IOC Radar Logo
IOCRadar
IOC Radar Logo
IOCRadar

2a60cc3e695fd653a1539ae03da5e5f7

Hash
18%
SIGNAL STRENGTHQuiet
FIRST SEEN2025-04-16 08:46:05
LAST SEEN2025-04-16 08:47:45
CATEGORY
malware
rtm banking trojan activity
win32 malware
trojan malware
MITRE
T1078 - Valid Accounts
T1005 - Data from Local System
T1105 - Ingress Tool Transfer
T1059 - Command and Scripting Interpreter
T1566 - Phishing
T1071 - Application Layer Protocol
T1056 - Input Capture
T1021 - Remote Services
T1041 - Exfiltration Over Command and Control Channel
T1204 - User Execution
TAGS
windows malware
remote services
distributed attacks
command and control
ingress tool transfer
malicious software
process injection
hvnc
data exfiltration
pe file
Eye Icon
SOCRadar
AI Insight

The presence of the MD5 hash 2a60cc3e695fd653a1539ae03da5e5f7 is a critical Indicator of Compromise (IOC) strongly suggestive of malware infection, specifically associated with the 'rtm' malware family and exhibiting behavior linked to ntdll.dll, a core Windows system library. This association indicates potential system-level manipulation and could facilitate a range of malicious activities, including data theft, privilege escalation, or remote control. Immediate investigation and remediation are crucial to prevent further compromise. This IOC has been flagged by multiple AlienVault OTX Feeds, increasing its reliability and urgency. Given the file's related object name indicates it might be a malicious DLL, there is high confidence this is a severe threat.

Summary

Hash Type:
md5
MD5:
-
SHA-1:
-
SHA-256:
-
Files:
-
File Type:
-

Top Classifications

Campaign:
-
Industry:
-
Country:
-
Region:
-
Threat Actors:
-
Malware:
-

Feed Sources

Feed Source
Count
Date
AlienVault OTX Feeds
1
2025-04-16

Threat Activity Timeline

Last 24 hours
Dormant
Last 7 Days
Dormant
Last Month
Minimal Activity
Last 3 Months
Minimal Activity
Extended Threat Intelligence
Free Trial

Stay ahead with proactive cyber threat warnings

Discover how SOCRadar's all-in-one platform can help protect your digital assets with extended threat intelligence, digital risk protection, and attack surface management.