NOTES:
ASSOCIATED FILES:

Shown above: Traffic from the pcap filtered in Wireshark.

Shown above: HTTP stream of the last HTTP request in the pcap showing a POST request that retrieves malicious content from 91.92.241[.]10.

Shown above: The server at 91.92.241[.]10 was still active as of Sunday, 2026-01-11.

Shown above: Example of a shell script downloaded from 91.92.241[.]10, likely for Mirai botnet malware.
Click here to return to the main page.