{
	"id": "4a017113-b5dd-413c-9be9-9885865bc859",
	"created_at": "2026-04-06T00:10:52.871335Z",
	"updated_at": "2026-04-10T03:21:06.2083Z",
	"deleted_at": null,
	"sha1_hash": "37ec3a524d69c39bc7b139fbd7b291b9a49199f9",
	"title": "OskiStealer_en.pdf",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 29518,
	"plain_text": "OskiStealer_en.pdf\r\nArchived: 2026-04-05 21:35:09 UTC\r\nSida 3 av 25\r\n1\r\nFront Preview\r\nOskiStealer is a malware of the Information Stealer strain, first seen in November 2019.\r\nIn Norse mythology, the word Oski means Viking Warrior, Viking God, etc.\r\nComputers infected with this malware;\r\n• Credit card information saved in web browsers,\r\n• Cookie information stored in web browsers,\r\n• Crypto wallet information saved in web browsers,\r\n• System information on the computer,\r\n• Information about registered Outlook accounts,\r\n• Computerized credentials,\r\n• It allows the computer to access the screenshot.\r\nSource: https://drive.google.com/file/d/11AusNbBqFb0eoUADOPyltSWHU7Z2XHEP/view\r\nhttps://drive.google.com/file/d/11AusNbBqFb0eoUADOPyltSWHU7Z2XHEP/view\r\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"Malpedia"
	],
	"references": [
		"https://drive.google.com/file/d/11AusNbBqFb0eoUADOPyltSWHU7Z2XHEP/view"
	],
	"report_names": [
		"view"
	],
	"threat_actors": [],
	"ts_created_at": 1775434252,
	"ts_updated_at": 1775791266,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/37ec3a524d69c39bc7b139fbd7b291b9a49199f9.pdf",
		"text": "https://archive.orkl.eu/37ec3a524d69c39bc7b139fbd7b291b9a49199f9.txt",
		"img": "https://archive.orkl.eu/37ec3a524d69c39bc7b139fbd7b291b9a49199f9.jpg"
	}
}