Task-specific Atlas Agents investigate threats at machine speed with full transparency, expert validation, and explainable outcomes you can trust.
Atlas Extended Detection and ResponseOpen XDR with Agentic AI & machine learning that eliminates noise, enables real-time detection and response, and automatically blocks threats.
Atlas User ExperienceSee what our SOC sees, review investigations, and see how we are protecting your business.
Atlas Platform IntegrationsSeamless integrations and threat investigation that adapts to your tools and evolves with your business.
24/7 SOC-as-a-Service with unlimited threat hunting and incident handling.
Threat Response Unit (TRU)Proactive threat intelligence, original threat research and a world-class team of seasoned industry veterans.
Cyber Resilience TeamExtend your team capabilities and prevent business disruption with expertise from eSentire.
Response and RemediationWe balance automated blocks with rapid human-led investigations to manage threats.
Combine AI-driven security operations, multi-signal attack surface coverage and 24/7 Elite Threat Hunters to help you take your security program to the next level.
Get unlimited Incident Response with threat suppression guarantee - anytime, anywhere.
CTEM and advisory programs that identify security gaps and build proactive strategies to address them.
Flexible MDR pricing and packages that fit your unique security requirements.
Entry level foundational MDR coverage
Comprehensive Next Level eSentire MDR
Next Level eSentire MDR with Cyber Risk Advisors to continuously advance your security program
Stop ransomware before it spreads.
Identity ResponseStop identity-based cyberattacks.
Zero Day AttacksDetect and respond to zero-day exploits.
Cybersecurity ComplianceMeet regulatory compliance mandates.
Third-Party RiskDefend third-party and supply chain risk.
Cloud MisconfigurationEnd misconfigurations and policy violations.
Cyber RiskAdopt a risk-based security approach.
Mid-Market SecurityMid-market security essentials to prioritize.
Sensitive Data SecurityProtect your most sensitive data.
Cyber InsuranceMeet insurability requirements with MDR.
Cyber Threat IntelligenceOperationalize cyber threat intelligence.
Security LeadershipBuild a proven security program.
Security Researchers have identified publicly exposed open directories linked to the Iranian APT MuddyWater. The exposed information was reviewed by eSentire's Threat Response Unit (TRU)…
On March 4th, 2026, Cisco disclosed two maximum severity vulnerabilities impacting Cisco Secure Firewall Management Center (FMC) Software. Identified as CVE-2026-20079 (CVSS: 10.0) and…
eSentire is The Authority in Managed Detection and Response Services, protecting the critical data and applications of 2000+ organizations in 80+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events.
About Us Leadership Careers Event Calendar → Newsroom → Aston Villa Football Club →We provide sophisticated cybersecurity solutions for Managed Security Service Providers (MSSPs), Managed Service Providers (MSPs), and Value-Added Resellers (VARs). Find out why you should partner with eSentire, the Authority in Managed Detection and Response, today.
Search our site
Multi-Signal MDR with 300+ technology integrations to support your existing investments.
24/7 SOC-as-a-Service with unlimited threat hunting and incident handling.
We offer three flexible MDR pricing packages that can be customized to your unique needs.
The latest security advisories, blogs, reports, industry publications and webinars published by TRU.
Compare eSentire to other Managed Detection and Response vendors to see how we stack up against the competition.
See why 2000+ organizations globally have chosen eSentire for their MDR Solution.
In March 2026, eSentire's Threat Response Unit (TRU) investigated an open-directory web server attributed to MuddyWater, an Iranian state-sponsored APT active since at least 2017 known for conducting cyber espionage campaigns against organizations worldwide. During the investigation, TRU identified a file that establishes persistence and deploys the Tsundere botnet malware.
Tsundere is a botnet that enables arbitrary command execution on victim machines and uses a technique called "EtherHiding" to retrieve C2 servers stored in smart contracts on the Ethereum blockchain. The malware is suspected to be a Malware-as-a-Service (MaaS) offering of Russian origin, a finding that TRU's analysis supports through the discovery of logic that checks whether the infected host is located in a CIS country (including Ukraine) and terminates execution if so. MuddyWater's deployment of Tsundere demonstrates they are leveraging MaaS offerings, even those developed by Russian threat actors, to achieve their operational objectives.
Artifacts discovered in our analysis are nearly identical to those documented in Ctrl-Alt-Intel's blog, MuddyWater Exposed: Inside an Iranian APT operation. Additionally, Tsundere and the persistence module covered in this blog share many JavaScript obfuscation similarities with North Korean APT malware we analyzed in our previous blog, North Korean APT Malware Analysis: DEV#POPPER RAT and OmniStealer (Everyday I'm Shufflin').
In both cases, the free tool Obfuscator.io was likely used to obfuscate Node.js-based payloads - a common approach across Node.js malware in general.
For a comprehensive list of TTPs, targeted vulnerabilities, and recommendations to protect against MuddyWater, see eSentire's security advisory, "Iranian APT MuddyWater Exposed".
The PowerShell script found in the open directory, "reset.ps1" is a stager that decodes, decrypts, and executes Tsundere Botnet named, "sysuu2etiprun.js", and a persistence module named, "VfZUSQi6oerKau.js".
The function "bxgdbzgf" takes three parameters: hex-encoded ciphertext to decrypt, the base64 encoded AES key, and base64 encoded AES IV. It is called twice, first to decrypt Tsundere, and subsequently to decrypt the persistence module.

