Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Maltrail IOC for 2026-05-04

0
Medium
Published: Sun May 03 2026 (05/03/2026, 00:00:00 UTC)
Source: CIRCL OSINT Feed
Vendor/Project: tlp
Product: clear

Description

This entry reports a Maltrail Indicator of Compromise (IOC) dated 2026-05-04, sourced from the CIRCL OSINT Feed. It is categorized as malware-related network activity with a medium risk level. No specific affected versions, technical details, or indicators are provided. There is no patch available, and no known exploits in the wild have been reported. The information is based on open-source intelligence and manual collection methods.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 05/04/2026, 07:36:03 UTC

Technical Analysis

The report details a Maltrail IOC for 2026-05-04 indicating potential malware-related network activity observed by CIRCL OSINT Feed. It is classified as medium severity malware with no specific affected software versions or detailed technical indicators disclosed. No patches or fixes are available, and no active exploitation has been confirmed.

Potential Impact

The impact is assessed as medium risk based on the source classification. However, due to the lack of detailed technical indicators or known exploits, the precise impact on systems or networks cannot be determined from the provided data.

Mitigation Recommendations

No patch or remediation is available for this IOC. Security teams should consider integrating this IOC into their detection and monitoring systems where applicable. Since no active exploitation is reported, no urgent remediation actions are indicated.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Uuid
905c13e3-96bb-44a4-9e41-1ff9e2fd63bf
Original Timestamp
1777849219

Indicators of Compromise

Url

ValueDescriptionCopy
urlhttps://api.github.com/repos/stamparm/maltrail/commits/4d31dc925ec1c65022733d717651dcabfd301dd9
zeus
urlhttps://x.com/dancho_danchev/status/2050933337540243948
zeus
urlhttps://ddanchev.blogspot.com/2019/07/exposing-evgeniy-mikhaylovich-bogachev.html
zeus
urlhttps://ddanchev.blogspot.com/2022/01/exposing-currently-active-jabber-zeus.html
zeus
urlhttps://www.virustotal.com/gui/file/26b0f7ab723bfb2d10c06b992234e29d7c0bdc406f2e370600863258cdafc19c/detection
zeus
urlhttps://www.virustotal.com/gui/file/a86031aa4f0ab128c6982154c43fe2ab46881cab0cc3e0494f381d33283619ee/detection
zeus
urlhttps://www.virustotal.com/gui/file/8cbd55a66dc60c6cf28e2508f40330286187b26b50024e819b227b646bc1e145/detection
zeus
urlhttps://api.github.com/repos/stamparm/maltrail/commits/62436f24b6139aa0ba46db71ee6a4565d6d43e46
apt_kimsuky
urlhttps://x.com/skocherhan/status/2050934068489949471
apt_kimsuky
urlhttps://api.github.com/repos/stamparm/maltrail/commits/6997ea5d25781f64bb895c1f352d36329765d399
apt_kimsuky
urlhttps://x.com/sakaijjang/status/2051002623709610230
apt_kimsuky
urlhttps://x.com/skocherhan/status/2051006916260680070
apt_kimsuky
urlhttps://wezard4u.tistory.com/429768
apt_kimsuky
urlhttps://www.virustotal.com/gui/file/5ef6e43a56e575086ce954ff9032ff9f1609e12ec2ea6ca88c29b4d58afb1b96/detection
apt_kimsuky
urlhttps://www.virustotal.com/gui/file/6e36060854006f9ed029ab7547f4478f0486ba5256ce9cc9027248882deebdc7/detection
apt_kimsuky
urlhttps://www.virustotal.com/gui/file/d4e2f8f5a247bf538e55edb73cbd7ef14cd86a47d9380ba5eb9a3f8f710bf366/detection
apt_kimsuky
urlhttps://www.virustotal.com/gui/file/d918415f00444c30e38a7d277733b3fc142bd5922cc2823c13d02d014f943c8a/detection
apt_kimsuky
urlhttps://www.virustotal.com/gui/file/29f871bf9bcbf9f12a16504631872871255a9f2b54cf892b4fc1cab3cec30708/detection
apt_kimsuky

Domain

ValueDescriptionCopy
domainincomeeewt.com
zeus
domainincomeet.com
zeus
domaintheir-income.com
zeus
domain32.yateo.rest
apt_kimsuky
domainacme-challenge.ms.cdn.dnscloud.contact
apt_kimsuky
domainasoiwxoin.store
apt_kimsuky
domainavsoinesoi.site
apt_kimsuky
domaincagoo.cyou
apt_kimsuky
domaincisiuowin.site
apt_kimsuky
domaindanwo.cyou
apt_kimsuky
domaindoeiseoivud.store
apt_kimsuky
domaindoieunvdusega.store
apt_kimsuky
domaindooiuonsi.site
apt_kimsuky
domainedisoiunido.site
apt_kimsuky
domaineiociuseioni.site
apt_kimsuky
domainiocuseripoiu.site
apt_kimsuky
domainkoseg.rest
apt_kimsuky
domainmgais.hair
apt_kimsuky
domainoiucsoiginao.site
apt_kimsuky
domainpakig.bond
apt_kimsuky
domainsoiuniozi.site
apt_kimsuky
domainsooiwoins.site
apt_kimsuky
domainsowepcioi.site
apt_kimsuky
domainyateo.rest
apt_kimsuky
domainbackend.totalmassage.site
apt_kimsuky
domainpanelcore.shop
apt_kimsuky
domainserverdock.online
apt_kimsuky
domainserverdock.shop
apt_kimsuky
domainshorturi.shop
apt_kimsuky
domainshorturi.site
apt_kimsuky
domaintotalmassage.site
apt_kimsuky
domainvmi3110357.contaboserver.net
apt_kimsuky

Threat ID: 69f84c5dcbff5d8610e2922b

Added to database: 5/4/2026, 7:35:57 AM

Last enriched: 5/4/2026, 7:36:03 AM

Last updated: 5/4/2026, 10:25:03 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses