Black friday Up to 3 extra licenses FOR FREE + Special offer for TI LOOKUP Get it now
Webinar
February 26
Better SOC with Interactive Sandbox Practical Use Cases
Register now

RondoDox

136
Global rank
133 infographic chevron month
Month rank
124 infographic chevron week
Week rank
0
IOCs

RondoDox is an emerging Linux-based botnet malware that exploits dozens of known vulnerabilities in internet-facing devices like routers, DVRs, and web servers to build massive networks for DDoS attacks, cryptomining, and data exfiltration. First spotted in mid-2025, its "exploit shotgun" tactic (firing multiple payloads at once) has made it a rapid escalator in the IoT threat landscape, compromising unpatched edge devices worldwide.

Botnet
Type
Unknown
Origin
1 June, 2025
First seen
25 December, 2025
Last seen

How to analyze RondoDox with ANY.RUN

Type
Unknown
Origin
1 June, 2025
First seen
25 December, 2025
Last seen

IOCs

IP addresses
74.194.191.52
45.88.186.85
5.255.121.141
38.59.219.27
23.228.188.126
192.159.99.95
89.144.31.18
74.19.191.52
70.184.13.47
5.231.70.66
41.231.37.153
51.81.104.115
59.7.217.245
31.56.27.97
45.94.31.89
45.156.87.165
87.121.84.132
192.253.248.5
45.8.145.203
37.32.15.8
Domains
gfxnick.emerald.usbx.me
pixelcheat.com
revoltreps.xyz
asdfzeq12.xyz
batmanansaak.com
bennamynale.com
fbbsbf.work.gd
fbi.mikuchannel.site
o2.sibzapaska.ru
Last Seen at

Recent blog posts

post image
Integrating a Malware Sandbox into SOAR Workf...
watchers 253
comments 0
post image
5 Ways MSSPs Can Win Clients in 2026
watchers 252
comments 0
post image
Release Notes: AI Sigma Rules, Live Threat La...
watchers 275
comments 0

RondoDox: The Exploit-Shotgun Botnet Infecting Routers and DVRs

Key Takeaways

  1. RondoDox exploits a wide mix of publicly known CVEs and default credentials to build a diverse botnet.
  2. Primary targets are internet-exposed routers, DVRs/NVRs, CCTV devices and unpatched web apps — often forgotten in asset inventories.
  3. IoT to Enterprise Pivot: From DVRs to WebLogic servers, v2's 650% exploit surge demands zero-trust for all edges.
  4. Prevention priorities: patching, removing unsupported devices, replacing default passwords, and isolating IoT/CCTV networks.
  5. Detection is faster when you combine network telemetry (egress anomalies, C2 beacons) with host artifacts (unexpected binaries, cronjobs).
  6. Traffic mimicry (e.g., Fortnite floods) blends attacks: deploy DPI and anomaly detection early. Multilayer hooks like crontabs survive reboots: hunt renamed binaries and rogue scripts routinely.
  7. Loader-as-a-Service Risk: Bundling with Mirai amplifies spread—block dynamic downloads via URL filtering
  8. ANY.RUN’s Threat Intelligence Lookup speeds incident response by quickly enriching hashes/domains/CVEs and helping prioritize remediation. Use it to map RondoDox indicators to actionable patches and blocks.

destinationIP:"2.16.253.157"

IP detected as RondoDox IOC via TI Lookup IP found in RondoDox malware samples via TI Lookup

  1. Malware sandboxes like ANY.RUN detonate RondoDox samples in isolated VMs, revealing behaviors like persistence scripts or C2 drops without risking production, safely decoding XOR payloads for IOC extraction. They simulate multi-arch environments to trace loader chains, accelerating reverse engineering. Interactive sandboxes can reveal C2 domains, beacon intervals, and secondary payloads to inform blocking/monitoring actions.

View analysis

RondoDox sample in the Sandbox RondoDox sample detonated in the ANY.RUN Sandbox

What is RondoDox Malware?

RondoDox represents a new generation of botnet malware characterized by its modular design, cross-platform capabilities, and aggressive exploitation tactics. The malware operates primarily on Linux-based systems and supports multiple architectures which allows RondoDox to infect a diverse range of devices, from consumer-grade routers to enterprise web servers.

