Maltrail IOC for 2026-05-02
Maltrail IOC for 2026-05-02
AI Analysis
Technical Summary
The report describes a malware-related IOC published by CIRCL OSINT Feed with a medium risk level. It is an external analysis focused on network activity but does not provide detailed technical indicators or specific vulnerabilities. No affected software versions or exploits are documented, and no patch is available. The IOC is intended for use in threat detection and monitoring rather than direct remediation.
Potential Impact
The impact is limited to potential detection of malicious network activity associated with the reported IOC. There is no evidence of active exploitation or direct compromise of specific products. The threat intelligence may help defenders identify suspicious activity but does not indicate an immediate or critical security breach.
Mitigation Recommendations
No patch or official remediation is available for this IOC. Organizations should incorporate this intelligence into their monitoring and detection systems as appropriate. Since this is an OSINT observation without active exploitation or affected products, no urgent action is required beyond situational awareness.
Indicators of Compromise
- url: https://api.github.com/repos/stamparm/maltrail/commits/8ff99980175241db4299740a58951211e057a546
- url: https://www.darktrace.com/blog/darktrace-malware-analysis-jenkins-honeypot-reveals-emerging-botnet-targeting-online-games
- url: https://www.virustotal.com/gui/file/f79d05065a2ba7937b8781e69b5859d78d5f65f01fb291ae27d28277a5e37f9b/detection
- url: https://www.virustotal.com/gui/file/f75e9af2f04a7efecacc9d88bb2f30959310c863abf9981eeac7b97debb363b9/detection
- url: https://www.virustotal.com/gui/file/40e196407e4039d873ded5c5d19bc6906f5e820e7f2b84732d23272464314562/detection
- url: https://www.virustotal.com/gui/file/3d5f8dfe9915671a15171952f6de4e1719ddbd3984a31e2c98f4597b70fc649b/detection
- url: https://www.virustotal.com/gui/file/10725167cc4b6bcc41c987450b109d19f5a3657b58fd95a5060619170580337e/detection
- ip: 103.177.110.202
- url: https://api.github.com/repos/stamparm/maltrail/commits/fca3af3c2e915f6b04f08e5cb049cee954f04e83
- url: https://x.com/skocherhan/status/2050283519348261205
- domain: htr19ies.dynuddns.com
- domain: htr6ies.dynv6.net
- domain: itx26ps.dns.army
- domain: itx8ps.dns.army
- domain: itxa16ns.dns.army
- domain: mois11ex.dynv6.net
- domain: nav-logins.nts19pops.dns.army
- domain: nid-login.itx26ps.dns.army
- domain: nida.mois11ex.dynv6.net
- domain: nida.tpx11sdoc.dns.army
- domain: nids.opt17ntesx.dns.army
- domain: nids.opt5ntesx.dns.army
- domain: nids.trx16nts.dns.army
- domain: nts19pops.dns.army
- domain: opt17ntesx.dns.army
- domain: opt5ntesx.dns.army
- domain: tpx11sdoc.dns.army
- domain: trx16nts.dns.army
- domain: txis3eo.dynv6.net
- url: https://api.github.com/repos/stamparm/maltrail/commits/c5aa6297679f18738e7880d0a781aa8be0cc5a90
- url: https://x.com/smica83/status/2050316052337192967
- url: https://www.virustotal.com/gui/file/c3320971eee2022f51e8496b5daae69946526cbf8478434bdcc74af81c1699e0/detection
- domain: departure-protocol-pursuit-instructors.trycloudflare.com
- url: https://api.github.com/repos/stamparm/maltrail/commits/2d631b386ce1b89cc7f9186ad09bd13962b2f990
- url: https://x.com/YungBinary/status/2050321086806708679
- ip: 149.248.78.202
- ip: 87.120.186.229
Maltrail IOC for 2026-05-02
Description
Maltrail IOC for 2026-05-02
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The report describes a malware-related IOC published by CIRCL OSINT Feed with a medium risk level. It is an external analysis focused on network activity but does not provide detailed technical indicators or specific vulnerabilities. No affected software versions or exploits are documented, and no patch is available. The IOC is intended for use in threat detection and monitoring rather than direct remediation.
Potential Impact
The impact is limited to potential detection of malicious network activity associated with the reported IOC. There is no evidence of active exploitation or direct compromise of specific products. The threat intelligence may help defenders identify suspicious activity but does not indicate an immediate or critical security breach.
