IOC Radar Logo
IOCRadar
IOC Radar Logo
IOCRadar

0bbf0d96f839510c8e59e6b1847322b1

Suspicious Hash
37.88%
SIGNAL STRENGTHModerate Noise
FIRST SEEN2025-03-22 16:27:46
LAST SEEN2025-04-23 07:09:14
CATEGORY
malware
port scanner
mirai botnet activity: port scanning and brute force attempts
iot/ics attack
MITRE
T1105 - Ingress Tool Transfer
T1566 - Phishing
T1071.004 - DNS
T1190 - Exploit Public-Facing Application
T1053.005 - Scheduled Task
T1595.001 - Active Scanning
T1595.002 - Port Scanning
T1595.003 - Network Scanning
T1498 - Network Denial of Service
T1021.004 - SSH
TAGS
credential access
ddos attacks
malicious software
active scanning
distributed attacks
command and control
process injection
mirai botnet
iot botnet
network scanning
Eye Icon
SOCRadar
AI Insight

The presence of the MD5 hash 0bbf0d96f839510c8e59e6b1847322b1 is a critical indicator of compromise (IOC) signifying potential infection by the Mirai botnet, a well-known threat capable of launching large-scale Distributed Denial-of-Service (DDoS) attacks. Its association with multiple threat feeds, including Abuse.ch, URLhaus, and SOCRadar, underscores the severity of this finding. Successful exploitation by Mirai can disrupt network services, compromise IoT devices, and tarnish the organization's reputation, necessitating immediate investigation and remediation.

Summary

Hash Type:
md5
MD5:
-
SHA-1:
-
SHA-256:
-
Files:
boatnet.ppc
File Type:
-

Top Classifications

Campaign:
-
Industry:
-
Country:
-
Region:
-
Threat Actors:
-
Malware:
-

Feed Sources

Feed Source
Count
Date
Abuse.ch-Hash
2
2025-03-23
Threatview.io Feeds
2
2025-04-03
URLhaus Feeds
2
2025-03-31
SOCRadar Threat Exchange Services
1
2025-04-23

Threat Activity Timeline

Last 24 hours
Moderate
Last 7 Days
Minimal Activity
Last Month
Moderate
Last 3 Months
Minimal Activity
Extended Threat Intelligence
Free Trial

Stay ahead with proactive cyber threat warnings

Discover how SOCRadar's all-in-one platform can help protect your digital assets with extended threat intelligence, digital risk protection, and attack surface management.