{
	"id": "74b3850a-729c-4be1-a8a7-56a88ffc76f7",
	"created_at": "2026-04-06T00:17:44.821176Z",
	"updated_at": "2026-04-10T03:20:48.942937Z",
	"deleted_at": null,
	"sha1_hash": "6ff64e8694845562a3dd79564ce97d5809169f83",
	"title": "Pushdo (Malware Family)",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 28184,
	"plain_text": "Pushdo (Malware Family)\r\nBy Fraunhofer FKIE\r\nArchived: 2026-04-05 23:19:21 UTC\r\nPushdo is usually classified as a \"downloader\" trojan - meaning its true purpose is to download and install\r\nadditional malicious software. There are dozens of downloader trojan families out there, but Pushdo is actually\r\nmore sophisticated than most, but that sophistication lies in the Pushdo control server rather than the trojan.\r\n[TLP:WHITE] win_pushdo_auto (20251219 | Detects win.pushdo.)\r\nSource: https://malpedia.caad.fkie.fraunhofer.de/details/win.pushdo\r\nhttps://malpedia.caad.fkie.fraunhofer.de/details/win.pushdo\r\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://malpedia.caad.fkie.fraunhofer.de/details/win.pushdo"
	],
	"report_names": [
		"win.pushdo"
	],
	"threat_actors": [],
	"ts_created_at": 1775434664,
	"ts_updated_at": 1775791248,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/6ff64e8694845562a3dd79564ce97d5809169f83.pdf",
		"text": "https://archive.orkl.eu/6ff64e8694845562a3dd79564ce97d5809169f83.txt",
		"img": "https://archive.orkl.eu/6ff64e8694845562a3dd79564ce97d5809169f83.jpg"
	}
}