<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Ek_clearfake — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/ek_clearfake/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 06 May 2026 12:00:12 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/ek_clearfake/feed.xml" rel="self" type="application/rss+xml"/><item><title>Maltrail IOCs for ImminentRAT and EK_ClearFake Campaigns</title><link>https://feed.craftedsignal.io/briefs/2026-05-maltrail-iocs/</link><pubDate>Wed, 06 May 2026 12:00:12 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-maltrail-iocs/</guid><description>This brief covers newly published Maltrail IOCs, including domains associated with EK_ClearFake and an IP address and domains associated with ImminentRAT, potentially indicating ongoing malicious activity.</description><content:encoded><![CDATA[<p>This threat brief is based on Maltrail IOCs published on 2026-05-06, highlighting potential malicious activity related to two distinct campaigns: EK_ClearFake and ImminentRAT. The EK_ClearFake campaign involves a large number of newly registered domains, often using similar naming patterns and hosting various fake services. ImminentRAT indicators include a specific IP address and a few domains resolving to it. These indicators may represent command-and-control infrastructure, malware distribution points, or phishing sites. Defenders should investigate network traffic and DNS queries for these IOCs to identify potentially compromised systems or ongoing attacks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<p>This attack chain is inferred based on the nature of the identified IOCs and common attack patterns associated with RATs and fake services.</p>
<ol>
<li><strong>Initial Access:</strong> User visits a compromised website or falls victim to a social engineering attack (e.g., phishing email).</li>
<li><strong>Delivery:</strong> Malicious payload (e.g., ImminentRAT installer) is delivered to the victim&rsquo;s machine via drive-by download or as an attachment.</li>
<li><strong>Installation:</strong> The ImminentRAT malware is installed on the victim&rsquo;s system, establishing persistence.</li>
<li><strong>Command and Control:</strong> The ImminentRAT malware connects to the C2 server (79.130.189.207 or trojandev.ddns.net) to receive instructions.</li>
<li><strong>Privilege Escalation:</strong> The malware attempts to escalate privileges on the compromised system to gain higher-level access.</li>
<li><strong>Data Exfiltration:</strong> Sensitive data is stolen from the victim&rsquo;s system and transmitted to the attacker&rsquo;s infrastructure.</li>
<li><strong>Lateral Movement:</strong> Attackers use the compromised system as a launchpad to move laterally within the network, compromising additional systems.</li>
<li><strong>Final Objective:</strong> The ultimate goal could include data theft, financial fraud, espionage, or disruption of services.</li>
</ol>
<p>For EK_ClearFake, the domains are likely used in phishing or scams, attempting to steal credentials or lure victims into fraudulent transactions.</p>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to data breaches, financial loss, reputational damage, and system compromise. If ImminentRAT is successfully deployed, attackers could gain complete control over the infected system, enabling them to steal sensitive information, install additional malware, or use the system as a bot in a larger attack. The EK_ClearFake domains may be used in phishing campaigns, leading to credential theft and account compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor network traffic and DNS queries for connections to the IOCs listed in this brief, including the ImminentRAT IP address <code>79.130.189.207</code> and domains such as <code>trojandev.ddns.net</code>.</li>
<li>Block the C2 domains associated with ImminentRAT (<code>trojandev.ddns.net</code>, <code>trojandev.servehttp.com</code>, <code>trojandev2.servehttp.com</code>, <code>trojandev20.servehttp.com</code>) at the DNS resolver.</li>
<li>Implement web filtering to block access to the domains associated with EK_ClearFake (e.g., <code>nanobanano.baby</code>, <code>1dorelax.surf</code>, etc.)</li>
<li>Deploy the Sigma rule <code>Detect ImminentRAT C2 Beacon</code> to your SIEM to identify potential ImminentRAT infections.</li>
<li>Deploy the Sigma rule <code>Detect EK_ClearFake Domain Access</code> to your SIEM to identify potential phishing attempts.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>imminentrat</category><category>ek_clearfake</category><category>malware</category><category>rat</category><category>phishing</category></item></channel></rss>