{
	"id": "9a9987c8-00bc-4ee3-8ccc-55fdd9185d74",
	"created_at": "2026-04-06T00:16:47.397485Z",
	"updated_at": "2026-04-10T13:12:24.782105Z",
	"deleted_at": null,
	"sha1_hash": "22bada15e296a17930271c172104a2495e6b171c",
	"title": "PyArk (Malware Family)",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 32234,
	"plain_text": "PyArk (Malware Family)\r\nBy Fraunhofer FKIE\r\nArchived: 2026-04-05 15:00:43 UTC\r\npy.pyark (Back to overview)\r\nPyArk\r\nActor(s): El Machete\r\nThere is no description at this point.\r\nReferences\r\n2020-09-25 ⋅ 360 Total Security ⋅ kate\r\nAPT-C-43 steals Venezuelan military secrets to provide intelligence support for the reactionaries - HpReact\r\ncampaign\r\nPyArk El Machete\r\nThere is no Yara-Signature yet.\r\nSource: https://malpedia.caad.fkie.fraunhofer.de/details/py.pyark\r\nhttps://malpedia.caad.fkie.fraunhofer.de/details/py.pyark\r\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://malpedia.caad.fkie.fraunhofer.de/details/py.pyark"
	],
	"report_names": [
		"py.pyark"
	],
	"threat_actors": [
		{
			"id": "d303c77e-0110-471b-a3a6-37fce9ac848d",
			"created_at": "2022-10-25T15:50:23.342452Z",
			"updated_at": "2026-04-10T02:00:05.373848Z",
			"deleted_at": null,
			"main_name": "Machete",
			"aliases": [
				"APT-C-43",
				"El Machete"
			],
			"source_name": "MITRE:Machete",
			"tools": null,
			"source_id": "MITRE",
			"reports": null
		},
		{
			"id": "ba4f277c-c3da-45e6-a2fb-4ed556dbae64",
			"created_at": "2023-01-06T13:46:38.605117Z",
			"updated_at": "2026-04-10T02:00:03.03665Z",
			"deleted_at": null,
			"main_name": "El Machete",
			"aliases": [
				"G0095",
				"machete-apt",
				"APT-C-43"
			],
			"source_name": "MISPGALAXY:El Machete",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		},
		{
			"id": "edc11896-f4f1-4132-9c38-d073ccdcf5b6",
			"created_at": "2022-10-25T16:07:23.576476Z",
			"updated_at": "2026-04-10T02:00:04.674784Z",
			"deleted_at": null,
			"main_name": "El Machete",
			"aliases": [
				"APT-C-43",
				"ATK 97",
				"G0095",
				"Operation HpReact",
				"TAG-NS1",
				"TEMP.Andromeda"
			],
			"source_name": "ETDA:El Machete",
			"tools": [
				"El Machete",
				"ForeIT",
				"LOLBAS",
				"LOLBins",
				"Living off the Land",
				"Loki",
				"Loki.Rat",
				"LokiBot",
				"LokiPWS",
				"Pyark"
			],
			"source_id": "ETDA",
			"reports": null
		}
	],
	"ts_created_at": 1775434607,
	"ts_updated_at": 1775826744,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/22bada15e296a17930271c172104a2495e6b171c.pdf",
		"text": "https://archive.orkl.eu/22bada15e296a17930271c172104a2495e6b171c.txt",
		"img": "https://archive.orkl.eu/22bada15e296a17930271c172104a2495e6b171c.jpg"
	}
}