IOC Radar Logo
IOCRadar
IOC Radar Logo
IOCRadar

c96ec96ea29372311cbef1d2b23f0e51b06f1f6184a41da985142929d9fa2f02

Suspicious Hash
53.7%
SIGNAL STRENGTHModerate Noise
FIRST SEEN2025-01-19 14:24:48
LAST SEEN2025-04-26 20:32:32
CATEGORY
malware
malicious activity
newly identified malware samples
phishing attack
social engineering
domain scanner
operation system spesific attack(windows os)
win32 malware
MITRE
T1071 - Application Layer Protocol
T1204 - User Execution
T1053 - Scheduled Task/Job
T1083 - File and Directory Discovery
T1140 - Deobfuscate/Decode Files or Information
T1055 - Process Injection
T1486 - Data Encrypted for Impact
T1565 - Data Manipulation
T1071.001 - Web Protocol
T1547 - Boot or Logon Autostart Execution
TAGS
threat actor
remote services
dns security
infrastructure acquisitionreconnaissance
email threat
distributed attacks
credential harvesting
command and control
malicious software
threat intelligence
Eye Icon
SOCRadar
AI Insight

The identification of the SHA-256 hash c96ec96ea29372311cbef1d2b23f0e51b06f1f6184a41da985142929d9fa2f02 as an Indicator of Compromise (IOC) is critically important as it likely points to the presence of malicious software within the environment. This hash has been flagged by multiple reputable threat intelligence feeds, including Abuse.ch, Cisco Talos, and MalwareBazaar, indicating a high probability of its association with malware. The potential impact of this IOC, if undetected, could range from data theft and system compromise to ransomware deployment, making its immediate investigation and remediation a top priority. Given its presence in multiple threat feeds, it's likely tied to a widespread or actively evolving malware campaign.

Summary

Hash Type:
sha256
MD5:
-
SHA-1:
-
SHA-256:
-
Files:
nvxdsync.exe
File Type:
dll

Top Classifications

Campaign:
-
Industry:
-
Country:
-
Region:
-
Threat Actors:
-
Malware:
-

Feed Sources

Feed Source
Count
Date
Abuse.ch-Hash
1
2024-11-09
Cisco-Talos
1
2025-01-19
SOCRadar Threat Exchange Services
1
2025-04-26
MalwareBazaar Feeds
1
2024-11-09

Threat Activity Timeline

Last 24 hours
Dormant
Last 7 Days
Minimal Activity
Last Month
Minimal Activity
Last 3 Months
Moderate
Extended Threat Intelligence
Free Trial

Stay ahead with proactive cyber threat warnings

Discover how SOCRadar's all-in-one platform can help protect your digital assets with extended threat intelligence, digital risk protection, and attack surface management.