The following CyberChef recipe emulates the behavior of reset.ps1 - decrypting the persistence module and Tsundere Botnet payloads using the AES key and IV identified in reset.ps1:
Tsundere uses WebSockets + AES-256-CBC to establish encrypted channels with C2 servers. C2 servers are retrieved from the Ethereum blockchain via a list of RPC providers that are used in acquiring the C2 address from an Ethereum smart contract. This technique is known as "EtherHiding".
Prior to retrieving the C2 address, Tsundere checks if the victim machine's language is affiliated with any of the following countries via PowerShell. If so, it exits immediately.
The PowerShell command used in this process is included in the following code snippet:

After ensuring the victim device is not affiliated with the aforementioned list of countries, it sends a request to an RPC provider to retrieve the hex-encoded C2 address, connects to the C2 via Websocket, and establishes handlers for messages, e.g. "handleMessage".

The figure below displays the logic used in sending a request to the RPC provider, where the ethers.js library is used to get the C2 address string from the smart contract.

The following Ethereum wallet and smart contract addresses were identified in our analysis:
The following RPC servers are used to determine which C2 address to use by querying all of them concurrently and selecting the C2 address that is returned most frequently:
For clarification purposes, here is the Set String function input data (decoded from hex) from the wallet address to the smart contract address, revealing a Tsundere Botnet C2 at 193.17.183[.]126 (ASN 400992 "ZhouyiSat Communications").
There are three transactions from the wallet to the smart contract, each revealing two different Tsundere Botnet C2s, the one previously mentioned, and 185.236.25[.]119 (ASN 400992 "ZhouyiSat Communications").

After acquiring the C2 via EtherHiding, Tsundere establishes initial contact with it to retrieve a 32-byte AES key and subsequent communications to retrieve a 16-byte AES IV. It then generates a Hardware ID (HWID) of the victim machine by sha256 hashing a JSON-serialized object containing fingerprint information about the victim machine (shown below):
It then sends this HWID and associated fingerprint information to the C2.

The table below lists command lines used in the process of fingerprinting the victim machine:
Subsequent communication with the C2 is decrypted using the AES-256 key/IV. Decrypted messages are in JSON format and have a key named, "id" that serves to differentiate messages containing JavaScript code to execute vs simply maintaining a heartbeat "pong" with the server. The "id" value associated with JavaScript code execution is the numeric value "1", whereas pong is the string "pong".
Tsundere executes C2 commands by creating a new JavaScript Function from the message content it receives, then immediately invoking that function using .call().

The persistence module installs dependencies (ws, [email protected]) and validates the execution environment to ensure Node.js and NPM are installed. It then executes the Tsundere payload file through spawn or execSync (fallback option) and establishes persistence by a PowerShell command that creates a new value in the Run registry key. Russian is used frequently throughout; we have included translated comments in the figure for clarity.

An example PowerShell command used in this process is as follows. Note, the value name is a randomly generated 32-character hexadecimal string, e.g. "9f3a7c1d4b2e8a0c6d5f1e9a3c7b0d12".

To learn how your organization can build cyber resilience and prevent business disruption with eSentire’s Next Level MDR, connect with an eSentire Security Specialist now.
GET STARTEDThe eSentire Threat Response Unit (TRU) is an industry-leading threat research team committed to helping your organization become more resilient. TRU is an elite team of threat hunters and researchers that supports our 24/7 Security Operations Centers (SOCs), builds threat detection models across the eSentire XDR Cloud Platform, and works as an extension of your security team to continuously improve our Managed Detection and Response service. By providing complete visibility across your attack surface and performing global threat sweeps and proactive hypothesis-driven threat hunts augmented by original threat research, we are laser-focused on defending your organization against known and unknown threats.