IOC Radar Logo
IOCRadar
IOC Radar Logo
IOCRadar

0ac748baaad6017e331a8d99aae9e5449a96ba76fb7374f5d8c678ae52b7db9f

Hash
18%
SIGNAL STRENGTHModerate Noise
FIRST SEEN2025-03-25 18:45:43
LAST SEEN2025-04-02 16:09:44
CATEGORY
malware
malicious code execution via zero-day vulnerability
apt exploitation of zero-day vulnerability via malicious msc files
cyber espionage campaign targeting critical infrastructure
vulnerability exploitation
operation system spesific attack(windows os)
malware infection via software vulnerability
malicious powershell activity
domain scanner
MITRE
T1587.001 - Acquire Infrastructure
T1590.001 - Gather Victim Network Information
T1083 - File and Directory Discovery
T1486 - Data Encrypted for Impact
T1055 - Process Injection
T1565 - Data Manipulation
T1071.001 - Web Protocol
T1499.002 - Endpoint DoS
T1499.003 - Network DoS
T1555 - Credentials from Password Stores
TAGS
dns security
process injection
operating system
detection
scripting attacks
malicious software
vulnerability management
distributed attacks
command and control
infrastructure acquisitionreconnaissance
Eye Icon
SOCRadar
AI Insight

The presence of the SHA256 hash 0ac748baaad6017e331a8d99aae9e5449a96ba76fb7374f5d8c678ae52b7db9f represents a significant threat due to its association with multiple malware families, including Stealc, Rhadamanthys, and DarkWisp, and the Water Gamayun threat actor, as reported by AlienVault OTX and Trend Micro. This hash is linked to a wide range of malicious activities, including remote access, data exfiltration, process injection, and exploitation of vulnerabilities like CVE-2025-26633, potentially leading to compromised systems, data breaches, and significant operational disruption if undetected. Immediate action is required to identify and contain any systems affected by this IOC.

Summary

Hash Type:
sha256
MD5:
-
SHA-1:
-
SHA-256:
-
Files:
-
File Type:
-

Top Classifications

Campaign:
-
Industry:
-
Country:
-
Region:
-
Threat Actors:
-
Malware:
-

Feed Sources

Feed Source
Count
Date
AlienVault OTX Feeds
6
2025-04-02

Threat Activity Timeline

Last 24 hours
Dormant
Last 7 Days
Dormant
Last Month
Minimal Activity
Last 3 Months
Minimal Activity
Extended Threat Intelligence
Free Trial

Stay ahead with proactive cyber threat warnings

Discover how SOCRadar's all-in-one platform can help protect your digital assets with extended threat intelligence, digital risk protection, and attack surface management.