Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Maltrail IOC for 2026-05-09

0
Medium
Published: Fri May 08 2026 (05/08/2026, 00:00:00 UTC)
Source: CIRCL OSINT Feed
Vendor/Project: tlp
Product: clear

Description

Maltrail IOC for 2026-05-09

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 05/09/2026, 12:06:29 UTC

Technical Analysis

The report provides a set of indicators of compromise related to malware activity identified as 'osx_atomic' from the CIRCL OSINT Feed. It lists several suspicious domains and URLs linked to this malware, useful for detection and monitoring purposes. No CVE or specific vulnerability is associated with this IOC, and no patch or fix is available. The threat is categorized as medium severity based on the source classification but lacks detailed technical exploitation data.

Potential Impact

The impact is limited to the presence of malware-related network indicators that may signal infection or malicious activity. There is no information about active exploitation, direct system compromise, or ransomware use. The medium severity rating suggests a moderate risk level, primarily for detection and monitoring rather than immediate critical threat.

Mitigation Recommendations

No official patch or remediation is available for this IOC. Organizations should incorporate these indicators into their threat detection and monitoring systems to identify potential infections. Since no vendor advisory or specific mitigation guidance is provided, standard incident response procedures for malware detection should be followed. Patch status is not applicable as this is an IOC feed rather than a vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Uuid
b7e3734d-8081-44f7-9867-29a1d7ab1b98
Original Timestamp
1778284808

Indicators of Compromise

Url

ValueDescriptionCopy
urlhttps://api.github.com/repos/stamparm/maltrail/commits/9faa46e5414d4aa3d994b3538391f8c2c1ec1f96
osx_atomic
urlhttps://api.github.com/repos/stamparm/maltrail/commits/95123619541a82fdb6ab588fc477765dbfe8bb4c
osx_atomic
urlhttps://www.rstcloud.com/macsync-stealer-c2-infrastructure-rotation
osx_atomic
urlhttps://www.virustotal.com/gui/file/2cd7305adbe94fecaca76602b028e3279edd9be563e6c6f1401bc69df1155aaa/detection
osx_atomic

Domain

ValueDescriptionCopy
domainlongbeachmartialarts.com
osx_atomic
domaintencentstablecoin.com
osx_atomic
domainharveylewisinsuranceagency.com
osx_atomic
domainjacksonvillemma.com
osx_atomic
domainlumenagnet.com
osx_atomic
domainwechatstablecoin.com
osx_atomic

Threat ID: 69ff1fb3cbff5d86100e2127

Added to database: 5/9/2026, 11:51:15 AM

Last enriched: 5/9/2026, 12:06:29 PM

Last updated: 5/10/2026, 8:58:24 AM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses