Maltrail IOC for 2026-03-24
Maltrail IOC for 2026-03-24
AI Analysis
Technical Summary
This Maltrail IOC report dated 2026-03-24 compiles a set of indicators related to various malware and APT campaigns, primarily focusing on network activity and OSINT-derived threat intelligence. The report includes URLs and domains tied to multiple threat actors and malware families, such as APT Sidewinder, APT Kimsuky, UNC2465, Android Joker malware, and fake Android applications. These indicators represent command and control (C2) servers, phishing domains, and compromised infrastructure used for malware distribution or control. Notably, the report references compromised open-source tools like Trivy, which have been targeted by threat actors to insert malicious code, indicating supply chain attack vectors. The absence of CVEs or patches suggests these are not newly discovered software vulnerabilities but rather active malicious infrastructure and malware campaigns. The threat intelligence is derived from manual OSINT collection and external analysis, emphasizing network-level detection and blocking. While no active exploits or ransomware campaigns are currently known, the presence of multiple APT-linked domains and URLs indicates persistent targeting of organizations, especially those with Android device usage or reliance on open-source security tools. The medium severity rating reflects the moderate risk posed by these indicators, which require proactive monitoring and mitigation to prevent infection or data exfiltration.
Potential Impact
The potential impact of this threat is significant for organizations worldwide, particularly those with Android device ecosystems, software supply chains involving open-source tools, or exposure to targeted APT campaigns. Successful exploitation or infection could lead to unauthorized access, data theft, espionage, or disruption of operations. The use of fake Android apps and Joker malware variants can result in financial fraud, credential theft, and persistent device compromise. Supply chain attacks via compromised tools like Trivy can undermine trust in software development and deployment pipelines, potentially affecting a wide range of enterprises and developers. The presence of multiple APT-linked domains suggests targeted espionage campaigns that could impact government, defense, technology, and critical infrastructure sectors. Although no ransomware or widespread exploits are currently reported, the evolving nature of these threats means organizations could face increased risk if these indicators are not addressed. Network-level compromise could also facilitate lateral movement and further infiltration within corporate environments.
Mitigation Recommendations
Organizations should implement targeted network defenses to block and monitor traffic to the listed malicious domains and URLs associated with the identified threat actors and malware families. Deploy and regularly update intrusion detection/prevention systems (IDS/IPS) with these IOCs to detect suspicious network activity. Conduct thorough endpoint security scans on Android devices to identify and remove fake apps and Joker malware variants. Review and harden software supply chain security by verifying the integrity of open-source tools like Trivy and monitoring for unusual commits or updates. Employ threat intelligence sharing to stay updated on evolving indicators linked to these APT groups. Implement strict application whitelisting and mobile device management (MDM) policies to control app installations on corporate devices. Enhance user awareness training focused on phishing and social engineering tactics used to distribute fake apps. Regularly audit DNS logs and network traffic for connections to suspicious domains, and isolate affected systems promptly. Finally, establish incident response plans tailored to APT and supply chain attack scenarios to minimize damage and recovery time.
Affected Countries
United States, South Korea, Vietnam, Japan, Germany, France, United Kingdom, India, Australia, Canada
Indicators of Compromise
- url: https://api.github.com/repos/stamparm/maltrail/commits/fc3d78d0db5e6d4006442ee4ae23d4c57f719fcf
- domain: dp.islamic-finder.org
- url: https://api.github.com/repos/stamparm/maltrail/commits/d5a6e55d210c3077141509cb8200294d8d9f5709
- url: https://x.com/SpiderLabs/status/2036076835889418406
- domain: disanviet.homes
- domain: itrekker.space
- domain: moitasec.com
- domain: ocngongiare.com
- domain: thcsmyxa-nd.com
- domain: tourmini.site
- url: https://api.github.com/repos/stamparm/maltrail/commits/63e908ab0abb9fcf04c0a393485987abe1bb44ec
- url: https://www.wiz.io/blog/teampcp-attack-kics-github-action
- domain: checkmarx.zone
- url: https://api.github.com/repos/stamparm/maltrail/commits/d4de73afbc24cd0d0b70fe788392232acb486051
- domain: htax-store.dns.navy
- domain: mtnvs.dynv6.net
- domain: n-cloud.htax-store.dns.navy
- domain: nid-user.tax-loadoc.dns.army
- domain: ntsncorp.dynv6.net
- domain: tax-loadoc.dns.army
- url: https://api.github.com/repos/stamparm/maltrail/commits/77996e570aefc5688a3af37c05e9094059462cbd
- domain: ahaw.pw
- url: https://api.github.com/repos/stamparm/maltrail/commits/4c86bbe470655e943b2c95c484d943f874e440f1
- domain: rvtoollsa.com
- domain: rvtoollsi.com
- url: https://api.github.com/repos/stamparm/maltrail/commits/f0f25f3b92bbc48018825d984d6d32ebbf333a5e
- domain: chromium-report-tech-31as-2s1-tc2d-h143.redticker-ctft.com
- domain: redticker-ctft.com
Maltrail IOC for 2026-03-24
Description
Maltrail IOC for 2026-03-24
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
This Maltrail IOC report dated 2026-03-24 compiles a set of indicators related to various malware and APT campaigns, primarily focusing on network activity and OSINT-derived threat intelligence. The report includes URLs and domains tied to multiple threat actors and malware families, such as APT Sidewinder, APT Kimsuky, UNC2465, Android Joker malware, and fake Android applications. These indicators represent command and control (C2) servers, phishing domains, and compromised infrastructure used for malware distribution or control. Notably, the report references compromised open-source tools like Trivy, which have been targeted by threat actors to insert malicious code, indicating supply chain attack vectors. The absence of CVEs or patches suggests these are not newly discovered software vulnerabilities but rather active malicious infrastructure and malware campaigns. The threat intelligence is derived from manual OSINT collection and external analysis, emphasizing network-level detection and blocking. While no active exploits or ransomware campaigns are currently known, the presence of multiple APT-linked domains and URLs indicates persistent targeting of organizations, especially those with Android device usage or reliance on open-source security tools. The medium severity rating reflects the moderate risk posed by these indicators, which require proactive monitoring and mitigation to prevent infection or data exfiltration.
