{
	"id": "fd62e3f1-ec3b-4aac-92ad-4efc603b6c7c",
	"created_at": "2026-04-06T00:06:25.311506Z",
	"updated_at": "2026-04-10T03:21:15.721057Z",
	"deleted_at": null,
	"sha1_hash": "1d6909ba2e4191ac826f1548d368f0b1143bea56",
	"title": "SpyEye (Malware Family)",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 29294,
	"plain_text": "SpyEye (Malware Family)\r\nBy Fraunhofer FKIE\r\nArchived: 2026-04-05 14:07:03 UTC\r\nSpyEye is a malware targeting both Microsoft Windows browsers and Apple iOS Safari. Originated in Russia, it\r\nwas available in dark forums for $500+ claiming to be the \"The Next Zeus Malware\". It performed many\r\nfunctionalities typical from bankers trojan such as keyloggers, auto-fill credit card modules, email backups, config\r\nfiles (encrypted), http access, Pop3 grabbers and FTP grabbers. SpyEye allowed hackers to steal money from\r\nonline bank accounts and initiate transactions even while valid users are logged into their bank account.\r\n[TLP:WHITE] win_spyeye_auto (20251219 | Detects win.spyeye.)\r\nSource: https://malpedia.caad.fkie.fraunhofer.de/details/win.spyeye\r\nhttps://malpedia.caad.fkie.fraunhofer.de/details/win.spyeye\r\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://malpedia.caad.fkie.fraunhofer.de/details/win.spyeye"
	],
	"report_names": [
		"win.spyeye"
	],
	"threat_actors": [],
	"ts_created_at": 1775433985,
	"ts_updated_at": 1775791275,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/1d6909ba2e4191ac826f1548d368f0b1143bea56.pdf",
		"text": "https://archive.orkl.eu/1d6909ba2e4191ac826f1548d368f0b1143bea56.txt",
		"img": "https://archive.orkl.eu/1d6909ba2e4191ac826f1548d368f0b1143bea56.jpg"
	}
}