IOC Radar Logo
IOCRadar
IOC Radar Logo
IOCRadar

0b661cd1d2fde870efd877c53fbfd84e7203a853

Hash
18%
SIGNAL STRENGTHQuiet
FIRST SEEN2025-04-03 02:52:03
LAST SEEN2025-04-03 02:53:56
CATEGORY
malware
telnet threat
iot/ics attack
ssh attack
port scanner
mirai botnet activity and indicators of compromise
brute force attempts
MITRE
T1592.002 - Software
T1599 - Network Boundary Bridging
T1613 - Container and Resource Discovery
T1593.001 - Social Media
T1567 - Account Discovery
T1596.002 - WHOIS
T1573.002 - Asymmetric Cryptography
T1567.002 - Exfiltration to Cloud Storage
T1078.004 - Cloud Accounts
T1574.009 - Path Interception by Unquoted Path
TAGS
ddos attacks
command and control
malicious software
active scanning
credential access
credential stuffing
process injection
network security
protocol exploitation
distributed attacks
Eye Icon
SOCRadar
AI Insight

The SHA1 hash 0b661cd1d2fde870efd877c53fbfd84e7203a853 is a critical Indicator of Compromise (IOC) due to its association with the Mirai botnet. Mirai is a notorious malware family known for compromising IoT devices and leveraging them to conduct large-scale Distributed Denial of Service (DDoS) attacks. Presence of this hash indicates a potential compromise of systems within the organization's network, posing a significant risk of participation in DDoS attacks, network disruption, and unauthorized access to sensitive information. Given the severity of Mirai's impact, immediate action is required to investigate and mitigate this threat.

Summary

Hash Type:
sha1
MD5:
-
SHA-1:
-
SHA-256:
-
Files:
-
File Type:
-

Top Classifications

Campaign:
-
Industry:
-
Country:
-
Region:
-
Threat Actors:
-
Malware:
-

Feed Sources

Feed Source
Count
Date
AlienVault OTX Feeds
1
2025-04-03

Threat Activity Timeline

Last 24 hours
Dormant
Last 7 Days
Dormant
Last Month
Minimal Activity
Last 3 Months
Minimal Activity
Extended Threat Intelligence
Free Trial

Stay ahead with proactive cyber threat warnings

Discover how SOCRadar's all-in-one platform can help protect your digital assets with extended threat intelligence, digital risk protection, and attack surface management.