IOC Radar Logo
IOCRadar
IOC Radar Logo
IOCRadar

467a63327fc1dacc347b6a0aad98378b

Hash
18%
SIGNAL STRENGTHSlightly Noisy
FIRST SEEN2025-04-18 23:22:58
LAST SEEN2025-04-26 10:43:17
CATEGORY
malware
information gathering
redline stealer malware detection
social engineering
MITRE
T1566 - Phishing
T1081 - Credentials in Files
T1083 - File and Directory Discovery
T1055 - Process Injection
T1486 - Data Encrypted for Impact
T1565 - Data Manipulation
T1071.001 - Web Protocol
T1499.002 - Endpoint DoS
T1499.003 - Network DoS
T1555 - Credentials from Password Stores
TAGS
distributed attacks
command and control
credential theft
malicious software
process injection
long-sleeps
contains-pe
checks-user-input
compressed
zip
Eye Icon
SOCRadar
AI Insight

The presence of the MD5 hash 467a63327fc1dacc347b6a0aad98378b within our environment signifies a critical risk, strongly indicating the potential presence of the RedLine Stealer malware. RedLine Stealer is a prevalent information-stealing malware known for exfiltrating sensitive data such as credentials, browser history, and cryptocurrency wallets, potentially leading to significant financial loss, reputational damage, and compliance violations. This IOC's association with known RedLine Stealer campaigns through sources like SOCRadar Threat Exchange Services and AlienVault OTX Feeds demands immediate investigation and remediation to prevent further compromise.

Summary

Hash Type:
md5
MD5:
-
SHA-1:
-
SHA-256:
-
Files:
archive.zip
File Type:
-

Top Classifications

Campaign:
-
Industry:
-
Country:
-
Region:
-
Threat Actors:
-
Malware:
-

Feed Sources

Feed Source
Count
Date
SOCRadar Threat Exchange Services
3
2025-04-26
AlienVault OTX Feeds
1
2025-04-18

Threat Activity Timeline

Last 24 hours
Aggressive
Last 7 Days
Minimal Activity
Last Month
Minimal Activity
Last 3 Months
Minimal Activity
Extended Threat Intelligence
Free Trial

Stay ahead with proactive cyber threat warnings

Discover how SOCRadar's all-in-one platform can help protect your digital assets with extended threat intelligence, digital risk protection, and attack surface management.