Maltrail IOC for 2026-04-15
Maltrail IOC for 2026-04-15
AI Analysis
Technical Summary
The report details a Maltrail IOC for malware-related network activity identified on April 15, 2026. It is derived from the CIRCL OSINT Feed and tagged with medium severity. There are no affected software versions or known exploits associated with this IOC. The data represents an observation of potential malicious network behavior rather than a software vulnerability or exploit. No technical indicators or actionable patches are included.
Potential Impact
The impact is limited to the detection of potentially malicious network activity as indicated by the IOC. There is no evidence of active exploitation or direct compromise of software or systems. This IOC serves as a detection and monitoring artifact rather than a vulnerability that can be exploited.
Mitigation Recommendations
No patch or official remediation is available or required for this IOC. Security teams should use this IOC to enhance detection capabilities within their network monitoring tools. No urgent action is mandated beyond integrating the IOC into threat intelligence and monitoring systems.
Indicators of Compromise
- url: https://api.github.com/repos/stamparm/maltrail/commits/5defd12470b657858d84889044a5a01005390c68
- url: https://x.com/RedDrip7/status/2044239571370815802
- url: https://www.virustotal.com/gui/file/31e812704e41e7e779d96a553500d45409d4b46c7f1007af2ba042407d562b1d/detection
- ip: 152.32.144.5
- url: https://api.github.com/repos/stamparm/maltrail/commits/b167f68b155108195b7d2ad05195ed974f7905d0
- ip: 101.96.200.5
- url: https://api.github.com/repos/stamparm/maltrail/commits/6d69e6c1c2f4e14ba1ac6950a530d315a99d590a
- url: https://x.com/Fact_Finder03/status/2044293562721075686
- ip: 188.214.144.18
- ip: 45.154.98.217
- domain: mon-espace-colis.com
- domain: relaisdelacommanderie.com
- domain: saxudou.pro
- url: https://api.github.com/repos/stamparm/maltrail/commits/cee23e3cbd30bc61290dc5e08777472af61859fc
- url: https://www.virustotal.com/gui/file/0df73efae0aa434ef3ddee8230e0f9ade11e68f250e9c2491408439f96588bab/detection
- domain: school-kids.space
- domain: lmfao.school-kids.space
- url: https://api.github.com/repos/stamparm/maltrail/commits/0fd12be0814d871c14ed7c47f56bf11f53e6c95b
- url: https://x.com/Fact_Finder03/status/2044297770341937339
- ip: 141.147.45.169
- url: https://api.github.com/repos/stamparm/maltrail/commits/0744c65509f4286504e0a73e9fed5a28d3f0cba2
- url: https://github.com/hagezi/dns-blocklists/issues/9791
- domain: cloudapi.stream
- domain: top.rodeo
- domain: api.cloudapi.stream
- domain: cdn.cloudapi.stream
- domain: chat.cloudapi.stream
- domain: coin-miner.cloudapi.stream
- domain: crm.cloudapi.stream
- domain: gamewss.cloudapi.stream
- domain: goldminer.cloudapi.stream
- domain: herculessportslegend.cloudapi.stream
- domain: metal.cloudapi.stream
- domain: mines.cloudapi.stream
- domain: multiaccount.cloudapi.stream
- domain: tg.cloudapi.stream
- domain: topup.cloudapi.stream
- domain: wheel.cloudapi.stream
- url: https://api.github.com/repos/stamparm/maltrail/commits/874ec144ee704d733445ef0f2d4504617e72beaf
- url: https://github.com/hagezi/dns-blocklists/issues/9785
- domain: universalminecrafttool.com
Maltrail IOC for 2026-04-15
Description
Maltrail IOC for 2026-04-15
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The report details a Maltrail IOC for malware-related network activity identified on April 15, 2026. It is derived from the CIRCL OSINT Feed and tagged with medium severity. There are no affected software versions or known exploits associated with this IOC. The data represents an observation of potential malicious network behavior rather than a software vulnerability or exploit. No technical indicators or actionable patches are included.
Potential Impact
The impact is limited to the detection of potentially malicious network activity as indicated by the IOC. There is no evidence of active exploitation or direct compromise of software or systems. This IOC serves as a detection and monitoring artifact rather than a vulnerability that can be exploited.
Mitigation Recommendations
No patch or official remediation is available or required for this IOC. Security teams should use this IOC to enhance detection capabilities within their network monitoring tools. No urgent action is mandated beyond integrating the IOC into threat intelligence and monitoring systems.
Technical Details
- Uuid
- e1b629a9-1476-4830-a5ee-83b601e05ff3
- Original Timestamp
- 1776240012
Indicators of Compromise
Url
| Value | Description | Copy |
|---|---|---|
urlhttps://api.github.com/repos/stamparm/maltrail/commits/5defd12470b657858d84889044a5a01005390c68 | apt_oceanlotus | |
urlhttps://x.com/RedDrip7/status/2044239571370815802 | apt_oceanlotus | |
urlhttps://www.virustotal.com/gui/file/31e812704e41e7e779d96a553500d45409d4b46c7f1007af2ba042407d562b1d/detection | apt_oceanlotus | |
urlhttps://api.github.com/repos/stamparm/maltrail/commits/b167f68b155108195b7d2ad05195ed974f7905d0 | cyberstrikeai | |
urlhttps://api.github.com/repos/stamparm/maltrail/commits/6d69e6c1c2f4e14ba1ac6950a530d315a99d590a | cursebot | |
urlhttps://x.com/Fact_Finder03/status/2044293562721075686 | cursebot | |
urlhttps://api.github.com/repos/stamparm/maltrail/commits/cee23e3cbd30bc61290dc5e08777472af61859fc | elf_mirai | |
urlhttps://www.virustotal.com/gui/file/0df73efae0aa434ef3ddee8230e0f9ade11e68f250e9c2491408439f96588bab/detection | elf_mirai | |
urlhttps://api.github.com/repos/stamparm/maltrail/commits/0fd12be0814d871c14ed7c47f56bf11f53e6c95b | c2_panel | |
urlhttps://x.com/Fact_Finder03/status/2044297770341937339 | c2_panel | |
urlhttps://api.github.com/repos/stamparm/maltrail/commits/0744c65509f4286504e0a73e9fed5a28d3f0cba2 | fakeapp | |
urlhttps://github.com/hagezi/dns-blocklists/issues/9791 | fakeapp | |
urlhttps://api.github.com/repos/stamparm/maltrail/commits/874ec144ee704d733445ef0f2d4504617e72beaf | whitelist | |
urlhttps://github.com/hagezi/dns-blocklists/issues/9785 | whitelist |
Ip
| Value | Description | Copy |
|---|---|---|
ip152.32.144.5 | apt_oceanlotus | |
ip101.96.200.5 | cyberstrikeai | |
ip188.214.144.18 | cursebot | |
ip45.154.98.217 | cursebot | |
ip141.147.45.169 | c2_panel |
Domain
| Value | Description | Copy |
|---|---|---|
domainmon-espace-colis.com | cursebot | |
domainrelaisdelacommanderie.com | cursebot | |
domainsaxudou.pro | cursebot | |
domainschool-kids.space | elf_mirai | |
domainlmfao.school-kids.space | elf_mirai | |
domaincloudapi.stream | fakeapp | |
domaintop.rodeo | fakeapp | |
domainapi.cloudapi.stream | fakeapp | |
domaincdn.cloudapi.stream | fakeapp | |
domainchat.cloudapi.stream | fakeapp | |
domaincoin-miner.cloudapi.stream | fakeapp | |
domaincrm.cloudapi.stream | fakeapp | |
domaingamewss.cloudapi.stream | fakeapp | |
domaingoldminer.cloudapi.stream | fakeapp | |
domainherculessportslegend.cloudapi.stream | fakeapp | |
domainmetal.cloudapi.stream | fakeapp | |
domainmines.cloudapi.stream | fakeapp | |
domainmultiaccount.cloudapi.stream | fakeapp | |
domaintg.cloudapi.stream | fakeapp | |
domaintopup.cloudapi.stream | fakeapp | |
domainwheel.cloudapi.stream | fakeapp | |
domainuniversalminecrafttool.com | whitelist |
Threat ID: 69df507382d89c981fb85c73
Added to database: 4/15/2026, 8:46:43 AM
Last enriched: 4/15/2026, 9:01:49 AM
Last updated: 4/16/2026, 7:12:34 AM
Views: 58
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.