If that was possible, the world’s infrastructure would be completely vulnerable to the same actor. Stealing UTXOs is not the way to make the most out of a way to crack SHA256.