Maltrail IOC for 2026-04-05
Maltrail IOC for 2026-04-05
AI Analysis
Technical Summary
The threat is a Maltrail IOC published on April 5, 2026, representing observed malware-related network activity. It is derived from CIRCL's OSINT feed and classified with medium severity. There are no affected software versions or known exploits associated with this IOC. No patch or remediation is applicable as this is an intelligence indicator rather than a vulnerability. The IOC is shared openly under the TLP:CLEAR designation and is based on manual collection methods.
Potential Impact
The IOC indicates potential malware-related network activity but does not specify affected systems or direct exploitation. There is no evidence of active exploitation or vulnerability in software products. The impact is limited to detection and monitoring of suspicious network behavior associated with malware.
Mitigation Recommendations
No patch or direct remediation is available or applicable for this IOC. Security teams should incorporate this IOC into their detection and monitoring tools to identify potential malicious network activity. No urgent action is required beyond standard threat intelligence consumption and analysis.
Indicators of Compromise
- url: https://api.github.com/repos/stamparm/maltrail/commits/2f0b1fc42a1fecd89d4e7635153dc33a530f5621
- domain: accountsverify.kro.kr
- domain: mexc.accountsverify.kro.kr
- url: https://api.github.com/repos/stamparm/maltrail/commits/aa4fe44caa237d1d2a14fbe709f01f6e6737f6d4
- url: https://www.virustotal.com/gui/file/63d0255437c890a4b13a8e8fb02c3b3edf8f8af3bb08293026076bfe626ef4df/detection
- domain: crest-ind-snake-dublin.trycloudflare.com
- url: https://api.github.com/repos/stamparm/maltrail/commits/0cbc208db61517bc05b101442659fb5ac6db194e
- domain: coptu.help
- domain: ichilaf.xin
- domain: spere.yoga
- url: https://api.github.com/repos/stamparm/maltrail/commits/8d24cec06c81874bcc7a59c3fda882b3f6817f89
- url: https://x.com/RacWatchin8872/status/2040580434363314252
- domain: corp-embassy-finds-marked.trycloudflare.com
- domain: depot-reunion-listings-targets.trycloudflare.com
- domain: extended-king-tone-polar.trycloudflare.com
- domain: icq-flooring-procedure-rap.trycloudflare.com
- domain: imported-spread-amplifier-chemicals.trycloudflare.com
- domain: kde-blink-buried-flower.trycloudflare.com
- domain: might-tribute-christina-vacuum.trycloudflare.com
- domain: terminal-labels-fan-witness.trycloudflare.com
- domain: zonasteni.com
- url: https://api.github.com/repos/stamparm/maltrail/commits/61ea5d5e4964880e96263a06d0874e2ed5056a71
- domain: stuffcabbage.in.net
- domain: bkg-srvcs.com
- domain: healgesty0-arvchecbkg.com
- domain: period-checkavaldx.com
- domain: srvcs-bkg.com
- domain: verification-booking-center.com
- url: https://api.github.com/repos/stamparm/maltrail/commits/8ac6974122549dd9a5033a0f5285c80dfee10275
- domain: cat-ar-no.com
- domain: cp-exc-a.com
- domain: ct-pl-ar-ex.com
- domain: pl-ar-exc.com
- url: https://api.github.com/repos/stamparm/maltrail/commits/a4e4d7361a5885366f3ebf093761b9c12dbbf6c7
- domain: authoritykittens.info
- domain: pancamera.space
- domain: spadedevelopment.info
- domain: steamhouses.cfd
- url: https://api.github.com/repos/stamparm/maltrail/commits/4376f5dd32c130294e429e2adaf6f9c5b00f7632
- url: https://www.virustotal.com/gui/file/9714272c145f2756b257ebe574a7d84f1ae476897ed42cae28d31ee4f4354dae/detection
- ip: 18.227.111.207
- url: https://api.github.com/repos/stamparm/maltrail/commits/abe4f2a3a6808fcd5accfd2a0145464814713d73
- url: https://www.virustotal.com/gui/file/01d39d0490dd99ce4a010ac30e12818cfac2c81cace512c95e5ea9dccb1da165/detection
- ip: 65.19.178.79
- url: https://api.github.com/repos/stamparm/maltrail/commits/3e448852bcebec565c6660aa6eb41c19230781ae
