Muhstik botnet adds another vulnerability exploit to its arsenal

Threat Advisories

Muhstik botnet adds another vulnerability exploit to its arsenal


For a detailed advisory, download the pdf file here

Muhstik malware has begun attacking Redis Servers by exploiting a recently reported vulnerability, CVE-2022-0543. This flaw can be found in several Redis Debian packages. The attack began on March 11, 2022, and was carried out by a threat actor who targeted Confluence servers in September 2021 and Log4j in December. The payload is a Muhstik bot variation that may be used to perform DDOS assaults.

The threat actor first executes the Lua scripts to exploit the vulnerability found in Redis Debian servers. The threat actor attempts to download “” from “106[.]246.224.219” using wget or curl. It stores it as “/tmp/russ” and runs it which will download and run Linux payload from 160[.]16.58.163. These binaries have been recognized as Muhstik bot variants. This botnet then connects to an IRC server to receive commands that download files, run shell commands, and carry out attacks like flood attacks and SSH brute force attacks.

The Mitre TTPs commonly used by Muhstik malware are:

TA0001: Initial Access

TA0011: Command and Control

TA0042: Resource Development

TA0008:  Lateral Movement

T1071: Application Layer Protocol

T1588.006: Obtain Capabilities: Vulnerabilities

T1190: Exploit Public-Facing Application

T1021.004: Remote Services: SSH T1059.004: Command and Scripting Interpreter: Unix Shell

Vulnerability Details


Indicators of Compromise (IoCs)


Patch Links