The malware's core is a multi-stage dropper that ignores termination signals, probes writable directories, and deploys obfuscated binaries to evade static analysis. Once entrenched, it impersonates legitimate traffic mimicking games like Fortnite or VPN protocols like OpenVPN to mask C2 communications and DDoS floods.

A November 2025 variant, RondoDox v2, escalated with 75 exploits, including enterprise targets like WebLogic servers, signaling a shift from opportunistic IoT hits to strategic business compromises. This adaptability, coupled with rapid infrastructure rotation, has fueled a 230% surge in attacks from July to August 2025, per CloudSEK telemetry

RondoDox employs XOR obfuscation using the hexadecimal key 0x21 to encode its configuration data, including file paths, tool filenames, and command-and-control (C2) server addresses. This simple yet effective encoding mechanism helps RondoDox evade basic security analysis while maintaining operational efficiency. Recent variants have evolved to function as a "loader-as-a-service," co-packaging RondoDox with notorious malware families like Mirai and Morte, significantly complicating detection and remediation efforts.

What distinguishes RondoDox from earlier botnets is its systematic approach to persistence and stealth. The malware modifies system startup files, creates symbolic links, establishes cron jobs, and even renames critical system binaries like iptables, firewall utilities, and shutdown commands to random character strings. This deliberate sabotage of system recovery tools makes remediation exceptionally difficult once a device is compromised.

Use ANY.RUN free for 14 days

Try the full power of interactive analysis

Start your free trial

RondoDox Malware Victimology

The campaign has been observed globally since mid-2025, with significant activity detected across North America, Europe, and Asia. Devices from over 30 vendors are vulnerable, including popular brands like TP-Link, D-Link, Cisco, Netgear, Linksys, Zyxel, QNAP, Tenda, and TOTOLINK. Organizations operating internet-facing network devices are at heightened risk, particularly those using equipment from vendors with inconsistent security update policies.

Primary targets include:

  • Small and medium-sized businesses operating retail stores, warehouses, and small offices with unmanaged security cameras, DVRs, and routers;
  • Internet service providers and hosting companies with exposed network infrastructure;
  • Home users with consumer-grade routers and IoT devices running outdated firmware;
  • Educational institutions with legacy network equipment and security systems;
  • Healthcare facilities using networked security cameras and monitoring systems;
  • Enterprise organizations with vulnerable network edge devices, particularly those maintaining legacy systems or delayed patching schedules.

How RondoDox Functions

RondoDox spreads using two complementary vectors:

  • Exploit shotgun: automated probes that attempt many publicly disclosed vulnerabilities (some originally disclosed at security contests) across routers, DVRs, CCTV devices and web apps. Any unpatched service with a known remote code execution or command injection flaw is a target.
  • Credential abuse & weak defaults: many IoT/edge devices still use default factory credentials or weak passwords; RondoDox includes simple credential-guessing routines to gain access.

Once a device is compromised the loader often drops multi-architecture binaries and may attempt to scan local subnets to find adjacent vulnerable devices, accelerating lateral spread in poorly segmented environments.

Initial entry leverages command injection in exposed interfaces: unsanitized POSTs (e.g., NTP/hostname fields) execute wget/curl | sh chains downloading rondo..sh. Vectors include CVE-2023-1389 (TP-Link routers), CVE-2024-3721 (TBK DVRs), and weak creds like root/123456. The script probes mounts without noexec, drops payloads to /tmp/lib, and clears history.

Spread occurs via botnet scanning: infected nodes probe ports 22/23/80/443 for vulns, chaining to Mirai for brute-force amplification. Loader-as-a-service rotates C2s (e.g., 74[.]194[.]191[.]52), enabling horizontal infection across networks.

RondoDox operates as a modular ELF binary with embedded shell scripts, decoding configs via XOR (key 0x21) to reveal C2 IPs and paths. Post-decryption, it forks processes for anti-analysis (killing debuggers), persistence setup, and C2 beaconing over port 345 or HTTP. Command handlers parse base64-encoded directives for floods or downloads, forging packets with magic bytes (e.g., OpenVPN's \x38) for evasion. The v2 variant adds self-healing: if removed, cron jobs redownload from loaders like rondo.dtm.sh. Multi-arch support ensures cross-device functionality, with traffic blending via protocol mimicry.