- url: https://x.com/smica83/status/2040698155428143449
- domain: charger-van-feb-circuit.trycloudflare.com
- url: https://api.github.com/repos/stamparm/maltrail/commits/7a2c512b22eee0c7364c7e91d89e58e991055f13
- domain: yolimor.com
- url: https://api.github.com/repos/stamparm/maltrail/commits/9566a278b46c557b75bafc734b2c4107c31063c8
- domain: pertur.cyou
- url: https://api.github.com/repos/stamparm/maltrail/commits/6c922a5e1fc88929f6d23d8453d752b180df1113
- domain: api.bestextensionokusan.icu
- domain: api.extension-12dq.lat
- domain: api.extension-studio.lat
- domain: api.extension.icu
- domain: api.extensionanalytics.top
- domain: api.extensionanalyticscenter.top
- domain: api.extensionanalyticspro.top
- domain: api.extensioncentre.top
- domain: api.getextensionanalytics.top
- domain: api.manusai.buzz
- domain: api.meetingextension.icu
- domain: api.proffesionalextension-afkf.top
- domain: api.sightextension.top
- domain: api.slerok.top
- domain: api.webextensionanalytics.top
- domain: cpanel.372893892382932v4k4s1m0n3.xyz
- domain: cpcontacts.372893892382932v4k4s1m0n3.xyz
- domain: en.372893892382932v4k4s1m0n3.xyz
- domain: mb66.baby
- domain: new.372893892382932v4k4s1m0n3.xyz
- domain: ns.372893892382932v4k4s1m0n3.xyz
- domain: printreadydocument.com
- domain: root.372893892382932v4k4s1m0n3.xyz
- domain: rozcar.com
- domain: site-scan.top
- domain: sitemap.372893892382932v4k4s1m0n3.xyz
- domain: webextensionanalytics.top
- domain: wuxiyut.com
- domain: a3.tq-whatsapp.hl.cn
- domain: ci.hbr-whatsapp.hl.cn
- domain: cp.iln-whatsapp.hl.cn
- domain: d7.ort-whatsapp.hl.cn
- domain: ez.onlineapp-net-hk-whatsapp.com.cn
- domain: fp.fnp-whatsapp.com.cn
- domain: ia.k6-hk-whatsapp.com.cn
- domain: k6-hk-whatsapp.com.cn
- domain: od.apps-l-m-whatsapp.hl.cn
- domain: s2.web-cn-j-l-whatsapp.hl.cn
- domain: sg.web-cn-q-s-whatsapp.hl.cn
- domain: tq-whatsapp.hl.cn
- domain: wss-dvqtr-whatsapp.com.cn
- domain: wss-mqrvt-whatsapp.com.cn
- domain: wss-tqzlp-whatsapp.com.cn
- domain: wss-vtxqa-whatsapp.com.cn
- url: https://api.github.com/repos/stamparm/maltrail/commits/fba9a66807c3be2f2207dae47b1e86107b06bff5
- domain: fastdownloaddata.com
- domain: geekbrainload.com
- domain: project-stor51092.pages.dev
- url: https://api.github.com/repos/stamparm/maltrail/commits/896c0b6f26f2b86805db351fa5a0c73757926dfd
- domain: bazanddar.icu
- url: https://api.github.com/repos/stamparm/maltrail/commits/0ad39518895ef1077889c7bfc7ca45e229096df0
- domain: denpi.org
Maltrail IOC for 2026-04-05
Description
Maltrail IOC for 2026-04-05
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The threat is a Maltrail IOC published on April 5, 2026, representing observed malware-related network activity. It is derived from CIRCL's OSINT feed and classified with medium severity. There are no affected software versions or known exploits associated with this IOC. No patch or remediation is applicable as this is an intelligence indicator rather than a vulnerability. The IOC is shared openly under the TLP:CLEAR designation and is based on manual collection methods.
Potential Impact
The IOC indicates potential malware-related network activity but does not specify affected systems or direct exploitation. There is no evidence of active exploitation or vulnerability in software products. The impact is limited to detection and monitoring of suspicious network behavior associated with malware.
Mitigation Recommendations
No patch or direct remediation is available or applicable for this IOC. Security teams should incorporate this IOC into their detection and monitoring tools to identify potential malicious network activity. No urgent action is required beyond standard threat intelligence consumption and analysis.
