{
	"id": "7b8a1385-bc5a-4ce0-bb34-2a52a8423a0d",
	"created_at": "2026-04-06T00:11:40.694315Z",
	"updated_at": "2026-04-10T03:21:14.417005Z",
	"deleted_at": null,
	"sha1_hash": "6eeb2c845c70f9315897fca7b734c2cbdb434d29",
	"title": "lokibot__technical_analysis_report.pdf",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 30226,
	"plain_text": "lokibot__technical_analysis_report.pdf\r\nArchived: 2026-04-05 23:17:10 UTC\r\nSida 2 av 29\r\nContents\r\nIntroduction............................................................................................................................................. 3\r\nSummary ................................................................................................................................................. 4\r\nExcel Document Analysis......................................................................................................................... 5\r\nvbc.exe Analysis....................................................................................................................................... 7\r\nzhxpwnkb2xox5j.dll File Analysis............................................................................................................. 8\r\ngpz8ar381j61mdp9ky2 Analysis............................................................................................................. 9\r\n38pl2h5z2dja Analysis.......................................................................................................................... 10\r\n1.exe File Analysis.................................................................................................................................. 12\r\nNetwork Analysis................................................................................................................................... 20\r\nProtection Methods / Mitigations......................................................................................................... 22\r\nExcel Document Yara Rule..................................................................................................................... 23\r\nvbc.exe Yara Rule .................................................................................................................................. 24\r\nzhxpwnkb2xox5j.dll Yara Rule............................................................................................................... 25\r\ngpz8ar381j61mdp9ky2 Yara Rule.......................................................................................................... 26\r\n38pl2h5z2dja Yara Rule ......................................................................................................................... 27\r\n1.exe Yara Rule...................................................................................................................................... 28\r\nPrepared BY........................................................................................................................................... 29\r\n2\r\nSource: https://drive.google.com/file/d/144cOnM6fxfuBeP0V2JQshp8C0Zlk_0kH/view\r\nhttps://drive.google.com/file/d/144cOnM6fxfuBeP0V2JQshp8C0Zlk_0kH/view\r\nPage 1 of 1",
	"extraction_quality": 0.8673083778966132,
	"language": "EN",
	"sources": [
		"Malpedia"
	],
	"references": [
		"https://drive.google.com/file/d/144cOnM6fxfuBeP0V2JQshp8C0Zlk_0kH/view"
	],
	"report_names": [
		"view"
	],
	"threat_actors": [],
	"ts_created_at": 1775434300,
	"ts_updated_at": 1775791274,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/6eeb2c845c70f9315897fca7b734c2cbdb434d29.pdf",
		"text": "https://archive.orkl.eu/6eeb2c845c70f9315897fca7b734c2cbdb434d29.txt",
		"img": "https://archive.orkl.eu/6eeb2c845c70f9315897fca7b734c2cbdb434d29.jpg"
	}
}