IOC Radar Logo
IOCRadar
IOC Radar Logo
IOCRadar

48d3c23dac49271014f600f0d1ab92da56af4181c69da57774ac37dea8c45679

Hash
18%
SIGNAL STRENGTHSlightly Noisy
FIRST SEEN2025-04-22 15:05:54
LAST SEEN2025-04-24 08:34:31
CATEGORY
honeypot
malware
attacker
malicious activity
sftp attack
brute force and port scanning activity
ssh attack
port scanner
MITRE
T1595.003 - Network Scanning
T1195.002 - Compromise Software Supply Chain
T1021.004 - SSH
T1055 - Process Injection
T1110 - Brute Force
T1059.004 - Unix Shell
T1486 - Data Encrypted for Impact
T1565 - Data Manipulation
T1078.004 - Cloud Accounts
T1071.001 - Web Protocol
TAGS
file transfer
malicious software
active scanning
process injection
credential stuffing
credential access
decoy system
distributed attacks
network scanning
threat actor
Eye Icon
SOCRadar
AI Insight

The SHA256 hash 48d3c23dac49271014f600f0d1ab92da56af4181c69da57774ac37dea8c45679 represents a critical Indicator of Compromise (IOC), potentially indicative of malicious software or a compromised file. Its detection warrants immediate attention due to the potential for severe impact, including system compromise, data theft, and unauthorized access. The association with the 'LCIA HoneyNet Data - April 2025 - Cowrie' and reports from https://github.com/telekom-security/tpotce suggests a connection to intrusion attempts and/or identified malware samples observed within honeypot environments. The observed activity aligns with broader threat landscapes targeting vulnerable systems, commonly exploited for lateral movement and data exfiltration. Failure to address this IOC could lead to a significant security breach.

Summary

Hash Type:
sha256
MD5:
-
SHA-1:
-
SHA-256:
-
Files:
-
File Type:
-

Top Classifications

Campaign:
-
Industry:
-
Country:
-
Region:
-
Threat Actors:
-
Malware:
-

Feed Sources

Feed Source
Count
Date
AlienVault OTX Feeds
23
2025-04-24

Threat Activity Timeline

Last 24 hours
Very Aggressive
Last 7 Days
Very Aggressive
Last Month
Aggressive
Last 3 Months
Moderate
Extended Threat Intelligence
Free Trial

Stay ahead with proactive cyber threat warnings

Discover how SOCRadar's all-in-one platform can help protect your digital assets with extended threat intelligence, digital risk protection, and attack surface management.