Where we found this: httxs://8ch.net/qresearch/res/5262118.html#q5281628
Stems coming from CloudFlare, Google, USA, and info from pure and genuine fake news conspiracy sources.
Communicating Files Date scanned Detections File type Name 2019-02-28 1/54 Android b00e6ffc1806022210e5968a6d1afb5c8b990d205deed31181658cba4408ffc5 Serving up AndroidOS/GenBl.3AE5FB2D!Olympus malcode.
Source also to consider: https://www.shodan.io/host/104.18.105.234
Originates most likely from this campaign source, seen the relation with used zepto technology, with an additional threat record:
https://unit42.paloaltonetworks.com/unit42-afraidgate-major-exploit-kit-campaign-switches-from-cryptxxx-ransomware-back-to-locky/
source credits go to #sockpuppet
polonus (volunteer website security analyst and website error-hunter)