Attack Details:HEAD /xmlrpc.php- Check if XML-RPC is enabledGET /wp-json/wp/v2/users- Enumerate WordPress users- 100+
POST /xmlrpc.phpattempts - Brute force authentication
Login Page Scanning
Multiple attempts to locate WordPress login pages: Pattern:Reconnaissance Activities
Bot Traffic Analysis
Applebot Crawler:Security Scanning
Hosting Scan (likely security researcher):Source IP Analysis
Top Attacking IPs:| IP Address | Organization | Request Count | Activity Type |
|---|---|---|---|
| 152.42.193.218 | Unknown | 100+ | XML-RPC brute force |
| 172.69.x.x, 172.71.x.x | Cloudflare | 50+ | Setup-config scanning |
| 162.158.x.x | Cloudflare | 30+ | Setup-config scanning |
| 141.101.x.x | Cloudflare | 20+ | Setup-config scanning |
| 188.166.250.145 | DigitalOcean | 3 | wp-login scanning |
- Primary traffic: Cloudflare CDN (multiple /16 blocks)
- Secondary: Direct IP attacks from hosting providers
- Reconnaissance: Search engine bots and security scanners
Server Response Patterns
HTTP Response Code Distribution:404: File/path not found (majority of responses)409: WordPress already configured444: Nginx reject (blocked requests)405: Method not allowed (XML-RPC)200 415: XML-RPC endpoint exists but rejects method
ZSH History Analysis
Operator Profile
Shell File:zsh_history.txtHostname: Unknown (referred to as “luki” in paths)
Operating System: Linux (likely Kali Linux or Parrot OS)
Command Count: 1,369 commands (truncated) Activity Period: Extended reconnaissance and exploitation campaign
Toolset and Capabilities
Reconnaissance Tools
Subdomain Enumeration:Exploitation Tools
ProxyShell Exploitation:Target Countries and Organizations
The shell history reveals systematic targeting of multiple countries:United Arab Emirates (UAE)
- Dubai Police Lab:
subfinder -d dubaipolicelab.ae - Emirates Identity Authority:
nmap -Pn emaratech.ae - Dubai Chamber:
subfinder -d dubaichamber.com - RTA Dubai:
ffuf -u https://login.rta.ae/FUZZ
Afghanistan
Pakistan
Israel
Saudi Arabia
Lebanon
Jordan
Turkey
Kuwait
Georgia
Armenia
Credential Management
Password Lists Used:Gh@dyismyfirsts0nN!cecaremobily@123Xdxbsystem6337X
- Saudi Arabia:
t.alzahrani.dar,svc-win48,bmcpatrol - Lebanon:
SCANSAIDA,ELIEGE,jacqueshad,bechirbad
Network Infrastructure
C2 and Proxy Infrastructure:88.80.145.122- SSH tunnel/proxy103.57.251.31:3512- SOCKS5 proxy
Post-Exploitation Activities
Lateral Movement:Vulnerability Exploitation
ProxyShell (CVE-2021-34473, CVE-2021-34523):Shell Failure Log Analysis
Failed Deployment Tracking
Log File:ea3e059ca58eec16a98691bcae372170d83b97c0_Shell failed.txt
Total Failed Attempts: 49 documented failures across multiple countries
Failure Distribution by Country
Austria (At):Webshell Naming Convention
Failed deployments reveal webshell naming patterns: Random 5-character names:msfuj.aspx,wsrnt.aspx,dggle.aspx,maggb.aspx,hoqea.aspxloolm.aspx,vpsem.aspx,spryc.aspx,pmkqm.aspx,abaak.aspx
webclient.aspx(appears 5 times)OutlookOU.aspx(appears 4 times)errorFE.aspxsystem_web/webclient.aspx
Vw8q1tdLy.aspx,fUMBz0mwHC.aspx,BTiuzWgu.aspxg1t4YBfJJ.aspx,0vPiLDQcfJDR.aspx,dYeuy3CETD.aspx
Deployment Paths
Webshells were uploaded to two primary locations:- /owa/auth/ (OWA frontend)
- /aspnet_client/ (ASP.NET client scripts directory)
- /aspnet_client/system_web/ (nested system directory)
Operational Timeline
Phase 1: Reconnaissance (Continuous)
- Subdomain enumeration of government domains
- Port scanning of /24 and /16 network ranges
- Service version detection
- Vulnerability scanning
Phase 2: Initial Access (2022-2025)
- ProxyShell exploitation campaigns
- Webshell deployment
- Initial credential harvesting
Phase 3: Persistence (Ongoing)
- BellaCiao backdoor deployment
- Service-based persistence mechanisms
- Establishment of SSH tunnels
Phase 4: Lateral Movement (Active)
- WMI-based remote execution
- SMB network share enumeration
- Credential reuse across networks
Phase 5: Collection (Current)
- Log file exfiltration
- Credential dumping
- Network mapping
Key Findings
- Infrastructure Abuse: Compromised WordPress server used for C2 or staging
- Automation: Extensive use of automated scanning and exploitation tools
- Persistence: Multiple backup C2 domains (twittsupport.com, msn-center.uk)
- Operational Security: Use of SSH tunnels and SOCKS proxies for anonymity
- Target Profile: Government entities and critical infrastructure in Middle East
- Credential Reuse: Harvested credentials used across multiple organizations
- Failed Operations: 49 documented failed webshell deployments indicating detection or defensive measures
Indicators of Compromise
Domains
twittsupport.com(BellaCiao C2)msn-center.uk(BellaCiao C2 backup)ameen-alkhalij.nu(Compromised infrastructure)
File Paths
C:\ProgramData\Microsoft\Diagnostic\Java Update Services.exeC:\ProgramData\Microsoft\Diagnostic\JavaUpdateServices.exeC:\ProgramData\Microsoft\Diagnostic\JavaUpdateServices.ps1/owa/auth/*.aspx/aspnet_client/*.aspx
Service Names
- “Java Update Services”
- “Microsoft Exchange Services Log”
Network Indicators
- Port 8000 (BellaCiao webserver)
- Port 9090 (local forwarding)
- Port 49450 (RDP forwarding)
- SSH on port 443 (tunnel establishment)