New 'xlabs_v1' Botnet, a Mirai Derivative, Targets Exposed Android Debug Bridge (ADB) on IoT Devices for DDoS-for-Hire Service

Mirai Variant 'xlabs_v1' Builds DDoS Botnet by Hijacking IoT Devices with Exposed ADB Ports

HIGH
May 7, 2026
4m read
MalwareIoT SecurityCyberattack

Related Entities

Threat Actors

Tadashi

Organizations

Hunt.io

Products & Tech

Other

xlabs_v1Mirai VLTRig

Full Report

Executive Summary

Cybersecurity researchers have uncovered a new botnet named xlabs_v1, a derivative of the notorious Mirai malware. This botnet targets a wide array of Internet of Things (IoT) and Android devices, including smart TVs, Android TV boxes, and residential routers, that have an exposed Android Debug Bridge (ADB) interface on TCP port 5555. Once compromised, these devices are conscripted into a network used to launch large-scale distributed denial-of-service (DDoS) attacks. The operation is believed to be a DDoS-for-hire service, with evidence suggesting a focus on targeting gaming servers. The malware includes sophisticated features for persistence, evasion, and resource monopolization, and is attributed to an operator using the alias "Tadashi."


Threat Overview

The xlabs_v1 botnet spreads by scanning the internet for devices with an open ADB port (5555/TCP). This interface, intended for development purposes, is often left unsecured on consumer-grade IoT devices, creating a large attack surface. The threat actor, identified as "Tadashi," leverages this vulnerability to gain unauthorized access and deploy the malware.

The operation's infrastructure was discovered by researchers at Hunt.io on a server located in the Netherlands (176.65.139.44). This server hosted various compiled versions of the malware for different CPU architectures (ARM, MIPS, x86-64, ARC), enabling the botnet to infect a diverse range of hardware.

The primary purpose of the botnet is to function as a DDoS-for-hire service. This is supported by the inclusion of 21 distinct DDoS attack methods, including specialized floods targeting the RakNet protocol used by Minecraft servers and another designed to mimic OpenVPN traffic. The malware also profiles the bandwidth of each infected device, likely to categorize and price its DDoS capabilities for potential customers.

Technical Analysis

The xlabs_v1 malware exhibits several characteristics inherited from its Mirai lineage, along with some unique features:

  • Initial Access: T1190 - Exploit Public-Facing Application: The botnet exploits the publicly accessible and often misconfigured ADB service on IoT devices.
  • Command and Control: T1071.001 - Web Protocols: The bot communicates with its C2 server, xlabslover[.]lol, using encrypted strings. The operator's alias, "Tadashi," is embedded as a ChaCha20-encrypted string.
  • Defense Evasion:
    • T1036.005 - Match Legitimate Name or Location: After infection, the malware renames its process to a common system name like /bin/bash to avoid suspicion.
    • T1057 - Process Discovery: The malware includes a "killer" module that scans for and terminates processes belonging to competing malware or security tools, ensuring it has exclusive control of the device's resources.
  • Impact: T1498 - Network Denial of Service: The botnet's primary function is to launch various types of DDoS flood attacks against specified targets.
  • Discovery: The malware performs a speed test on the infected device to measure its network bandwidth, likely for service pricing.

A co-located host (176.65.139.42) was found to be hosting a VLTRig Monero-mining toolkit, though a direct link to the xlabs_v1 operator has not been confirmed. This could indicate either a separate operation or an additional monetization stream for the same actor.

Impact Assessment

The proliferation of the xlabs_v1 botnet poses a significant threat to internet stability and service availability. For owners of compromised IoT devices, the impact includes degraded performance, increased bandwidth consumption, and the potential for their devices to be used in illegal activities. For the targets of the DDoS attacks, the impact can be severe, leading to service outages, financial loss, and reputational damage. The gaming industry, particularly operators of Minecraft servers, appears to be a primary target, but the botnet's capabilities can be directed at any online service. The DDoS-for-hire model lowers the barrier to entry for malicious actors to launch powerful attacks, making this a threat to a wide range of organizations.

IOCs — Directly from Articles

Type
domain
Value
xlabslover[.]lol
Description
Command and Control (C2) domain.
Type
ip_address_v4
Value
176.65.139.44
Description
Malware staging server in the Netherlands.
Type
ip_address_v4
Value
176.65.139.42
Description
Co-located host with VLTRig Monero-miner.
Type
ip_address_v4
Value
176.65.139.9
Description
Distribution server.
Type
destination_port
Value
5555
Description
TCP port for Android Debug Bridge (ADB) targeted by the malware.

Cyber Observables — Hunting Hints

Security teams and network administrators can hunt for the following patterns to identify compromised devices:

Type
port
Value
5555
Description
Inbound/outbound connections on TCP port 5555, the default for ADB.
Context
Firewall logs, Netflow data, Shodan/Censys scans.
Type
network_traffic_pattern
Value
DNS queries for xlabslover[.]lol
Description
Attempts by infected devices to resolve the C2 domain.
Context
DNS logs, SIEM, Threat Intelligence feeds.
Type
process_name
Value
/bin/bash (with high network activity)
Description
The malware masquerades as this process. Unusually high network traffic from this process on an IoT device is suspicious.
Context
Endpoint process monitoring (if available on the device).
Type
network_traffic_pattern
Value
Unexplained outbound UDP floods
Description
Characteristic of DDoS attacks, especially targeting gaming protocols.
Context
Network Intrusion Detection Systems (NIDS), Netflow analysis.

