Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Maltrail IOC for 2026-03-21

0
Medium
Published: Sat Mar 21 2026 (03/21/2026, 00:00:00 UTC)
Source: CIRCL OSINT Feed
Vendor/Project: tlp
Product: clear

Description

Maltrail IOC for 2026-03-21

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/21/2026, 09:01:08 UTC

Technical Analysis

This entry represents an Indicator of Compromise (IOC) related to Maltrail, a network traffic detection system that identifies suspicious or malicious network activity. The IOC is dated March 21, 2026, and was sourced from the CIRCL OSINT feed, a reputable open-source intelligence provider. The threat is classified as malware-related network activity with a medium severity level, indicating a moderate risk but without specific exploit details or affected software versions. The absence of known exploits in the wild and lack of patch availability suggest this IOC is primarily observational, intended to support detection rather than mitigation of an active threat. The IOC lacks detailed technical indicators such as IP addresses, domain names, file hashes, or behavioral signatures, limiting its immediate operational use. The data tags indicate it is an unsupervised automated OSINT collection with perpetual lifetime, meaning it is intended for ongoing monitoring rather than a one-time alert. The UUID and original timestamp provide internal tracking references but do not convey technical exploit information. Overall, this IOC serves as a network activity alert to help organizations identify potential malware-related traffic patterns, supporting threat hunting and incident response efforts.

Potential Impact

Given the lack of specific exploit details, affected software versions, or active exploitation reports, the direct impact of this IOC on organizations is limited. However, it signals the presence or detection of suspicious network activity potentially related to malware, which could indicate reconnaissance, lateral movement, or data exfiltration attempts if correlated with other indicators. Organizations worldwide that rely on network traffic monitoring and threat intelligence feeds may benefit from incorporating this IOC to enhance detection capabilities. The medium severity rating suggests that while the threat is not immediately critical, it warrants attention to prevent escalation. Without actionable indicators, the impact is primarily on security monitoring and analyst workload rather than direct compromise or service disruption. This IOC may help identify early-stage or low-profile malware activity that could otherwise go unnoticed, thus supporting proactive defense. The absence of patches or exploit reports reduces urgency but does not eliminate the need for vigilance.

Mitigation Recommendations

Organizations should integrate this IOC into their existing network monitoring and intrusion detection systems, such as Maltrail or other traffic analysis tools, to enhance visibility of suspicious network activity. Correlate this IOC with internal logs, endpoint telemetry, and other threat intelligence sources to identify potential malware-related behavior. Conduct regular network traffic analysis focusing on anomalies that match the IOC’s characteristics, even if specific indicators are not provided. Maintain updated threat intelligence feeds and ensure security teams are trained to interpret and act on OSINT-derived IOCs. Implement network segmentation and strict egress filtering to limit potential malware communication channels. Employ behavioral analytics to detect deviations from normal network patterns that may indicate malware presence. Since no patches are available, focus on detection and containment strategies rather than remediation of a specific vulnerability. Regularly review and update incident response plans to incorporate new intelligence and detection capabilities. Engage in threat hunting exercises using this IOC as a reference point to uncover hidden or emerging threats.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Uuid
b8ef1b56-3e16-4f06-9c11-d1e0a7586332
Original Timestamp
1774080012

Indicators of Compromise

Url

ValueDescriptionCopy
urlhttps://api.github.com/repos/stamparm/maltrail/commits/bb17ae03e79565a2bd38f301410ccb87c6de5c78
0ktapus
urlhttps://api.github.com/repos/stamparm/maltrail/commits/9a4b811044c06c664f6c5239de239e2b452cef42
apt_kimsuky
urlhttps://x.com/skocherhan/status/2035212493694406693
apt_kimsuky
urlhttps://api.github.com/repos/stamparm/maltrail/commits/b2906f66cce576d98a881e718d84b08ff400c332
vshell
urlhttps://x.com/smica83/status/2035101635261714558
vshell
urlhttps://www.virustotal.com/gui/file/2f28ee264c23671661f57ab5a0f16941190af60232919dcbdfc9a3bb2669c82d/detection
vshell
urlhttps://www.virustotal.com/gui/file/c42ba1a03d8593f84246e27e1730f8d353d29f1b94738e079fbbf9673319848a/detection
vshell
urlhttps://www.virustotal.com/gui/file/c6c28cd300143b20a0728a96bfc9098749d97871dbe8a85a7a507f97b23cc60c/detection
vshell
urlhttps://api.github.com/repos/stamparm/maltrail/commits/4b2213c6833e2cbcc972a0d886bc25d41788e739
android_bankbot
urlhttps://x.com/KesaGataMe0/status/2034532860066243028
android_bankbot
urlhttps://x.com/nahamike01/status/2035193335141306650
android_bankbot
urlhttps://www.virustotal.com/gui/file/564b381dc3e6fc737fd9b46fb5ee1e06f4e333d2886f0805514af44947a4c271/detection
android_bankbot
urlhttps://api.github.com/repos/stamparm/maltrail/commits/93c7688c5237b41d1a29d99a3c71e6857c1a583a
apt_lazarus

Domain

ValueDescriptionCopy
domainaccount-ndax.com
0ktapus
domainmykkrconnect.com
0ktapus
domainmynikemanager.com
0ktapus
domainndocacverify.dynv6.net
apt_kimsuky
domainndocadcheck.dynv6.net
apt_kimsuky
domainndocaeverify.dynv6.net
apt_kimsuky
domainndocafverify.dynv6.net
apt_kimsuky
domainndocagverify.dynv6.net
apt_kimsuky
domainndocahverify.dynv6.net
apt_kimsuky
domainndocakverify.dynv6.net
apt_kimsuky
domainndocalverify.dynv6.net
apt_kimsuky
domainndocamverify.dynv6.net
apt_kimsuky
domainndocaoverify.dynv6.net
apt_kimsuky
domainndocapverify.dynv6.net
apt_kimsuky
domainndocaqverify.dynv6.net
apt_kimsuky
domainndocarverify.dynv6.net
apt_kimsuky
domainndocasverify.dynv6.net
apt_kimsuky
domainnid.ndocaqverify.dynv6.net
apt_kimsuky
domainkaquanhao.oss-cn-hongkong.aliyuncs.com
vshell
domainandroid-protect.com
android_bankbot
domainapplesecurity.pro
android_bankbot
domaindevicesecurity.pro
android_bankbot
domaininfo-payeasy.com
android_bankbot
domainios-deviceprotect.com
android_bankbot
domainios-inc.app
android_bankbot
domainiosdevicepolicy.app
android_bankbot
domainmodelatelier.club
apt_lazarus

Ip

ValueDescriptionCopy
ip45.78.53.77
vshell
ip161.33.154.144
android_bankbot

Threat ID: 69be5ab7f4197a8e3bb06acb

Added to database: 3/21/2026, 8:45:43 AM

Last enriched: 3/21/2026, 9:01:08 AM

Last updated: 3/22/2026, 6:56:01 AM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses