IOC Radar Logo
IOCRadar
IOC Radar Logo
IOCRadar

000035e678b6d1e55d8ae396911fe045

Hash
18%
SIGNAL STRENGTHSlightly Noisy
FIRST SEEN2025-04-06 19:16:23
LAST SEEN2025-04-26 20:19:10
CATEGORY
malware
phishing attack
social engineering
malware campaign targeting spanish-speaking regions with custom rat
win32 malware
operation system spesific attack(windows os)
MITRE
T1055 - Process Injection
T1486 - Data Encrypted for Impact
T1565 - Data Manipulation
T1059.001 - PowerShell
T1071.001 - Web Protocol
T1499.002 - Endpoint DoS
T1499.003 - Network DoS
T1496 - Resource Hijacking
T1566.001 - Spear Phishing via Service
T1566.002 - Spear Phishing via Service
TAGS
email threat
malware distribution
credential harvesting
vulnerability management
windows malware
malicious software
operating system
distributed attacks
remote services
command and control
Eye Icon
SOCRadar
AI Insight

The presence of MD5 hash 000035e678b6d1e55d8ae396911fe045 is a significant indicator of potential compromise, strongly suggesting the presence of malicious or suspicious files within the system. This IOC is particularly concerning due to its association with multiple threat intelligence feeds including SOCRadar Threat Exchange Services and AlienVault OTX Feeds, as well as related objects linking it to potentially malicious files and network indicators like IP addresses (13.107.21.200, 185.216.68.143, 204.79.197.200), hinting at possible communication with command-and-control infrastructure. The related objects associated with this hash, including network indicators and references to reports concerning Dark Caracal tools, heighten the urgency for investigation and remediation. Dark Caracal is a known advanced persistent threat (APT) group. Failure to address this IOC could lead to malware infection, data exfiltration, lateral movement within the network, and ultimately, significant disruption of business operations. The IOC is specifically linked to campaigns involving Poco RAT, a remote access trojan, further emphasizing the severity of this finding.

Summary

Hash Type:
md5
MD5:
-
SHA-1:
-
SHA-256:
-
Files:
Face
File Type:
exe

Top Classifications

Campaign:
-
Industry:
-
Country:
-
Region:
-
Threat Actors:
-
Malware:
-

Feed Sources

Feed Source
Count
Date
SOCRadar Threat Exchange Services
1
2025-04-26
AlienVault OTX Feeds
2
2025-04-26

Threat Activity Timeline

Last 24 hours
Dormant
Last 7 Days
Minimal Activity
Last Month
Minimal Activity
Last 3 Months
Minimal Activity
Extended Threat Intelligence
Free Trial

Stay ahead with proactive cyber threat warnings

Discover how SOCRadar's all-in-one platform can help protect your digital assets with extended threat intelligence, digital risk protection, and attack surface management.