Technical Details
- Uuid
- 4fe01c50-d249-4c4e-a5c7-624aaa0c173b
- Original Timestamp
- 1775401215
Indicators of Compromise
Url
| Value | Description | Copy |
|---|---|---|
urlhttps://api.github.com/repos/stamparm/maltrail/commits/2f0b1fc42a1fecd89d4e7635153dc33a530f5621 | apt_kimsuky | |
urlhttps://api.github.com/repos/stamparm/maltrail/commits/aa4fe44caa237d1d2a14fbe709f01f6e6737f6d4 | generic | |
urlhttps://www.virustotal.com/gui/file/63d0255437c890a4b13a8e8fb02c3b3edf8f8af3bb08293026076bfe626ef4df/detection | generic | |
urlhttps://api.github.com/repos/stamparm/maltrail/commits/0cbc208db61517bc05b101442659fb5ac6db194e | android_joker | |
urlhttps://api.github.com/repos/stamparm/maltrail/commits/8d24cec06c81874bcc7a59c3fda882b3f6817f89 | tsundere | |
urlhttps://x.com/RacWatchin8872/status/2040580434363314252 | tsundere | |
urlhttps://api.github.com/repos/stamparm/maltrail/commits/61ea5d5e4964880e96263a06d0874e2ed5056a71 | ek_clearfake | |
urlhttps://api.github.com/repos/stamparm/maltrail/commits/8ac6974122549dd9a5033a0f5285c80dfee10275 | android_promptspy | |
urlhttps://api.github.com/repos/stamparm/maltrail/commits/a4e4d7361a5885366f3ebf093761b9c12dbbf6c7 | offloader | |
urlhttps://api.github.com/repos/stamparm/maltrail/commits/4376f5dd32c130294e429e2adaf6f9c5b00f7632 | elf_sshdoor | |
urlhttps://www.virustotal.com/gui/file/9714272c145f2756b257ebe574a7d84f1ae476897ed42cae28d31ee4f4354dae/detection | elf_sshdoor | |
urlhttps://api.github.com/repos/stamparm/maltrail/commits/abe4f2a3a6808fcd5accfd2a0145464814713d73 | xworm | |
urlhttps://www.virustotal.com/gui/file/01d39d0490dd99ce4a010ac30e12818cfac2c81cace512c95e5ea9dccb1da165/detection | xworm | |
urlhttps://api.github.com/repos/stamparm/maltrail/commits/3e448852bcebec565c6660aa6eb41c19230781ae | generic | |
urlhttps://x.com/smica83/status/2040698155428143449 | generic | |
urlhttps://api.github.com/repos/stamparm/maltrail/commits/7a2c512b22eee0c7364c7e91d89e58e991055f13 | microstealer | |
urlhttps://api.github.com/repos/stamparm/maltrail/commits/9566a278b46c557b75bafc734b2c4107c31063c8 | lummac2 | |
urlhttps://api.github.com/repos/stamparm/maltrail/commits/6c922a5e1fc88929f6d23d8453d752b180df1113 | fakeapp | |
urlhttps://api.github.com/repos/stamparm/maltrail/commits/fba9a66807c3be2f2207dae47b1e86107b06bff5 | osx_atomic | |
urlhttps://api.github.com/repos/stamparm/maltrail/commits/896c0b6f26f2b86805db351fa5a0c73757926dfd | vidar | |
urlhttps://api.github.com/repos/stamparm/maltrail/commits/0ad39518895ef1077889c7bfc7ca45e229096df0 | hak5cloud_c2 |
Domain
| Value | Description | Copy |
|---|---|---|
domainaccountsverify.kro.kr | apt_kimsuky | |
domainmexc.accountsverify.kro.kr | apt_kimsuky | |
domaincrest-ind-snake-dublin.trycloudflare.com | generic | |
domaincoptu.help | android_joker | |
domainichilaf.xin | android_joker | |
domainspere.yoga | android_joker | |
domaincorp-embassy-finds-marked.trycloudflare.com | tsundere | |
domaindepot-reunion-listings-targets.trycloudflare.com | tsundere | |
domainextended-king-tone-polar.trycloudflare.com | tsundere | |
domainicq-flooring-procedure-rap.trycloudflare.com | tsundere | |
domainimported-spread-amplifier-chemicals.trycloudflare.com | tsundere | |
domainkde-blink-buried-flower.trycloudflare.com | tsundere | |
domainmight-tribute-christina-vacuum.trycloudflare.com | tsundere | |
domainterminal-labels-fan-witness.trycloudflare.com | tsundere | |
domainzonasteni.com | tsundere | |
domainstuffcabbage.in.net | ek_clearfake | |
domainbkg-srvcs.com | ek_clearfake | |
domainhealgesty0-arvchecbkg.com | ek_clearfake | |
domainperiod-checkavaldx.com | ek_clearfake | |
domainsrvcs-bkg.com | ek_clearfake | |
domainverification-booking-center.com | ek_clearfake | |
domaincat-ar-no.com | android_promptspy | |
domaincp-exc-a.com | android_promptspy | |
domainct-pl-ar-ex.com | android_promptspy | |
domainpl-ar-exc.com | android_promptspy | |
domainauthoritykittens.info | offloader | |
domainpancamera.space | offloader | |
domainspadedevelopment.info | offloader | |
domainsteamhouses.cfd | offloader | |
domaincharger-van-feb-circuit.trycloudflare.com | generic | |
domainyolimor.com | microstealer | |
domainpertur.cyou | lummac2 | |
domainapi.bestextensionokusan.icu | fakeapp | |
domainapi.extension-12dq.lat | fakeapp | |
domainapi.extension-studio.lat | fakeapp | |
domainapi.extension.icu | fakeapp | |
domainapi.extensionanalytics.top | fakeapp | |
domainapi.extensionanalyticscenter.top | fakeapp | |
domainapi.extensionanalyticspro.top | fakeapp | |
domainapi.extensioncentre.top | fakeapp | |
domainapi.getextensionanalytics.top | fakeapp | |
domainapi.manusai.buzz | fakeapp | |
domainapi.meetingextension.icu | fakeapp | |
domainapi.proffesionalextension-afkf.top | fakeapp | |
domainapi.sightextension.top | fakeapp | |
domainapi.slerok.top | fakeapp | |
domainapi.webextensionanalytics.top | fakeapp | |
domaincpanel.372893892382932v4k4s1m0n3.xyz | fakeapp | |
domaincpcontacts.372893892382932v4k4s1m0n3.xyz | fakeapp | |
domainen.372893892382932v4k4s1m0n3.xyz | fakeapp | |
domainmb66.baby | fakeapp | |
domainnew.372893892382932v4k4s1m0n3.xyz | fakeapp | |
domainns.372893892382932v4k4s1m0n3.xyz | fakeapp | |
domainprintreadydocument.com | fakeapp | |
domainroot.372893892382932v4k4s1m0n3.xyz | fakeapp | |
domainrozcar.com | fakeapp | |
domainsite-scan.top | fakeapp | |
domainsitemap.372893892382932v4k4s1m0n3.xyz | fakeapp | |
domainwebextensionanalytics.top | fakeapp | |
domainwuxiyut.com | fakeapp | |
domaina3.tq-whatsapp.hl.cn | fakeapp | |
domainci.hbr-whatsapp.hl.cn | fakeapp | |
domaincp.iln-whatsapp.hl.cn | fakeapp | |
domaind7.ort-whatsapp.hl.cn | fakeapp | |
domainez.onlineapp-net-hk-whatsapp.com.cn | fakeapp | |
domainfp.fnp-whatsapp.com.cn | fakeapp | |
domainia.k6-hk-whatsapp.com.cn | fakeapp | |
domaink6-hk-whatsapp.com.cn | fakeapp | |
domainod.apps-l-m-whatsapp.hl.cn | fakeapp | |
domains2.web-cn-j-l-whatsapp.hl.cn | fakeapp | |
domainsg.web-cn-q-s-whatsapp.hl.cn | fakeapp | |
domaintq-whatsapp.hl.cn | fakeapp | |
domainwss-dvqtr-whatsapp.com.cn | fakeapp | |
domainwss-mqrvt-whatsapp.com.cn | fakeapp | |
domainwss-tqzlp-whatsapp.com.cn | fakeapp | |
domainwss-vtxqa-whatsapp.com.cn | fakeapp | |
domainfastdownloaddata.com | osx_atomic | |
domaingeekbrainload.com | osx_atomic | |
domainproject-stor51092.pages.dev | osx_atomic | |
domainbazanddar.icu | vidar | |
domaindenpi.org | hak5cloud_c2 |
Ip
| Value | Description | Copy |
|---|---|---|
ip18.227.111.207 | elf_sshdoor | |
ip65.19.178.79 | xworm |
Threat ID: 69d27c8a0a160ebd92e1bfb2
Added to database: 4/5/2026, 3:15:22 PM
Last enriched: 4/5/2026, 3:30:29 PM
Last updated: 4/6/2026, 5:42:03 AM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.