IOC Radar Logo
IOCRadar
IOC Radar Logo
IOCRadar

b6b8eea754a585884fa912f99aa44ed1

Malicious Hash
87.88%
SIGNAL STRENGTHModerate Noise
FIRST SEEN2025-03-21 16:26:10
LAST SEEN2025-04-02 23:59:03
CATEGORY
malware
iot/ics attack
port scanner
attacker
malicious activity
mirai botnet activity: port scanning and brute force attempts
MITRE
T1105 - Ingress Tool Transfer
T1566 - Phishing
T1071.004 - DNS
T1190 - Exploit Public-Facing Application
T1053.005 - Scheduled Task
T1595.001 - Active Scanning
T1595.002 - Port Scanning
T1595.003 - Network Scanning
T1498 - Network Denial of Service
T1021.004 - SSH
TAGS
ddos attacks
network scanning
credential access
mirai botnet
iot botnet
threat actor
distributed attacks
active scanning
command and control
malicious software
Eye Icon
SOCRadar
AI Insight

The presence of MD5 hash b6b8eea754a585884fa912f99aa44ed1 is a critical indicator of compromise, suggesting potential infection by the Mirai botnet. Mirai targets vulnerable IoT devices, turning them into bots for large-scale DDoS attacks. A successful Mirai infection could lead to significant disruption of network services, compromise of sensitive data, and reputational damage. This IOC is associated with a known Mirai campaign, emphasizing the urgency for immediate action to identify and remediate affected systems.

Summary

Hash Type:
md5
MD5:
-
SHA-1:
-
SHA-256:
-
Files:
-
File Type:
-

Top Classifications

Campaign:
-
Industry:
-
Country:
-
Region:
-
Threat Actors:
-
Malware:
-

Feed Sources

Feed Source
Count
Date
Cyber Threat Alliance (CTA)
1
2025-03-31
Abuse.ch-Hash
2
2025-03-22
Threatview.io Feeds
2
2025-04-03
URLhaus Feeds
26
2025-03-31

Threat Activity Timeline

Last 24 hours
Dormant
Last 7 Days
Dormant
Last Month
Aggressive
Last 3 Months
Moderate
Extended Threat Intelligence
Free Trial

Stay ahead with proactive cyber threat warnings

Discover how SOCRadar's all-in-one platform can help protect your digital assets with extended threat intelligence, digital risk protection, and attack surface management.