Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Maltrail IOC for 2026-04-03

0
Medium
Published: Thu Apr 02 2026 (04/02/2026, 00:00:00 UTC)
Source: CIRCL OSINT Feed
Vendor/Project: tlp
Product: clear

Description

Maltrail IOC for 2026-04-03

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/03/2026, 22:30:30 UTC

Technical Analysis

The threat is a Maltrail IOC published on April 3, 2026, representing observed malware-related network activity. It is derived from CIRCL's OSINT feed and tagged with medium threat level. There are no details on affected software versions or known exploits. No patch or remediation is available or applicable since this is an IOC rather than a vulnerability in software.

Potential Impact

The impact is assessed as medium risk based on the source classification. Since this is an IOC related to malware network activity, it indicates potential malicious activity detection but does not specify direct exploitation or system compromise details. No known active exploitation or vulnerabilities are reported.

Mitigation Recommendations

No patch or official remediation is available or required for this IOC. Security teams should incorporate the IOC into their detection and monitoring tools as appropriate. No urgent action is mandated beyond standard threat intelligence integration.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Uuid
7c9cc102-0241-4810-91fc-34953d8be409
Original Timestamp
1775228409

Indicators of Compromise

Url

ValueDescriptionCopy
urlhttps://api.github.com/repos/stamparm/maltrail/commits/cdf98a4638dce0b56fdf1ab69fd8e270a00cb862
apt_lazarus
urlhttps://opensourcemalware.com/blog/tasksjacker-blog-post
apt_lazarus
urlhttps://api.github.com/repos/stamparm/maltrail/commits/76bf59799f5be5e8e6f04eb465ee1b0598883e11
generic
urlhttps://api.github.com/repos/stamparm/maltrail/commits/043a1201433bdcba5eb5a19ba239a9561b95690a
osx_atomic
urlhttps://api.github.com/repos/stamparm/maltrail/commits/b92474bbc1a0b566bbd9acbb25f69218bc070ccd
generic
urlhttps://x.com/smica83/status/2039666296661389803
generic
urlhttps://api.github.com/repos/stamparm/maltrail/commits/483a8e352461aa03e63f999488803175b970c19d
apt_sidewinder
urlhttps://x.com/volrant136/status/2039761718969315508
apt_sidewinder
urlhttps://api.github.com/repos/stamparm/maltrail/commits/3ba54102e6afbf80ef45d7096b14694a8b6810f6
nexus
urlmhttps://x.com/banthisguy9349/status/2039883992925904970
nexus
urlhttps://api.github.com/repos/stamparm/maltrail/commits/b4c3bbf6c58fbc8996fb674f3d301bc4b5ef0c17
osx_atomic
urlhttps://objective-see.org/blog/blog_0x88.html
osx_atomic

Domain

ValueDescriptionCopy
domain260120.vercel.app
apt_lazarus
domainalanservice.vercel.app
apt_lazarus
domaindefault-configuration.vercel.app
apt_lazarus
domainfelixpools.vercel.app
apt_lazarus
domaingeorgeservice77.vercel.app
apt_lazarus
domainjameslack.vercel.app
apt_lazarus
domainvscode-settings-tasks-json.vercel.app
apt_lazarus
domainvscodesetting-task.vercel.app
apt_lazarus
domaincontracts-thoroughly-reaching-graphic.trycloudflare.com
generic
domainroger-conditioning-thriller-forms.trycloudflare.com
generic
domainsubaru-rod-titled-minolta.trycloudflare.com
generic
domainmoohsnot.top
osx_atomic
domainold-entire-sequences-reactions.trycloudflare.com
generic
domainzimbramail-nayatel-com.zeabur.app
apt_sidewinder
domainmac-force.squarespace.com
osx_atomic

Ip

ValueDescriptionCopy
ip159.203.95.70
nexus

Threat ID: 69d03bf90a160ebd92602460

Added to database: 4/3/2026, 10:15:21 PM

Last enriched: 4/3/2026, 10:30:30 PM

Last updated: 4/4/2026, 7:11:16 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses