A public collection of Indicators of Compromise (IOCs) extracted from mobile malware research conducted by the Zimperium zLabs team. These IOCs are intended to support threat intelligence, hunting, and detection efforts across security tools.
Each subdirectory corresponds to a malware campaign or variant, named by date and threat identifier:
2023-Banking-Heist/2024-03-Copybara/2024-07-OTP-Stealer/2024-09-Gigabud/2024-10-FakeCall/2024-10-Necro.N/2024-10-TrickMo/2024-12-AppLite/2025-01-DoNot/2025-01-Fake-SBI-Rewards/2025-01-PDF-Phishing/2025-02-FatBoyPanel/2025-04-BTMOB-RAT/2025-04-Crocodilus/2025-06-Virtualization/2025-07-Konfety/2025-07-SarangTrap2025-08-InfoStealers2025-08-PlayPraetors
C2.txt – List of command‑and‑control domains/IPs
package-names.csv – Targeted package IDs
sha256.txt – Malware sample hashes
urls.txt – Malicious download URLs
You can download and integrate IOCs for:
- SIEM / EDR ingestion – configure alerts and detection rules
- Mobile threat hunting – check for given hashes, domains, or apps
- IOCs enrichment – add context to historic or active investigations
Files (CSV, TXT) contain one IOC per line—easy to parse or import.
⚠️ Remember: IOCs are only part of the defense strategy. Real-time, behavioral-based detection remains critical.
New IOC directories are added with each zLabs disclosure. To stay up to date:
- ⭐ Star the repo
- 🔔 Watch for notifications
- Follow our technical publications at zimperium.com/blog
- Live mobile threat insights: zimperium.com/blog
- Zimperium Mobile Threat Defense (MTD) solution: MTD
- Zimperium Mobile Runtime Protection (zDefend) solution: zDefend
If you wish to contribute, report new IOCs, or have questions:
Create an Issue on GitHub
This repository is provided “as‑is” for threat intel and defensive use only. Zimperium makes no guarantees regarding completeness or accuracy. Users assume full responsibility for how these IOCs are used.
© 2025 Zimperium, Inc. All rights reserved.