IOC Radar Logo
IOCRadar
IOC Radar Logo
IOCRadar

f48f3f2a77f82e46142f1d8847bd2c0074826b61c7365a5b5815b0e4ac181c97

Suspicious Hash
27.25%
SIGNAL STRENGTHVery Noisy
FIRST SEEN2024-11-09 04:23:33
LAST SEEN2025-04-25 22:29:53
CATEGORY
malware
malicious activity
newly identified malware samples
MITRE
T1574 - Hijack Execution Flow
T1105 - Ingress Tool Transfer
T1059 - Command and Scripting Interpreter
T1566 - Phishing
T1027 - Obfuscated Files or Information
T1071 - Application Layer Protocol
T1204 - User Execution
T1053 - Scheduled Task/Job
T1083 - File and Directory Discovery
T1140 - Deobfuscate/Decode Files or Information
TAGS
threat intelligence
malicious software
process injection
distributed attacks
command and control
threat actor
iocs
dll
malware variant
document
Eye Icon
SOCRadar
AI Insight

The presence of the SHA256 hash f48f3f2a77f82e46142f1d8847bd2c0074826b61c7365a5b5815b0e4ac181c97 constitutes a significant Indicator of Compromise (IOC), strongly suggestive of malware infection. Multiple reputable threat intelligence feeds, including Abuse.ch and Maltiverse, identify this hash as associated with malicious activity. Specifically, it is linked to Lumma Stealer, an information-stealing malware notorious for exfiltrating sensitive data such as credentials, cookies, and cryptocurrency wallets. This malware poses a severe threat, potentially leading to financial loss, data breaches, and reputational damage. Immediate action is required to identify and eradicate any systems compromised by this malware.

Summary

Hash Type:
sha256
MD5:
-
SHA-1:
-
SHA-256:
-
Files:
-
File Type:
-

Top Classifications

Campaign:
-
Industry:
-
Country:
-
Region:
-
Threat Actors:
-
Malware:
-

Feed Sources

Feed Source
Count
Date
Abuse.ch-Hash
1
2024-11-09
Abuse.ch-ThreatFox-C&Cs
1
2025-04-02
Maltiverse Hash List
1
2024-11-09
VMRay
1
2024-11-08

Threat Activity Timeline

Last 24 hours
Minimal Activity
Last 7 Days
Minimal Activity
Last Month
Moderate
Last 3 Months
Moderate
Extended Threat Intelligence
Free Trial

Stay ahead with proactive cyber threat warnings

Discover how SOCRadar's all-in-one platform can help protect your digital assets with extended threat intelligence, digital risk protection, and attack surface management.