Detection & Response

  1. Network Scanning: Regularly scan internal and external networks for devices with an open TCP port 5555. Tools like Nmap, Shodan, or Censys can be used to identify exposed ADB interfaces. This aligns with D3FEND's D3-PSA - Port-scan Analysis.
  2. Traffic Monitoring: Use D3-NTA - Network Traffic Analysis to monitor for DNS requests to xlabslover[.]lol and outbound connections to the known C2 IPs. Look for anomalous traffic patterns, such as a smart TV suddenly sending large volumes of UDP packets.
  3. Device Forensics: If an IoT device is suspected of being compromised, check its running processes for suspicious entries. Look for processes masquerading as legitimate system utilities but consuming high CPU or network resources. If possible, analyze the device's file system for unknown binaries.
  4. Remediation: The most effective response is to reboot the infected device, which typically removes the in-memory malware. However, the device will remain vulnerable to reinfection until the underlying ADB vulnerability is addressed.

Mitigation

Preventing infection is key to defending against this type of botnet.

  1. Disable ADB: The primary mitigation is to disable the Android Debug Bridge (ADB) on all IoT and Android devices where it is not explicitly required. This is a form of M1042 - Disable or Remove Feature or Program.
  2. Firewall Configuration: If ADB access is necessary, restrict access to it using a firewall. Create rules that only allow connections from trusted IP addresses or management networks. This implements M1035 - Limit Access to Resource Over Network.
  3. Network Segmentation: Isolate IoT devices on a separate network segment that has restricted or no access to the internet and critical internal systems. This can prevent them from being compromised by external scanners and limit their ability to participate in DDoS attacks. This aligns with M1030 - Network Segmentation.
  4. Firmware Updates: Regularly check for and apply firmware updates from device manufacturers, as these may contain patches for known vulnerabilities. This is a fundamental practice of M1051 - Update Software.

Timeline of Events

1
May 7, 2026
This article was published

MITRE ATT&CK Mitigations

Use firewalls to restrict access to the ADB port (TCP/5555) from the internet. Access should only be permitted from trusted management networks.

Mapped D3FEND Techniques:

Disable the Android Debug Bridge (ADB) feature on all devices where it is not essential for operation.

Mapped D3FEND Techniques:

Place IoT devices on a separate, isolated network segment with strict egress filtering to prevent them from reaching the internet and participating in DDoS attacks.

Mapped D3FEND Techniques:

Keep device firmware up to date to ensure any vendor-supplied patches for ADB or other vulnerabilities are applied.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

The most effective countermeasure against the xlabs_v1 botnet is to harden the configuration of all IoT and Android devices by disabling the Android Debug Bridge (ADB) interface. This feature is intended for developers and should not be enabled on production devices connected to the internet. Network administrators should conduct thorough audits of all connected devices, including smart TVs, set-top boxes, and routers, to identify and disable any active ADB services. This can often be done through the device's settings menu, typically in a 'Developer Options' section. For enterprise environments, this process should be integrated into the device onboarding and configuration management lifecycle. By removing the attack surface entirely, organizations can prevent initial access by the botnet. This proactive hardening step is far more effective than reactive detection and response for this specific threat vector.

Implement strict inbound traffic filtering at the network perimeter to block all unsolicited connections to TCP port 5555. This serves as a critical compensating control for devices where ADB cannot be disabled. Perimeter firewalls should be configured with a default-deny rule for this port. For organizations with a large number of IoT devices, this rule should be applied to the specific network segments where these devices reside. This prevents the botnet's internet-wide scanners from discovering and connecting to vulnerable ADB interfaces within the network. While determined attackers may find ways around simple port blocking, it significantly raises the difficulty of exploitation and effectively mitigates the opportunistic, large-scale scanning method used by Mirai-based botnets like xlabs_v1. This technique directly hardens the network against the initial access vector.

Isolate all IoT devices onto a dedicated, segmented network with stringent access controls. This 'IoT VLAN' should have no direct access to the corporate network and heavily restricted access to the internet. Egress filtering rules should be applied to this segment, allowing only the specific connections necessary for the devices to function (e.g., to manufacturer update servers or specific cloud services). All other outbound traffic, especially the types of UDP floods used in DDoS attacks, should be blocked. This isolation strategy provides two key benefits against the xlabs_v1 threat: first, it makes it harder for a compromised device to communicate with its C2 server, and second, it prevents the device from being used as a weapon in a DDoS attack against external targets. This containment approach limits the impact of a potential compromise and protects the organization's reputation and network resources.

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Miraixlabs_v1BotnetDDoSIoTAndroid Debug BridgeADBTadashiMinecraft

📢 Share This Article

Help others stay informed about cybersecurity threats

🎯 MITRE ATT&CK Mapped

Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.

🧠 Enriched & Analyzed

Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.

🛡️ Actionable Guidance

Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.

🔗 STIX Visualizer

Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.

Sigma Generator

Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.