Skip to content
Threat Feed
medium threat

Maltrail IOC Feed Update - 2026-05-15

This brief summarizes a Maltrail IOC feed update on 2026-05-15, containing indicators associated with APT_Kimsuky, CyberstrikeAI, Android_Joker, Sectoprat, EK_Landupdate808, and MagentoCore campaigns involving suspicious domains and IP addresses.

This threat brief summarizes the indicators of compromise (IOCs) published in the Maltrail feed on 2026-05-15. The IOCs are associated with multiple campaigns including APT_Kimsuky, CyberstrikeAI, Android_Joker, Sectoprat, EK_Landupdate808, and MagentoCore. The feed contains network-based IOCs such as domains and IP addresses. These indicators can be used to detect and block malicious network traffic related to these campaigns. The varied nature of the associated campaigns suggests a wide range of potential threats, from mobile malware to e-commerce platform attacks, necessitating a broad monitoring approach. The update highlights the continuous need for up-to-date threat intelligence for effective network security.

Attack Chain

This Maltrail feed provides indicators for multiple different campaigns, and so a single attack chain is not possible to construct. However, based on the names of the malware families, we can assume some possible attack chains:

MagentoCore (Possible Attack Chain)

  1. The attacker identifies a Magento e-commerce platform with vulnerabilities.
  2. The attacker injects malicious JavaScript code into the Magento store, potentially through a compromised plugin or theme.
  3. The injected JavaScript code loads from one of the listed domains (e.g., 5q.reports-cdn.com).
  4. The script captures sensitive customer data such as credit card information and login credentials.
  5. The stolen data is exfiltrated to the attacker’s server via the compromised domain infrastructure.
  6. The attacker uses the stolen data for financial fraud or identity theft.

Android_Joker (Possible Attack Chain)

  1. The attacker develops a malicious Android application and publishes it on a third-party app store.
  2. The user downloads and installs the malicious Android application (disguised as a legitimate app).
  3. The malicious application requests intrusive permissions like SMS access and contact list access.
  4. The application communicates with a command-and-control server like mixcar.store.
  5. The malware subscribes the user to premium SMS services without their knowledge.
  6. The attacker profits from the fraudulent subscriptions.

Impact

The impact of these IOCs depends on the specific campaign they are associated with. For example, MagentoCore attacks can lead to financial losses and reputational damage for e-commerce businesses, as well as identity theft for customers. Android_Joker malware can result in financial fraud and privacy breaches for mobile users. APT_Kimsuky campaigns typically target political and strategic intelligence, causing damage to national security and international relations. The number of potential victims is difficult to determine, but given the widespread use of Magento and Android devices, the potential impact is significant.

Recommendation

  • Block the listed domains in your DNS resolver and web proxy to prevent communication with known malicious infrastructure, using the IOCs provided (domains).
  • Block the listed IP addresses in your firewall to prevent network connections to known malicious hosts, using the IOCs provided (IP addresses).
  • Monitor web server logs for requests to the listed domains to identify potentially compromised systems that may be attempting to communicate with malicious infrastructure.
  • Monitor network traffic for connections to the listed IP addresses to identify potentially compromised systems.
  • Investigate any systems that have communicated with the listed domains or IP addresses for signs of compromise.

Detection coverage 3

Detect Connections to CyberstrikeAI IPs

medium

Detects network connections to IP addresses associated with CyberstrikeAI activity.

sigma tactics: command_and_control techniques: T1071.001 sources: network_connection, windows

Detect Connections to Android_Joker Domain

medium

Detects network connections to the domain associated with Android_Joker malware.

sigma tactics: command_and_control techniques: T1573.001 sources: network_connection, windows

Detect Connections to EK_Landupdate808 Domain

medium

Detects network connections to the domain associated with EK_Landupdate808 activity.

sigma tactics: command_and_control techniques: T1573.001 sources: network_connection, windows

Detection queries are available on the platform. Get full rules →

Indicators of compromise

30

domain

13

ip

7

url

TypeValue
urlhttps://api.github.com/repos/stamparm/maltrail/commits/b7cf24d5696efc82affb75f5e4093d316db8caa8
domainmhjwsf.reverifyblogmid19s.dns.army
domainnaveblogedit33s.dns.army
domainqxnhdalc.naveblogedit33s.dns.army
domainreverifyblogmid0s.dns.army
domainreverifyblogmid19s.dns.army
domainuhmymkd.reverifyblogmid0s.dns.army
urlhttps://api.github.com/repos/stamparm/maltrail/commits/425493bcf541d6ddc3aa257accf29b5474227c6d
ip111.231.63.109
ip118.126.95.156
ip118.145.227.8
ip134.122.153.78
ip138.249.133.120
ip192.248.172.82
ip203.83.10.114
ip80.96.109.59
urlhttps://api.github.com/repos/stamparm/maltrail/commits/3561cc7ff2bf2fade01d79905ad0435f3708f7e9
domainmixcar.store
urlhttps://api.github.com/repos/stamparm/maltrail/commits/6e2924c45ecb373aca5d50ff8a068f55f71b43a6
ip103.246.144.201
ip191.101.80.211
ip217.60.98.113
ip31.76.251.134
ip45.76.86.194
urlhttps://api.github.com/repos/stamparm/maltrail/commits/89891505ba39c926febf4707e1f35afed681332b
domaintitchell.lol
urlhttps://api.github.com/repos/stamparm/maltrail/commits/c3eb79792e3e259d1d47c7b233fe87e0b81c8eaf
domain5q.reports-cdn.com
domain5v.east-report.com
domainq2.cdn-hs.com
domaintt.stat-hs.com
urlhttps://api.github.com/repos/stamparm/maltrail/commits/9baa4673ad2ca11713e206666f8debe1b085be0a
domain20.socket-cdn.com
domain28.wsrequest.com
domain2fabmoenroll.com
domain34.socket-wss.com
domain34.wss-socket.com
domain3h.ws-request.com
domain3p.request-ws.net
domain4p.cdn-connect.com
domain5j.auth-securi.com
domain5k.request-cdn.com
domain5r.auth-securi.net
domain5t.connect-wss.com
domain5t.wss-connect.com
domain6g.protect-wss.com
domain6i.llvechatinc.com
domain7o.analityc-cdn.com
domain7r.llve-chatinc.com
domain9e5b43cb6413.houseofcards.store