IOC Radar Logo
IOCRadar
IOC Radar Logo
IOCRadar

99a2f1e2ba822ed46faab453b225f6859b144cbed73030bee3725cc48fb3a481

Suspicious Hash
24%
SIGNAL STRENGTHModerate Noise
FIRST SEEN2025-03-08 15:25:59
LAST SEEN2025-04-22 22:17:33
CATEGORY
malware
malicious activity via tor network
port scanner
MITRE
T1071 - Application Layer Protocol
T1190 - Exploit Public-Facing Application
T1041 - Exfiltration Over Command and Control Channel
T1595.001 - Active Scanning
T1595.002 - Port Scanning
T1595.003 - Network Scanning
T1083 - File and Directory Discovery
T1021.001 - Remote Services
T1071.001 - Web Protocol
T1496 - Resource Hijacking
TAGS
malware distribution
network scanning
credential access
command and control
malicious software
active scanning
process injection
distributed attacks
botnet
Eye Icon
SOCRadar
AI Insight

The presence of SHA256 hash 99a2f1e2ba822ed46faab453b225f6859b144cbed73030bee3725cc48fb3a481 as an Indicator of Compromise (IOC) signals potential malicious activity within the environment. This hash, identified by AlienVault OTX feeds and associated with TOR node activity and referenced in external reports from VirusTotal, suggests a potential attempt to anonymize communications or other malicious activity. The use of TOR can mask the origin of attacks, hindering investigations and enabling persistence. Successful exploitation could lead to data exfiltration, command and control (C2) communication, or deployment of further malicious payloads, potentially resulting in significant financial or reputational damage to the organization.

Summary

Hash Type:
sha256
MD5:
-
SHA-1:
-
SHA-256:
-
Files:
-
File Type:
-

Top Classifications

Campaign:
-
Industry:
-
Country:
-
Region:
-
Threat Actors:
-
Malware:
-

Feed Sources

Feed Source
Count
Date
AlienVault OTX Feeds
9
2025-04-22

Threat Activity Timeline

Last 24 hours
Minimal Activity
Last 7 Days
Minimal Activity
Last Month
Minimal Activity
Last 3 Months
Minimal Activity
Extended Threat Intelligence
Free Trial

Stay ahead with proactive cyber threat warnings

Discover how SOCRadar's all-in-one platform can help protect your digital assets with extended threat intelligence, digital risk protection, and attack surface management.