IOC Radar Logo
IOCRadar
IOC Radar Logo
IOCRadar

0a331d744623c4201a6e914a1392bbbf0208f830

Suspicious Hash
37.5%
SIGNAL STRENGTHSlightly Noisy
FIRST SEEN2025-03-25 17:44:35
LAST SEEN2025-03-28 20:34:54
CATEGORY
malware
ransomware infection
MITRE
T1059 - Command and Scripting Interpreter
T1566 - Phishing
T1071 - Application Layer Protocol
T1204 - User Execution
T1083 - File and Directory Discovery
T1055 - Process Injection
T1486 - Data Encrypted for Impact
T1565 - Data Manipulation
T1082 - System Information Discovery
T1071.001 - Web Protocol
TAGS
malicious software
command and control
distributed attacks
process injection
extortion
ta0040
ta0006
command
proton family
data exfiltration
Eye Icon
SOCRadar
AI Insight

The presence of SHA1 hash 0a331d744623c4201a6e914a1392bbbf0208f830 is a critical indicator of potential ransomware activity within the environment. Identified by multiple threat intelligence feeds, including AlienVault Ransomware-Firehol and AlienVault OTX Feeds, this IOC is associated with data encryption and related malicious activities. Its detection should be treated with high urgency due to the potential for significant data loss, system disruption, and financial impact. This activity aligns with known ransomware tactics and observed attack patterns, necessitating immediate investigation and containment measures.

Summary

Hash Type:
sha1
MD5:
-
SHA-1:
-
SHA-256:
-
Files:
-
File Type:
-

Top Classifications

Campaign:
-
Industry:
-
Country:
-
Region:
-
Threat Actors:
-
Malware:
-

Feed Sources

Feed Source
Count
Date
AlienVault Ransomware-Firehol
2
2025-03-26
AlienVault OTX Feeds
2
2025-03-28

Threat Activity Timeline

Last 24 hours
Dormant
Last 7 Days
Dormant
Last Month
Minimal Activity
Last 3 Months
Minimal Activity
Extended Threat Intelligence
Free Trial

Stay ahead with proactive cyber threat warnings

Discover how SOCRadar's all-in-one platform can help protect your digital assets with extended threat intelligence, digital risk protection, and attack surface management.