Mitigation Recommendations
No patch or official remediation is available for this IOC. Organizations should incorporate this intelligence into their monitoring and detection systems as appropriate. Since this is an OSINT observation without active exploitation or affected products, no urgent action is required beyond situational awareness.
Technical Details
- Uuid
- 4c9bb553-9aa3-41b3-ae8b-ffdd075ae910
- Original Timestamp
- 1777676413
Indicators of Compromise
Url
| Value | Description | Copy |
|---|---|---|
urlhttps://api.github.com/repos/stamparm/maltrail/commits/8ff99980175241db4299740a58951211e057a546 | elf_mirai | |
urlhttps://www.darktrace.com/blog/darktrace-malware-analysis-jenkins-honeypot-reveals-emerging-botnet-targeting-online-games | elf_mirai | |
urlhttps://www.virustotal.com/gui/file/f79d05065a2ba7937b8781e69b5859d78d5f65f01fb291ae27d28277a5e37f9b/detection | elf_mirai | |
urlhttps://www.virustotal.com/gui/file/f75e9af2f04a7efecacc9d88bb2f30959310c863abf9981eeac7b97debb363b9/detection | elf_mirai | |
urlhttps://www.virustotal.com/gui/file/40e196407e4039d873ded5c5d19bc6906f5e820e7f2b84732d23272464314562/detection | elf_mirai | |
urlhttps://www.virustotal.com/gui/file/3d5f8dfe9915671a15171952f6de4e1719ddbd3984a31e2c98f4597b70fc649b/detection | elf_mirai | |
urlhttps://www.virustotal.com/gui/file/10725167cc4b6bcc41c987450b109d19f5a3657b58fd95a5060619170580337e/detection | elf_mirai | |
urlhttps://api.github.com/repos/stamparm/maltrail/commits/fca3af3c2e915f6b04f08e5cb049cee954f04e83 | apt_kimsuky | |
urlhttps://x.com/skocherhan/status/2050283519348261205 | apt_kimsuky | |
urlhttps://api.github.com/repos/stamparm/maltrail/commits/c5aa6297679f18738e7880d0a781aa8be0cc5a90 | powershell_injector | |
urlhttps://x.com/smica83/status/2050316052337192967 | powershell_injector | |
urlhttps://www.virustotal.com/gui/file/c3320971eee2022f51e8496b5daae69946526cbf8478434bdcc74af81c1699e0/detection | powershell_injector | |
urlhttps://api.github.com/repos/stamparm/maltrail/commits/2d631b386ce1b89cc7f9186ad09bd13962b2f990 | python_injector | |
urlhttps://x.com/YungBinary/status/2050321086806708679 | python_injector |
Ip
| Value | Description | Copy |
|---|---|---|
ip103.177.110.202 | elf_mirai | |
ip149.248.78.202 | python_injector | |
ip87.120.186.229 | python_injector |
Domain
| Value | Description | Copy |
|---|---|---|
domainhtr19ies.dynuddns.com | apt_kimsuky | |
domainhtr6ies.dynv6.net | apt_kimsuky | |
domainitx26ps.dns.army | apt_kimsuky | |
domainitx8ps.dns.army | apt_kimsuky | |
domainitxa16ns.dns.army | apt_kimsuky | |
domainmois11ex.dynv6.net | apt_kimsuky | |
domainnav-logins.nts19pops.dns.army | apt_kimsuky | |
domainnid-login.itx26ps.dns.army | apt_kimsuky | |
domainnida.mois11ex.dynv6.net | apt_kimsuky | |
domainnida.tpx11sdoc.dns.army | apt_kimsuky | |
domainnids.opt17ntesx.dns.army | apt_kimsuky | |
domainnids.opt5ntesx.dns.army | apt_kimsuky | |
domainnids.trx16nts.dns.army | apt_kimsuky | |
domainnts19pops.dns.army | apt_kimsuky | |
domainopt17ntesx.dns.army | apt_kimsuky | |
domainopt5ntesx.dns.army | apt_kimsuky | |
domaintpx11sdoc.dns.army | apt_kimsuky | |
domaintrx16nts.dns.army | apt_kimsuky | |
domaintxis3eo.dynv6.net | apt_kimsuky | |
domaindeparture-protocol-pursuit-instructors.trycloudflare.com | powershell_injector |
Threat ID: 69f5aa36cbff5d8610b04e3a
Added to database: 5/2/2026, 7:39:34 AM
Last enriched: 5/2/2026, 7:39:41 AM
Last updated: 5/3/2026, 5:05:36 AM
Views: 14
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.