Maltrail IOC for 2026-04-21
Maltrail IOC for 2026-04-21
AI Analysis
Technical Summary
The provided data represents a set of IOCs related to malware activity dated 2026-04-21, sourced from the CIRCL OSINT Feed. The indicators include URLs and domains connected to an OSX stealer malware campaign, specifically referencing a backdoored panel and credential harvester. The threat is categorized under malware and network activity with medium severity. No CVE or patch information is available, and no known exploits in the wild have been reported. The data serves as an external analysis and network activity observation to aid detection and response efforts.
Potential Impact
The impact is medium severity based on the observed malware activity involving OSX credential harvesting and backdoored panels. There is no evidence of active exploitation in the wild or ransomware use. The threat could lead to credential compromise if successfully executed, but no direct impact details or confirmed incidents are provided.
Mitigation Recommendations
No official patch or remediation is available for this threat. Since this is an OSINT observation of IOCs, defenders should use the provided indicators to enhance detection capabilities. Monitoring for connections to the listed domains and URLs and blocking or investigating suspicious activity related to these indicators is recommended. Patch status is not applicable as this is an IOC feed without a specific vulnerability or fix.
Indicators of Compromise
- url: https://api.github.com/repos/stamparm/maltrail/commits/c8a85a031aa9e20a69b338b212d63642d4ec10a0
- url: https://intel.breakglass.tech/post/odyssey-macos-stealer-backdoored-panel-scan-tron-credential-harvester
- domain: scan-tron.link
- domain: vash-server.com
- url: https://api.github.com/repos/stamparm/maltrail/commits/f2e28f34937daa2bd00db8717bd6d48f9292aa90
- domain: ukdsopas.at
Maltrail IOC for 2026-04-21
Description
Maltrail IOC for 2026-04-21
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The provided data represents a set of IOCs related to malware activity dated 2026-04-21, sourced from the CIRCL OSINT Feed. The indicators include URLs and domains connected to an OSX stealer malware campaign, specifically referencing a backdoored panel and credential harvester. The threat is categorized under malware and network activity with medium severity. No CVE or patch information is available, and no known exploits in the wild have been reported. The data serves as an external analysis and network activity observation to aid detection and response efforts.
Potential Impact
The impact is medium severity based on the observed malware activity involving OSX credential harvesting and backdoored panels. There is no evidence of active exploitation in the wild or ransomware use. The threat could lead to credential compromise if successfully executed, but no direct impact details or confirmed incidents are provided.
Mitigation Recommendations
No official patch or remediation is available for this threat. Since this is an OSINT observation of IOCs, defenders should use the provided indicators to enhance detection capabilities. Monitoring for connections to the listed domains and URLs and blocking or investigating suspicious activity related to these indicators is recommended. Patch status is not applicable as this is an IOC feed without a specific vulnerability or fix.
Technical Details
- Uuid
- 7f785788-f3a8-423a-8cf9-ec8480772460
- Original Timestamp
- 1776751205
Indicators of Compromise
Url
| Value | Description | Copy |
|---|---|---|
urlhttps://api.github.com/repos/stamparm/maltrail/commits/c8a85a031aa9e20a69b338b212d63642d4ec10a0 | osx_atomic | |
urlhttps://intel.breakglass.tech/post/odyssey-macos-stealer-backdoored-panel-scan-tron-credential-harvester | osx_atomic | |
urlhttps://api.github.com/repos/stamparm/maltrail/commits/f2e28f34937daa2bd00db8717bd6d48f9292aa90 | osx_atomic |
Domain
| Value | Description | Copy |
|---|---|---|
domainscan-tron.link | osx_atomic | |
domainvash-server.com | osx_atomic | |
domainukdsopas.at | osx_atomic |
Threat ID: 69e720a919fe3cd2cdab8fdc
Added to database: 4/21/2026, 7:00:57 AM
Last enriched: 4/21/2026, 7:16:07 AM
Last updated: 4/21/2026, 8:16:37 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.