Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Maltrail IOC for 2026-05-02

0
Medium
Published: Fri May 01 2026 (05/01/2026, 00:00:00 UTC)
Source: CIRCL OSINT Feed
Vendor/Project: tlp
Product: clear

Description

Maltrail IOC for 2026-05-02

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 05/02/2026, 07:39:41 UTC

Technical Analysis

The report describes a malware-related IOC published by CIRCL OSINT Feed with a medium risk level. It is an external analysis focused on network activity but does not provide detailed technical indicators or specific vulnerabilities. No affected software versions or exploits are documented, and no patch is available. The IOC is intended for use in threat detection and monitoring rather than direct remediation.

Potential Impact

The impact is limited to potential detection of malicious network activity associated with the reported IOC. There is no evidence of active exploitation or direct compromise of specific products. The threat intelligence may help defenders identify suspicious activity but does not indicate an immediate or critical security breach.

Mitigation Recommendations

No patch or official remediation is available for this IOC. Organizations should incorporate this intelligence into their monitoring and detection systems as appropriate. Since this is an OSINT observation without active exploitation or affected products, no urgent action is required beyond situational awareness.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Uuid
4c9bb553-9aa3-41b3-ae8b-ffdd075ae910
Original Timestamp
1777676413

Indicators of Compromise

Url

ValueDescriptionCopy
urlhttps://api.github.com/repos/stamparm/maltrail/commits/8ff99980175241db4299740a58951211e057a546
elf_mirai
urlhttps://www.darktrace.com/blog/darktrace-malware-analysis-jenkins-honeypot-reveals-emerging-botnet-targeting-online-games
elf_mirai
urlhttps://www.virustotal.com/gui/file/f79d05065a2ba7937b8781e69b5859d78d5f65f01fb291ae27d28277a5e37f9b/detection
elf_mirai
urlhttps://www.virustotal.com/gui/file/f75e9af2f04a7efecacc9d88bb2f30959310c863abf9981eeac7b97debb363b9/detection
elf_mirai
urlhttps://www.virustotal.com/gui/file/40e196407e4039d873ded5c5d19bc6906f5e820e7f2b84732d23272464314562/detection
elf_mirai
urlhttps://www.virustotal.com/gui/file/3d5f8dfe9915671a15171952f6de4e1719ddbd3984a31e2c98f4597b70fc649b/detection
elf_mirai
urlhttps://www.virustotal.com/gui/file/10725167cc4b6bcc41c987450b109d19f5a3657b58fd95a5060619170580337e/detection
elf_mirai
urlhttps://api.github.com/repos/stamparm/maltrail/commits/fca3af3c2e915f6b04f08e5cb049cee954f04e83
apt_kimsuky
urlhttps://x.com/skocherhan/status/2050283519348261205
apt_kimsuky
urlhttps://api.github.com/repos/stamparm/maltrail/commits/c5aa6297679f18738e7880d0a781aa8be0cc5a90
powershell_injector
urlhttps://x.com/smica83/status/2050316052337192967
powershell_injector
urlhttps://www.virustotal.com/gui/file/c3320971eee2022f51e8496b5daae69946526cbf8478434bdcc74af81c1699e0/detection
powershell_injector
urlhttps://api.github.com/repos/stamparm/maltrail/commits/2d631b386ce1b89cc7f9186ad09bd13962b2f990
python_injector
urlhttps://x.com/YungBinary/status/2050321086806708679
python_injector

Ip

ValueDescriptionCopy
ip103.177.110.202
elf_mirai
ip149.248.78.202
python_injector
ip87.120.186.229
python_injector

Domain

ValueDescriptionCopy
domainhtr19ies.dynuddns.com
apt_kimsuky
domainhtr6ies.dynv6.net
apt_kimsuky
domainitx26ps.dns.army
apt_kimsuky
domainitx8ps.dns.army
apt_kimsuky
domainitxa16ns.dns.army
apt_kimsuky
domainmois11ex.dynv6.net
apt_kimsuky
domainnav-logins.nts19pops.dns.army
apt_kimsuky
domainnid-login.itx26ps.dns.army
apt_kimsuky
domainnida.mois11ex.dynv6.net
apt_kimsuky
domainnida.tpx11sdoc.dns.army
apt_kimsuky
domainnids.opt17ntesx.dns.army
apt_kimsuky
domainnids.opt5ntesx.dns.army
apt_kimsuky
domainnids.trx16nts.dns.army
apt_kimsuky
domainnts19pops.dns.army
apt_kimsuky
domainopt17ntesx.dns.army
apt_kimsuky
domainopt5ntesx.dns.army
apt_kimsuky
domaintpx11sdoc.dns.army
apt_kimsuky
domaintrx16nts.dns.army
apt_kimsuky
domaintxis3eo.dynv6.net
apt_kimsuky
domaindeparture-protocol-pursuit-instructors.trycloudflare.com
powershell_injector

Threat ID: 69f5aa36cbff5d8610b04e3a

Added to database: 5/2/2026, 7:39:34 AM

Last enriched: 5/2/2026, 7:39:41 AM

Last updated: 5/3/2026, 5:05:36 AM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses