Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Maltrail IOC for 2026-03-24

0
Medium
Published: Tue Mar 24 2026 (03/24/2026, 00:00:00 UTC)
Source: CIRCL OSINT Feed
Vendor/Project: tlp
Product: clear

Description

Maltrail IOC for 2026-03-24

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 08:16:40 UTC

Technical Analysis

This Maltrail IOC report dated 2026-03-24 compiles a set of indicators related to various malware and APT campaigns, primarily focusing on network activity and OSINT-derived threat intelligence. The report includes URLs and domains tied to multiple threat actors and malware families, such as APT Sidewinder, APT Kimsuky, UNC2465, Android Joker malware, and fake Android applications. These indicators represent command and control (C2) servers, phishing domains, and compromised infrastructure used for malware distribution or control. Notably, the report references compromised open-source tools like Trivy, which have been targeted by threat actors to insert malicious code, indicating supply chain attack vectors. The absence of CVEs or patches suggests these are not newly discovered software vulnerabilities but rather active malicious infrastructure and malware campaigns. The threat intelligence is derived from manual OSINT collection and external analysis, emphasizing network-level detection and blocking. While no active exploits or ransomware campaigns are currently known, the presence of multiple APT-linked domains and URLs indicates persistent targeting of organizations, especially those with Android device usage or reliance on open-source security tools. The medium severity rating reflects the moderate risk posed by these indicators, which require proactive monitoring and mitigation to prevent infection or data exfiltration.

Potential Impact

The potential impact of this threat is significant for organizations worldwide, particularly those with Android device ecosystems, software supply chains involving open-source tools, or exposure to targeted APT campaigns. Successful exploitation or infection could lead to unauthorized access, data theft, espionage, or disruption of operations. The use of fake Android apps and Joker malware variants can result in financial fraud, credential theft, and persistent device compromise. Supply chain attacks via compromised tools like Trivy can undermine trust in software development and deployment pipelines, potentially affecting a wide range of enterprises and developers. The presence of multiple APT-linked domains suggests targeted espionage campaigns that could impact government, defense, technology, and critical infrastructure sectors. Although no ransomware or widespread exploits are currently reported, the evolving nature of these threats means organizations could face increased risk if these indicators are not addressed. Network-level compromise could also facilitate lateral movement and further infiltration within corporate environments.

Mitigation Recommendations

Organizations should implement targeted network defenses to block and monitor traffic to the listed malicious domains and URLs associated with the identified threat actors and malware families. Deploy and regularly update intrusion detection/prevention systems (IDS/IPS) with these IOCs to detect suspicious network activity. Conduct thorough endpoint security scans on Android devices to identify and remove fake apps and Joker malware variants. Review and harden software supply chain security by verifying the integrity of open-source tools like Trivy and monitoring for unusual commits or updates. Employ threat intelligence sharing to stay updated on evolving indicators linked to these APT groups. Implement strict application whitelisting and mobile device management (MDM) policies to control app installations on corporate devices. Enhance user awareness training focused on phishing and social engineering tactics used to distribute fake apps. Regularly audit DNS logs and network traffic for connections to suspicious domains, and isolate affected systems promptly. Finally, establish incident response plans tailored to APT and supply chain attack scenarios to minimize damage and recovery time.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Uuid
d1412427-b81f-4ad5-be0f-bb404d448aeb
Original Timestamp
1774339205

Indicators of Compromise

Url

ValueDescriptionCopy
urlhttps://api.github.com/repos/stamparm/maltrail/commits/fc3d78d0db5e6d4006442ee4ae23d4c57f719fcf
apt_sidewinder
urlhttps://api.github.com/repos/stamparm/maltrail/commits/d5a6e55d210c3077141509cb8200294d8d9f5709
android_fakeapp
urlhttps://x.com/SpiderLabs/status/2036076835889418406
android_fakeapp
urlhttps://api.github.com/repos/stamparm/maltrail/commits/63e908ab0abb9fcf04c0a393485987abe1bb44ec
hacked_trivy
urlhttps://www.wiz.io/blog/teampcp-attack-kics-github-action
hacked_trivy
urlhttps://api.github.com/repos/stamparm/maltrail/commits/d4de73afbc24cd0d0b70fe788392232acb486051
apt_kimsuky
urlhttps://api.github.com/repos/stamparm/maltrail/commits/77996e570aefc5688a3af37c05e9094059462cbd
android_joker
urlhttps://api.github.com/repos/stamparm/maltrail/commits/4c86bbe470655e943b2c95c484d943f874e440f1
apt_unc2465
urlhttps://api.github.com/repos/stamparm/maltrail/commits/f0f25f3b92bbc48018825d984d6d32ebbf333a5e
fakeapp

Domain

ValueDescriptionCopy
domaindp.islamic-finder.org
apt_sidewinder
domaindisanviet.homes
android_fakeapp
domainitrekker.space
android_fakeapp
domainmoitasec.com
android_fakeapp
domainocngongiare.com
android_fakeapp
domainthcsmyxa-nd.com
android_fakeapp
domaintourmini.site
android_fakeapp
domaincheckmarx.zone
hacked_trivy
domainhtax-store.dns.navy
apt_kimsuky
domainmtnvs.dynv6.net
apt_kimsuky
domainn-cloud.htax-store.dns.navy
apt_kimsuky
domainnid-user.tax-loadoc.dns.army
apt_kimsuky
domainntsncorp.dynv6.net
apt_kimsuky
domaintax-loadoc.dns.army
apt_kimsuky
domainahaw.pw
android_joker
domainrvtoollsa.com
apt_unc2465
domainrvtoollsi.com
apt_unc2465
domainchromium-report-tech-31as-2s1-tc2d-h143.redticker-ctft.com
fakeapp
domainredticker-ctft.com
fakeapp

Threat ID: 69c2482ff4197a8e3b034543

Added to database: 3/24/2026, 8:15:43 AM

Last enriched: 3/24/2026, 8:16:40 AM

Last updated: 3/24/2026, 9:34:49 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses