Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Maltrail IOC for 2026-04-09

0
Medium
Published: Wed Apr 08 2026 (04/08/2026, 00:00:00 UTC)
Source: CIRCL OSINT Feed
Vendor/Project: tlp
Product: clear

Description

Maltrail IOC for 2026-04-09

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/09/2026, 10:50:43 UTC

Technical Analysis

The report details a malware-related IOC identified by Maltrail on 2026-04-09, shared via the CIRCL OSINT Feed. It represents an observation of suspicious network activity associated with malware but lacks detailed technical indicators or affected product versions. No patches or fixes are applicable as this is an intelligence observation rather than a vulnerability. No known active exploitation has been reported.

Potential Impact

The impact is currently limited to the identification of potential malware-related network activity. Without specific exploit details or affected software versions, the direct operational impact cannot be determined. There are no known active exploits or patches, indicating this is primarily an intelligence observation to aid detection and response.

Mitigation Recommendations

No patch or official remediation is available or applicable. Security teams should consider this IOC as part of their threat detection and monitoring efforts. Since this is an OSINT observation without actionable exploit details, no urgent remediation steps are indicated.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Uuid
71dd1c3a-650d-4941-a6c8-3de925ff4b0a
Original Timestamp
1775728811

Indicators of Compromise

Url

ValueDescriptionCopy
urlhttps://api.github.com/repos/stamparm/maltrail/commits/728888fe49f07e25e9e3f235ded6dc3e08f0f139
santa
urlhttps://api.github.com/repos/stamparm/maltrail/commits/37bb6b943faebf0d0928ecffff2004d8d0061ea9
microstealer
urlhttps://api.github.com/repos/stamparm/maltrail/commits/b97cb52172f90087e9dbb050b04c978009493c79
adaptix_c2
urlhttps://api.github.com/repos/stamparm/maltrail/commits/e81ce6e95774c5a9456bbee87c6123dd1c1aa81c
magentocore
urlhttps://api.github.com/repos/stamparm/maltrail/commits/02634ed079d60945284d017abbd21a552cd29c26
lummac2
urlhttps://api.github.com/repos/stamparm/maltrail/commits/119552bc9177afd70ad81487b78c6f3bf70a6710
osx_phexiabot
urlhttps://x.com/suyog41/status/2042137501700387187
osx_phexiabot
urlhttps://www.virustotal.com/gui/file/46e3ec397c74081b824890953703c89401ae04cd3050a3dbba90cfae094b5ae9/detection
osx_phexiabot
urlhttps://api.github.com/repos/stamparm/maltrail/commits/c7c7d146cf127af9f21a41ea86221e4d545f52c9
exoticc2
urlhttps://x.com/whoamix302/status/2041989408052932778
exoticc2
urlhttps://www.virustotal.com/gui/file/00ce7fc45c34db6ff44729747ede6b98181cd58d21afdde026b7c6242e5a5c41/detection
exoticc2
urlhttps://www.virustotal.com/gui/file/7143db3df2c9ec44dd58a59db506bab3c43f89886076531e6da33f3d8f39ac98/detection
exoticc2
urlhttps://www.virustotal.com/gui/file/a0d025c33f7700b0045806001ab7e2bd79081e4343f8eaf9137fcf84826d202f/detection
exoticc2
urlhttps://www.virustotal.com/gui/file/b4301e56438cf5f8b9db2f3fa1c7e45f5e82d272dd9d16d7ad2bdabb1dee2dc7/detection
exoticc2
urlhttps://api.github.com/repos/stamparm/maltrail/commits/90a296413f3c1914d3e26997fc98781fc0a5e070
archangelc2
urlhttps://x.com/whoamix302/status/2042109394100650125
archangelc2
urlhttps://api.github.com/repos/stamparm/maltrail/commits/02ac0a6d55b1989b3bed225d41017d6924d8ef73
connectwise
urlhttps://www.virustotal.com/gui/file/8b1ccf257b2891f5423220867479c2fc6b3e221dc407a887ddf30269da8e6967/detection
connectwise
urlhttps://api.github.com/repos/stamparm/maltrail/commits/e52d35268ad7283dcbf589632d03755a94b96b0d
krimec2
urlhttps://x.com/whoamix302/status/2041988310718148990
krimec2
urlhttps://www.virustotal.com/gui/file/8392231fe058d5fc9f201d2ca57e92a56cbc9348da253ed6ff6eb22863b61c8d/detection
krimec2
urlhttps://api.github.com/repos/stamparm/maltrail/commits/ff76c0f241b22bcc5b48180efb947cffa35c0847
apt_kimsuky

Domain

ValueDescriptionCopy
domainworld-new-iope.cc
santa
domainvolimor.com
microstealer
domainapp.rustture.cc
adaptix_c2
domaingatuso.duckdns.org
adaptix_c2
domainvmail.wiki
magentocore
domainshootr.cyou
lummac2
domainnoto.space
osx_phexiabot
domainnotospace.com
osx_phexiabot
domaindocs.noto.space
osx_phexiabot
domain0x-team.sbs
krimec2
domainfemboychik.shop
krimec2
domainfgltl.ru
krimec2
domainmscteam.live
krimec2
domaind1.0x-team.sbs
krimec2
domainfemboy.mscteam.live
krimec2
domainhb.mscteam.live
krimec2
domainlab.0x-team.sbs
krimec2
domainmergen.fgltl.ru
krimec2
domainsrv-de-ffm-24.0x-team.sbs
krimec2
domaincode.srv-de-ffm-24.0x-team.sbs
krimec2
domainauction.dynv6.net
apt_kimsuky
domainstore.auction.dynv6.net
apt_kimsuky

Ip

ValueDescriptionCopy
ip91.208.197.241
exoticc2
ip45.88.186.147
archangelc2
ip144.31.165.210
krimec2
ip144.31.165.219
krimec2
ip193.58.122.24
krimec2

Threat ID: 69d780fb1cc7ad14da9b68aa

Added to database: 4/9/2026, 10:35:39 AM

Last enriched: 4/9/2026, 10:50:43 AM

Last updated: 4/9/2026, 6:12:29 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses