{
	"id": "7de07db0-f3a7-4863-86bf-8c4b6d97cb9e",
	"created_at": "2026-04-06T00:09:06.13875Z",
	"updated_at": "2026-04-10T13:11:59.778232Z",
	"deleted_at": null,
	"sha1_hash": "03f44bad70f62f7fa9eab6bbfd8a3dc47ad84ef0",
	"title": "Blog",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 28305,
	"plain_text": "Blog\r\nBy Stefan Dasic\r\nArchived: 2026-04-05 22:34:40 UTC\r\nCybersecurity info you can’t live without\r\nWant to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect\r\nyour computer from threats.\r\nEmail Address\r\nBy submitting this form, you consent to Malwarebytes contacting you regarding products and services and using\r\nyour personal data as described in our Terms of Service and Privacy Policy.\r\nSource: https://blog.malwarebytes.com/threat-analysis/2016/08/shakti-trojan-technical-analysis/amp/\r\nhttps://blog.malwarebytes.com/threat-analysis/2016/08/shakti-trojan-technical-analysis/amp/\r\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"Malpedia"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://blog.malwarebytes.com/threat-analysis/2016/08/shakti-trojan-technical-analysis/amp/"
	],
	"report_names": [
		"amp"
	],
	"threat_actors": [],
	"ts_created_at": 1775434146,
	"ts_updated_at": 1775826719,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/03f44bad70f62f7fa9eab6bbfd8a3dc47ad84ef0.pdf",
		"text": "https://archive.orkl.eu/03f44bad70f62f7fa9eab6bbfd8a3dc47ad84ef0.txt",
		"img": "https://archive.orkl.eu/03f44bad70f62f7fa9eab6bbfd8a3dc47ad84ef0.jpg"
	}
}