Sandbox Analysis of a RondoDox Sample

ANY.RUN’s Interactive Sandbox provides isolated, instrumented environments where security researchers and analysts can safely execute suspicious files without risking production systems. For RondoDox analysis, sandboxes enable:

  • Behavioral observation: Watching RondoDox's complete execution flow from initial startup through persistence establishment, C2 communication, and attack preparation.

  • Network traffic capture: Recording all network connections, payload downloads, and C2 communications to identify infrastructure and attack patterns.

  • System modification tracking: Monitoring file system changes, process creation, registry/configuration modifications, and symbolic link creation.

  • Evasion technique identification: Detecting anti-sandbox measures such as the malware's monitoring for SIGKILL (exit code 137) and virtualization environment checks.

View a RondoDox sample analysis

RondoDox Sandbox analysis RondoDox detonated in the Interactive Sandbox

An analyst could focus on the loader used to deliver the botnet’s main binary, since the loader is the component that creates the largest number of artifacts.

The first important element of the script is the check: [ -t 0 ] && exit 0 This ensures the script exits if standard input is connected to a terminal, meaning it is intended for background or automated execution, not interactive use.

The core logic begins with a loop through all running processes. For each PID, the script checks for the presence of the exe file. If it is missing, the script terminates the process with kill -9. Then it retrieves the symlink to the executable file and skips processes whose path contains /lib. For all others, it checks whether their paths contain certain directories (tmp, var, dev, mnt, run, home), and if a match is found, it kills the process.

Next, the script attempts to disable security mechanisms: it deactivates SELinux and stops AppArmor. It then remounts the root filesystem in read-write mode, allowing modification of system files. After that, it deletes the contents of /var/cache/* and ~/.cache, clearing system and user caches.

Malware remounts the file system Malware remounts the file system

The script then moves to /dev and deletes files whose names correspond to different processor architectures, such as arc, arm, arm4, etc. This process is repeated for multiple directories. This approach ensures the removal of potential artifacts or competing binaries.

Then follows a series of blocks for downloading and running binaries named rondo for different architectures, while also setting execution permissions. All existing rondo processes are then killed, and ./rondo "bash.mips" is executed. The check

[ $? -eq 137 ] && exit 0

verifies whether the exit code is 137, and if so, the script exits. This pattern is repeated for many architectures, allowing the script to try running the appropriate binary for the current system and exit upon successful execution.

RondoDox process sequence RondoDox process sequence script establishing persistence

At the end, history -c clears the shell command history, and exit 0 terminates the script successfully.

The overall mechanism includes self-cleaning, disabling protections, removing competitors, and deploying a payload tailored to the system’s architecture.

RondoDox demonstrates a typical modern botnet infection and persistence strategy: aggressive system cleanup from competitors (including cryptominers), disabling security mechanisms, and adaptation to a wide range of architectures. This makes it dangerous for vulnerable Linux systems, IoT devices, and servers, where it can be used to conduct powerful DDoS attacks, masking its traffic as legitimate services.

What RondoDox can do to an endpoint device

On compromised endpoints RondoDox has been observed to:

  • Install a lightweight loader/agent that persists and executes commands from a C2.
  • Participate in distributed denial-of-service (DDoS) campaigns.
  • Provide proxy/residential-proxy services by relaying traffic.
  • Download and execute secondary payloads (cryptominers, additional botnet modules, or commodity malware families).
  • Hide or obfuscate network traffic to blend with legitimate services (some variants mimic game/Discord/VPN traffic patterns).

The malware typically focuses on leveraging the compromised device’s network capacity rather than stealing local user documents — though lateral movement and pivoting into adjacent networks are possible if the environment is misconfigured.

Examples of the most successful RondoDox attacks

  • June 15, 2025 TP-Link Exploitation: First documented hit via CVE-2023-1389 on Archer AX21 routers, enabling mass shell access and botnet enlistment for UDP floods; affected thousands in consumer networks.

