IOC Radar Logo
IOCRadar
IOC Radar Logo
IOCRadar

0bb006b724b6a1ba49551c31fdd55766

Suspicious Hash
24%
SIGNAL STRENGTHQuiet
FIRST SEEN2025-02-26 11:25:19
LAST SEEN2025-03-22 06:43:04
CATEGORY
malware
phishing attack
malicious link
information stealer activity detected
social engineering
MITRE
T1005 - Data from Local System
T1059 - Command and Scripting Interpreter
T1566 - Phishing
T1027 - Obfuscated Files or Information
T1115 - Clipboard Data
T1003.001 - LSASS Memory
T1056 - Input Capture
T1041 - Exfiltration Over Command and Control Channel
T1003 - OS Credential Dumping
T1204 - User Execution
TAGS
command and control
malicious software
process injection
credential harvesting
credential theft
distributed attacks
code injection
command execution
email threat
scripting
Eye Icon
SOCRadar
AI Insight

The presence of the MD5 hash 0bb006b724b6a1ba49551c31fdd55766 is a critical indicator of compromise (IOC) due to its strong association with the Loki Password Stealer (PWS) malware. Loki is a known information stealer capable of harvesting credentials, clipboard data, and other sensitive information from infected systems. Its presence could signify active data theft and potential compromise of user accounts and internal systems, posing a significant risk of financial loss, reputational damage, and further network exploitation. This IOC is particularly relevant given its detection by multiple threat intelligence feeds, including Abuse.ch-Hash and AlienVault OTX Feeds, and its observed activity around 2025-03-20.

Summary

Hash Type:
md5
MD5:
-
SHA-1:
-
SHA-256:
-
Files:
-
File Type:
-

Top Classifications

Campaign:
-
Industry:
-
Country:
-
Region:
-
Threat Actors:
-
Malware:
-

Feed Sources

Feed Source
Count
Date
Abuse.ch-Hash
2
2025-02-26
AlienVault OTX Feeds
1
2025-03-22

Threat Activity Timeline

Last 24 hours
Dormant
Last 7 Days
Dormant
Last Month
Dormant
Last 3 Months
Minimal Activity
Extended Threat Intelligence
Free Trial

Stay ahead with proactive cyber threat warnings

Discover how SOCRadar's all-in-one platform can help protect your digital assets with extended threat intelligence, digital risk protection, and attack surface management.