Skip to content
Threat Feed
medium advisory

Maltrail IOC Feed Update for Multiple Threats

This brief summarizes IOCs extracted from the Maltrail feed on March 15, 2026, covering domains and URLs associated with threats targeting macOS and Android platforms, including OSX_Atomic, FakeApp, Android_Joker, Lummack2, APT_Sidewinder, APT_Kimsuky, and Hak5Cloud_C2.

This threat brief highlights indicators of compromise (IOCs) identified on March 15, 2026, through the Maltrail feed. The identified IOCs are associated with a variety of threat actors and malware families, targeting both macOS and Android operating systems. The threats include OSX_Atomic, which potentially delivers malware to macOS systems; FakeApp, used for deceptive applications; Android_Joker, a known Android malware family; Lummack2, an information stealer; APT_Sidewinder, an advanced persistent threat actor; APT_Kimsuky, another APT group; and Hak5Cloud_C2, related to Hak5 Cloud Command and Control infrastructure. This diverse set of IOCs underscores the wide range of threats organizations face and the importance of monitoring network traffic and system logs for malicious activity. This data is crucial for detection engineers to build and deploy relevant detection rules to protect their environments.

Attack Chain

  1. Initial Access (OSX_Atomic/FakeApp): User downloads a seemingly legitimate application from a compromised website (e.g., appsformacs.com, torrents4mac.com, or a FakeApp site like adhushapp-razvd.com).
  2. Execution (OSX_Atomic/FakeApp): The downloaded application is executed on the user’s macOS or Android device. This may involve bypassing security warnings or exploiting vulnerabilities.
  3. Persistence (OSX_Atomic/Android_Joker): The malware establishes persistence on the system, potentially using techniques such as modifying startup items or scheduled tasks (OSX_Atomic), or registering as a background service (Android_Joker).
  4. Command and Control (Multiple): The malware connects to a command-and-control (C2) server (e.g., c2.socops.net, onev.online) to receive instructions and exfiltrate data.
  5. Credential Theft (Lummack2): The malware attempts to steal credentials stored on the system or in web browsers, potentially using keylogging or form grabbing techniques (Lummack2). Observed communicating with police-center.vg.
  6. Data Exfiltration (Multiple): Sensitive data, such as credentials, financial information, or personal data, is exfiltrated to the C2 server.
  7. Lateral Movement (APT_Sidewinder/APT_Kimsuky): The attacker uses the compromised system to move laterally within the network, targeting other systems and data. APT_Sidewinder uses domains like visa.nadra.gov-pk.info while APT_Kimsuky leverages naver.liferod.com for potential C2 or phishing activities.
  8. Impact (Multiple): The attacker achieves their objectives, which may include financial gain (through fraud or extortion), intellectual property theft, or espionage.

Impact

The identified IOCs represent a diverse range of threats that can have significant impact on organizations and individuals. Successful attacks can lead to financial losses due to fraud or ransomware, data breaches resulting in the theft of sensitive information, and reputational damage. The targeting of macOS and Android devices indicates a broad scope of potential victims, encompassing both corporate and personal devices. The involvement of APT groups like APT_Sidewinder and APT_Kimsuky suggests potential for targeted attacks with significant impact on national security or critical infrastructure. A single successful infection can lead to widespread compromise within an organization’s network.

Recommendation

  • Block the malicious domains listed in the IOC table at the DNS resolver and firewall to prevent communication with known C2 infrastructure.
  • Implement a network intrusion detection system (NIDS) rule to detect connections to the malicious domains and URLs (IOCs) to identify potentially compromised systems.
  • Deploy the Sigma rules provided below to your SIEM and tune them for your specific environment to detect suspicious process execution and network connections.
  • Investigate systems communicating with any of the listed IOCs (domains/URLs) for signs of malware infection or unauthorized access.

Detection coverage 3

Detect Network Connection to Hak5Cloud C2 Domain

high

Detects network connections to the Hak5Cloud command and control domain.

sigma tactics: command_and_control techniques: T1071.001 sources: network_connection, windows

Detect Connection to APT_Sidewinder Domain

high

Detects network connections to a domain associated with APT_Sidewinder.

sigma tactics: command_and_control techniques: T1071.001 sources: network_connection, windows

Detect Connection to FakeApp Domains

medium

Detects network connections to domains associated with FakeApp malware.

sigma tactics: command_and_control techniques: T1071.001 sources: network_connection, windows

Detection queries are kept inside the platform. Get full rules →

Indicators of compromise

40

domain

10

url

TypeValue
urlhttps://api.github.com/repos/stamparm/maltrail/commits/a3681b0b82849e400e3b2ffd5b30608abf1bb7f1
domainappsformacs.com
domainariaplus.me
domainbiscuit.legionkraken.io
domaincoinmarketloans.com
domaincreptomus.com
domaincriptomus.com
domaincryptomuc.com
domaincryptomus-app.com
domaincryptomus-payment-check.com
domaincryptomus-payments.com
domaincryptomus-wallet.com
domaincryptomus.live
domaincryptomustestnetik.icu
domaingq.legionkraken.io
domainholder.money
domaininfo.ariaplus.me
domaininvoice-crypomus.com
domaininvoice-crypotmus.com
domainoctotore.com
domainpay.cryptomus.live
domainsite.ariaplus.me
domaintorrents4mac.com
domainvrsmm.com
urlhttps://api.github.com/repos/stamparm/maltrail/commits/b681d4bce01b9723fab2ce0ea10133353f943434
domainadhushapp-razvd.com
domainaiassistant.sbs
urlhttps://api.github.com/repos/stamparm/maltrail/commits/2065e8ab6f15b8cdeeb24a07fab8d849fc9e6935
domainsnapplix-cttt.tech
domainstealthwall-cttf.tech
urlhttps://api.github.com/repos/stamparm/maltrail/commits/75f0bd1595532bf7fafcf9cfcc1caf4b1e6b4267
domainfrude.biz
domainsemer.bond
domainzagat.cyou
urlhttps://api.github.com/repos/stamparm/maltrail/commits/fcf8b4ecf7b8aed41bb22bfe41fe52ea3c076f40
domainpolice-center.vg
urlhttps://api.github.com/repos/stamparm/maltrail/commits/ce05d11717590e58ed4f2ff73759262c90789426
domainchromium-report-tech-331as-2s1-tcd-h143.redticker-ctfff.tech
domainchromium-report-tech-331as-2s1-tcd-h143.webplix-cctf.tech
urlhttps://api.github.com/repos/stamparm/maltrail/commits/83fd2c39f154b193baaf1753656a598bbbf276b9
domainonev.online
domainvisa.nadra.gov-pk.info
urlhttps://api.github.com/repos/stamparm/maltrail/commits/23476cd55bd5a2e74485e8bd710c9b9b4cdfcfc5
domainnaver.liferod.com
domainnid.naver.liferod.com
urlhttps://api.github.com/repos/stamparm/maltrail/commits/fd7a3895e500e82b02c6b97f9de338c598120ad8
domainc2.socops.net
urlhttps://api.github.com/repos/stamparm/maltrail/commits/8273ebec7b56bffd4c5c44eb7b22e7f5021fdd39
domainjoin86s.dynv6.net
domainnid-naverxil.onthewifi.com