Maltrail IOC Feed Update - 2026-05-15
This brief summarizes a Maltrail IOC feed update on 2026-05-15, containing indicators associated with APT_Kimsuky, CyberstrikeAI, Android_Joker, Sectoprat, EK_Landupdate808, and MagentoCore campaigns involving suspicious domains and IP addresses.
This threat brief summarizes the indicators of compromise (IOCs) published in the Maltrail feed on 2026-05-15. The IOCs are associated with multiple campaigns including APT_Kimsuky, CyberstrikeAI, Android_Joker, Sectoprat, EK_Landupdate808, and MagentoCore. The feed contains network-based IOCs such as domains and IP addresses. These indicators can be used to detect and block malicious network traffic related to these campaigns. The varied nature of the associated campaigns suggests a wide range of potential threats, from mobile malware to e-commerce platform attacks, necessitating a broad monitoring approach. The update highlights the continuous need for up-to-date threat intelligence for effective network security.
Attack Chain
This Maltrail feed provides indicators for multiple different campaigns, and so a single attack chain is not possible to construct. However, based on the names of the malware families, we can assume some possible attack chains:
MagentoCore (Possible Attack Chain)
- The attacker identifies a Magento e-commerce platform with vulnerabilities.
- The attacker injects malicious JavaScript code into the Magento store, potentially through a compromised plugin or theme.
- The injected JavaScript code loads from one of the listed domains (e.g.,
5q.reports-cdn.com). - The script captures sensitive customer data such as credit card information and login credentials.
- The stolen data is exfiltrated to the attacker’s server via the compromised domain infrastructure.
- The attacker uses the stolen data for financial fraud or identity theft.
Android_Joker (Possible Attack Chain)
- The attacker develops a malicious Android application and publishes it on a third-party app store.
- The user downloads and installs the malicious Android application (disguised as a legitimate app).
- The malicious application requests intrusive permissions like SMS access and contact list access.
- The application communicates with a command-and-control server like
mixcar.store. - The malware subscribes the user to premium SMS services without their knowledge.
- The attacker profits from the fraudulent subscriptions.
Impact
The impact of these IOCs depends on the specific campaign they are associated with. For example, MagentoCore attacks can lead to financial losses and reputational damage for e-commerce businesses, as well as identity theft for customers. Android_Joker malware can result in financial fraud and privacy breaches for mobile users. APT_Kimsuky campaigns typically target political and strategic intelligence, causing damage to national security and international relations. The number of potential victims is difficult to determine, but given the widespread use of Magento and Android devices, the potential impact is significant.
Recommendation
- Block the listed domains in your DNS resolver and web proxy to prevent communication with known malicious infrastructure, using the IOCs provided (domains).
- Block the listed IP addresses in your firewall to prevent network connections to known malicious hosts, using the IOCs provided (IP addresses).
- Monitor web server logs for requests to the listed domains to identify potentially compromised systems that may be attempting to communicate with malicious infrastructure.
- Monitor network traffic for connections to the listed IP addresses to identify potentially compromised systems.
- Investigate any systems that have communicated with the listed domains or IP addresses for signs of compromise.
Detection coverage 3
Detect Connections to CyberstrikeAI IPs
mediumDetects network connections to IP addresses associated with CyberstrikeAI activity.
Detect Connections to Android_Joker Domain
mediumDetects network connections to the domain associated with Android_Joker malware.
Detect Connections to EK_Landupdate808 Domain
mediumDetects network connections to the domain associated with EK_Landupdate808 activity.
Detection queries are available on the platform. Get full rules →
Indicators of compromise
30
domain
13
ip
7
url
| Type | Value |
|---|---|
| url | https://api.github.com/repos/stamparm/maltrail/commits/b7cf24d5696efc82affb75f5e4093d316db8caa8 |
| domain | mhjwsf.reverifyblogmid19s.dns.army |
| domain | naveblogedit33s.dns.army |
| domain | qxnhdalc.naveblogedit33s.dns.army |
| domain | reverifyblogmid0s.dns.army |
| domain | reverifyblogmid19s.dns.army |
| domain | uhmymkd.reverifyblogmid0s.dns.army |
| url | https://api.github.com/repos/stamparm/maltrail/commits/425493bcf541d6ddc3aa257accf29b5474227c6d |
| ip | 111.231.63.109 |
| ip | 118.126.95.156 |
| ip | 118.145.227.8 |
| ip | 134.122.153.78 |
| ip | 138.249.133.120 |
| ip | 192.248.172.82 |
| ip | 203.83.10.114 |
| ip | 80.96.109.59 |
| url | https://api.github.com/repos/stamparm/maltrail/commits/3561cc7ff2bf2fade01d79905ad0435f3708f7e9 |
| domain | mixcar.store |
| url | https://api.github.com/repos/stamparm/maltrail/commits/6e2924c45ecb373aca5d50ff8a068f55f71b43a6 |
| ip | 103.246.144.201 |
| ip | 191.101.80.211 |
| ip | 217.60.98.113 |
| ip | 31.76.251.134 |
| ip | 45.76.86.194 |
| url | https://api.github.com/repos/stamparm/maltrail/commits/89891505ba39c926febf4707e1f35afed681332b |
| domain | titchell.lol |
| url | https://api.github.com/repos/stamparm/maltrail/commits/c3eb79792e3e259d1d47c7b233fe87e0b81c8eaf |
| domain | 5q.reports-cdn.com |
| domain | 5v.east-report.com |
| domain | q2.cdn-hs.com |
| domain | tt.stat-hs.com |
| url | https://api.github.com/repos/stamparm/maltrail/commits/9baa4673ad2ca11713e206666f8debe1b085be0a |
| domain | 20.socket-cdn.com |
| domain | 28.wsrequest.com |
| domain | 2fabmoenroll.com |
| domain | 34.socket-wss.com |
| domain | 34.wss-socket.com |
| domain | 3h.ws-request.com |
| domain | 3p.request-ws.net |
| domain | 4p.cdn-connect.com |
| domain | 5j.auth-securi.com |
| domain | 5k.request-cdn.com |
| domain | 5r.auth-securi.net |
| domain | 5t.connect-wss.com |
| domain | 5t.wss-connect.com |
| domain | 6g.protect-wss.com |
| domain | 6i.llvechatinc.com |
| domain | 7o.analityc-cdn.com |
| domain | 7r.llve-chatinc.com |
| domain | 9e5b43cb6413.houseofcards.store |