IOC Radar Logo
IOCRadar
IOC Radar Logo
IOCRadar

0a548e5e31b00bd078466d15eb16e546

Suspicious Hash
39%
SIGNAL STRENGTHModerate Noise
FIRST SEEN2025-03-23 16:42:03
LAST SEEN2025-04-23 07:07:56
CATEGORY
malware
mirai botnet activity: port scanning and brute force attempts
port scanner
iot/ics attack
MITRE
T1105 - Ingress Tool Transfer
T1566 - Phishing
T1071.004 - DNS
T1190 - Exploit Public-Facing Application
T1053.005 - Scheduled Task
T1595.001 - Active Scanning
T1595.002 - Port Scanning
T1595.003 - Network Scanning
T1498 - Network Denial of Service
T1021.004 - SSH
TAGS
distributed attacks
command and control
mirai botnet
active scanning
network scanning
credential access
malicious software
process injection
iot botnet
ddos attacks
Eye Icon
SOCRadar
AI Insight

This Indicator of Compromise (IOC), specifically the MD5 hash 0a548e5e31b00bd078466d15eb16e546, is associated with the notorious Mirai botnet and its variants. Mirai infects IoT devices and leverages them to launch large-scale Distributed Denial-of-Service (DDoS) attacks. Detection of this IOC suggests potential compromise of systems within the network, indicating an active or past infection leading to participation in DDoS attacks or data exfiltration, and exposing the organization to significant operational disruption and reputational damage. The presence of this IOC necessitates immediate investigation and remediation to prevent further malicious activity.

Summary

Hash Type:
md5
MD5:
-
SHA-1:
-
SHA-256:
-
Files:
m68k
File Type:
-

Top Classifications

Campaign:
-
Industry:
-
Country:
-
Region:
-
Threat Actors:
-
Malware:
-

Feed Sources

Feed Source
Count
Date
Abuse.ch-Hash
2
2025-03-24
Threatview.io Feeds
2
2025-04-03
URLhaus Feeds
1
2025-03-26
SOCRadar Threat Exchange Services
1
2025-04-23

Threat Activity Timeline

Last 24 hours
Moderate
Last 7 Days
Minimal Activity
Last Month
Moderate
Last 3 Months
Minimal Activity
Extended Threat Intelligence
Free Trial

Stay ahead with proactive cyber threat warnings

Discover how SOCRadar's all-in-one platform can help protect your digital assets with extended threat intelligence, digital risk protection, and attack surface management.