  • July 2025 TBK DVR Campaign: Leveraged CVE-2024-3721 to compromise retail surveillance systems, leading to DDoS against e-commerce targets; Fortinet linked it to renamed binaries hindering recovery.

  • September 2025 Loader Surge: 230% attack spike via Mirai bundling, hitting SOHO routers for cryptomining; CloudSEK reported global IoT infections.

  • November 2025 XWiki Pivot: v2 exploited CVE-2025-24893 for code execution on unpatched wikis, pulling enterprise servers into the botnet; early adopter status amplified spread.

  • October 2025 Enterprise Escalation: 75-vector assault on WebLogic/QNAP via honeypots, with User-Agent signatures like bang2013@atomicmail[.]io; targeted manufacturing OT for proxying.

Gathering Threat Intelligence on RondoDox Malware

Threat intelligence services provide IOC that can be integrated into security tools:

  • IPs: Block connections to/from known RondoDox C2 servers;

  • Domains: Prevent DNS resolution of malicious infrastructure;

  • File hashes: Identify RondoDox binaries through endpoint scanning;

  • URLs: Block access to payload download locations.

Use Threat Intelligence Lookup to check suspicious artifacts and analyze the malware’s behavior via safe sandbox detonations. Get contextual data to understand threat actor motivations, capabilities, and typical targets to assess your risk profile

Start exploring the threat by looking it up by the name:

threatName:"rondodox"

RondoDox samples found via TI Lookup RondoDox sample sandbox analyses found via TI Lookup

Integrate ANY.RUN’s threat intelligence solutions in your company

Contact us

Conclusion

RondoDox is a cautionary example of modern botnet evolution: modular, multi-architecture, and opportunistic, weaponizing old and new CVEs while blending credential abuse into its playbook. The most effective defenses are not purely signature-based: they are a combination of up-to-date patching, rigorous asset management, network segmentation, strict management plane controls, centralized telemetry, and a robust program for threat intelligence and sandbox-backed analysis. Organizations that treat edge devices as first-class security assets will reduce their exposure to RondoDox and similar campaigns

Trial TI Lookup to start gathering actionable threat intelligence on RondoDox: just sign up to ANY.RUN.

HAVE A LOOK AT

X-Files screenshot
X-Files
xfiles
X-FILES Stealer is a sophisticated malware designed to infiltrate systems and steal sensitive information, targeting login credentials for email, social media, and other personal accounts. It captures data and transmits it back to the attacker’s command-and-control server. X-FILES Stealer employs advanced evasion techniques to avoid detection, making it a persistent threat in the cyber landscape.
Read More
Arechclient2 screenshot
Arechclient2
arechclient2
The Arechclient2 malware is a sophisticated .NET-based Remote Access Trojan (RAT) that collects sensitive information, such as browser credentials, from infected computers. It employs various stealth techniques, including Base64 encoding to obscure its code and the ability to pause activities to evade automated security tools. The malware also can adjust Windows Defender settings and uses code injection to manipulate legitimate processes.
Read More
SSLoad screenshot
SSLoad
ssload
SSLoad is a malicious loader or downloader that is used to infiltrate target systems through phishing emails, perform reconnaissance and transmit it back to its operators delivering malicious payloads. To avoid detection, SSLoad employs various encryption methods and delivery techniques highlighting its versatile nature and complexity. It is believed to be a part of Malware-as-a-Service (MaaS) operation given its diverse delivery methods and implemented techniques.
Read More
AsyncRAT screenshot
AsyncRAT
asyncrat
AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions.
Read More
Orcus RAT screenshot
Orcus RAT
orcus rat trojan
Orcus is a modular Remote Access Trojan with some unusual functions. This RAT enables attackers to create plugins using a custom development library and offers a robust core feature set that makes it one of the most dangerous malicious programs in its class.
Read More
MassLogger screenshot
MassLogger
masslogger
MassLogger is a credential stealer and keylogger first identified in April 2020. It has been actively used in cyber campaigns to exfiltrate sensitive information from compromised systems. It is designed for easy use by less tech-savvy actors and is prominent for the capability of spreading via USB drives. It targets both individuals and organizations in various industries, mostly in Europe and the USA.
Read More