{
	"id": "90ab7499-7eb6-49b9-bcfa-04882bdf72c8",
	"created_at": "2026-04-06T01:30:11.297581Z",
	"updated_at": "2026-04-10T03:22:12.415619Z",
	"deleted_at": null,
	"sha1_hash": "42124aed3cd2926e59815b5f0f45013c438fa142",
	"title": "en_icedid_technical_analysis_report.pdf",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 30153,
	"plain_text": "en_icedid_technical_analysis_report.pdf\r\nArchived: 2026-04-06 00:36:27 UTC\r\nSida 2 av 17\r\ni\r\nContents\r\nCONTENTS.........................................................................................................................................................İ\r\nPREVIEW .......................................................................................................................................................... 1\r\nDOCUMENT-197.RTF ANALYSIS ........................................................................................................................ 2\r\nOVERVIEW ............................................................................................................................................................. 2\r\nDETAILED\r\nANALYSIS.................................................................................................................................................. 3\r\nXXX.DLL ANALYSIS............................................................................................................................................ 5\r\nNETWORK\r\nANALYSIS................................................................................................................................................. 8\r\nDOCUMENT-197.RTF YARA RULE.................................................................................................................... 11\r\nXXX.DLL YARA RULE ....................................................................................................................................... 11\r\nMITRE ATTACK TABLE..................................................................................................................................... 13\r\nSOLUTION PROPOSALS................................................................................................................................... 13\r\nPREPARED BY ................................................................................................................................................. 15\r\nSource: https://drive.google.com/file/d/1jB0CsDvAADSrBeGxoi5gzyx8eQIiOJ2G/view\r\nhttps://drive.google.com/file/d/1jB0CsDvAADSrBeGxoi5gzyx8eQIiOJ2G/view\r\nPage 1 of 1",
	"extraction_quality": 0.8698354661791591,
	"language": "EN",
	"sources": [
		"Malpedia"
	],
	"references": [
		"https://drive.google.com/file/d/1jB0CsDvAADSrBeGxoi5gzyx8eQIiOJ2G/view"
	],
	"report_names": [
		"view"
	],
	"threat_actors": [],
	"ts_created_at": 1775439011,
	"ts_updated_at": 1775791332,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/42124aed3cd2926e59815b5f0f45013c438fa142.pdf",
		"text": "https://archive.orkl.eu/42124aed3cd2926e59815b5f0f45013c438fa142.txt",
		"img": "https://archive.orkl.eu/42124aed3cd2926e59815b5f0f45013c438fa142.jpg"
	}
}