IOC Radar Logo
IOCRadar
IOC Radar Logo
IOCRadar

07a6bad8a00f3699cb2bc3031e60cb24

Hash
18%
SIGNAL STRENGTHQuiet
FIRST SEEN2025-04-06 19:16:23
LAST SEEN2025-04-06 19:16:29
CATEGORY
malware
phishing attack
social engineering
malware campaign targeting spanish-speaking regions with custom rat
MITRE
T1105 - Ingress Tool Transfer
T1566 - Phishing
T1192 - Spearphishing Link
T1027 - Obfuscated Files or Information
T1071 - Application Layer Protocol
T1041 - Exfiltration Over Command and Control Channel
T1055 - Process Injection
T1486 - Data Encrypted for Impact
T1565 - Data Manipulation
T1059.001 - PowerShell
TAGS
process injection
email threat
malware distribution
malicious software
credential harvesting
distributed attacks
command and control
botnet
legitimate service abuse
dark caracal
Eye Icon
SOCRadar
AI Insight

The presence of MD5 hash 07a6bad8a00f3699cb2bc3031e60cb24 indicates a potential compromise linked to the Dark Caracal threat actor and their Poco RAT malware. This malware is known for enabling remote access, data exfiltration, and surveillance, posing a significant risk of data breach and system compromise. Identification of this IOC, sourced from AlienVault OTX, warrants immediate investigation due to the potential severity of Dark Caracal's activities, as they have been known to target various sectors, including government, military, research, and critical infrastructure.

Summary

Hash Type:
md5
MD5:
-
SHA-1:
-
SHA-256:
-
Files:
-
File Type:
-

Top Classifications

Campaign:
-
Industry:
-
Country:
-
Region:
-
Threat Actors:
-
Malware:
-

Feed Sources

Feed Source
Count
Date
AlienVault OTX Feeds
1
2025-04-06

Threat Activity Timeline

Last 24 hours
Dormant
Last 7 Days
Dormant
Last Month
Minimal Activity
Last 3 Months
Minimal Activity
Extended Threat Intelligence
Free Trial

Stay ahead with proactive cyber threat warnings

Discover how SOCRadar's all-in-one platform can help protect your digital assets with extended threat intelligence, digital risk protection, and attack surface management.