PULSE NAME
Q1 2026 Malware Statistics Report for Windows Database Servers
WHITE Larva-26002 AlienVault 2026-04-14 Modified: 2026-04-14
13
IOCs
MEDIUM VOLUME
During the first quarter of 2026, Windows-based MS-SQL and MySQL database servers experienced consistent malicious attacks with a temporary decrease in February before rising again in March. The primary threat actor, Larva-26002, leveraged various utilities including BCP, curl, bitsadmin, and PowerShell to deploy a Go-based scanner called ICE Cloud, which contained Turkish language strings and C&C-based scanning capabilities. This tool attempted MS-SQL authentication using predefined credentials. Attack methods primarily consisted of brute force attacks, dictionary attacks, and exploitation of unpatched systems with misconfigured accounts stemming from inadequate account management practices.
MITRE ATT&CK & Malware Families
ATT&CK TECHNIQUES
MALWARE FAMILIES
ICE Cloud Gh0stRAT CLRShell CoinMiner LoveMiner MyKings Shadowforce JuicyPotato Netcat
Indicators of Compromise (3 / 13 total)
All FileHash-MD5 FileHash-SHA1 FileHash-SHA256 IPv4 domain
TYPEINDICATORDESCRIPTIONCREATED
FileHash-SHA256 6130a96f19ab4e3af5dfaf16fef8d8c176d9cc508b0422032ef4c18a4b65ef19 2026-04-14
FileHash-SHA256 7ac9ea9f9d9a25c73d3267e7466cb0643f4e981bda36013ee9264feebe38b51c 2026-04-14
FileHash-SHA256 9084885412af5ae242082869ebb204bcc855db4216bda0b399d06097d193aab9 2026-04-14