Potential Impact
The potential impact of this threat is significant for organizations worldwide, particularly those with Android device ecosystems, software supply chains involving open-source tools, or exposure to targeted APT campaigns. Successful exploitation or infection could lead to unauthorized access, data theft, espionage, or disruption of operations. The use of fake Android apps and Joker malware variants can result in financial fraud, credential theft, and persistent device compromise. Supply chain attacks via compromised tools like Trivy can undermine trust in software development and deployment pipelines, potentially affecting a wide range of enterprises and developers. The presence of multiple APT-linked domains suggests targeted espionage campaigns that could impact government, defense, technology, and critical infrastructure sectors. Although no ransomware or widespread exploits are currently reported, the evolving nature of these threats means organizations could face increased risk if these indicators are not addressed. Network-level compromise could also facilitate lateral movement and further infiltration within corporate environments.
Mitigation Recommendations
Organizations should implement targeted network defenses to block and monitor traffic to the listed malicious domains and URLs associated with the identified threat actors and malware families. Deploy and regularly update intrusion detection/prevention systems (IDS/IPS) with these IOCs to detect suspicious network activity. Conduct thorough endpoint security scans on Android devices to identify and remove fake apps and Joker malware variants. Review and harden software supply chain security by verifying the integrity of open-source tools like Trivy and monitoring for unusual commits or updates. Employ threat intelligence sharing to stay updated on evolving indicators linked to these APT groups. Implement strict application whitelisting and mobile device management (MDM) policies to control app installations on corporate devices. Enhance user awareness training focused on phishing and social engineering tactics used to distribute fake apps. Regularly audit DNS logs and network traffic for connections to suspicious domains, and isolate affected systems promptly. Finally, establish incident response plans tailored to APT and supply chain attack scenarios to minimize damage and recovery time.
Technical Details
- Uuid
- d1412427-b81f-4ad5-be0f-bb404d448aeb
- Original Timestamp
- 1774339205
Indicators of Compromise
Url
| Value | Description | Copy |
|---|---|---|
urlhttps://api.github.com/repos/stamparm/maltrail/commits/fc3d78d0db5e6d4006442ee4ae23d4c57f719fcf | apt_sidewinder | |
urlhttps://api.github.com/repos/stamparm/maltrail/commits/d5a6e55d210c3077141509cb8200294d8d9f5709 | android_fakeapp | |
urlhttps://x.com/SpiderLabs/status/2036076835889418406 | android_fakeapp | |
urlhttps://api.github.com/repos/stamparm/maltrail/commits/63e908ab0abb9fcf04c0a393485987abe1bb44ec | hacked_trivy | |
urlhttps://www.wiz.io/blog/teampcp-attack-kics-github-action | hacked_trivy | |
urlhttps://api.github.com/repos/stamparm/maltrail/commits/d4de73afbc24cd0d0b70fe788392232acb486051 | apt_kimsuky | |
urlhttps://api.github.com/repos/stamparm/maltrail/commits/77996e570aefc5688a3af37c05e9094059462cbd | android_joker | |
urlhttps://api.github.com/repos/stamparm/maltrail/commits/4c86bbe470655e943b2c95c484d943f874e440f1 | apt_unc2465 | |
urlhttps://api.github.com/repos/stamparm/maltrail/commits/f0f25f3b92bbc48018825d984d6d32ebbf333a5e | fakeapp |
Domain
| Value | Description | Copy |
|---|---|---|
domaindp.islamic-finder.org | apt_sidewinder | |
domaindisanviet.homes | android_fakeapp | |
domainitrekker.space | android_fakeapp | |
domainmoitasec.com | android_fakeapp | |
domainocngongiare.com | android_fakeapp | |
domainthcsmyxa-nd.com | android_fakeapp | |
domaintourmini.site | android_fakeapp | |
domaincheckmarx.zone | hacked_trivy | |
domainhtax-store.dns.navy | apt_kimsuky | |
domainmtnvs.dynv6.net | apt_kimsuky | |
domainn-cloud.htax-store.dns.navy | apt_kimsuky | |
domainnid-user.tax-loadoc.dns.army | apt_kimsuky | |
domainntsncorp.dynv6.net | apt_kimsuky | |
domaintax-loadoc.dns.army | apt_kimsuky | |
domainahaw.pw | android_joker | |
domainrvtoollsa.com | apt_unc2465 | |
domainrvtoollsi.com | apt_unc2465 | |
domainchromium-report-tech-31as-2s1-tc2d-h143.redticker-ctft.com | fakeapp | |
domainredticker-ctft.com | fakeapp |
Threat ID: 69c2482ff4197a8e3b034543
Added to database: 3/24/2026, 8:15:43 AM
Last enriched: 3/24/2026, 8:16:40 AM
Last updated: 3/24/2026, 9:34:49 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.