{
	"id": "bf7f7205-f3e5-432b-9d44-379a048f9c00",
	"created_at": "2026-04-06T00:15:32.758831Z",
	"updated_at": "2026-04-10T13:12:48.795473Z",
	"deleted_at": null,
	"sha1_hash": "74f60c294b95d1c2fefa4a3111b67b199979dbb1",
	"title": "Automated Malware Analysis | Malware Analysis Tool",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 553646,
	"plain_text": "Automated Malware Analysis | Malware Analysis Tool\r\nArchived: 2026-04-05 16:17:39 UTC\r\nLeverage Leading Malware Analysis Tools\r\nUsing malware analysis tools is vital for identifying indicators and gaining context on threats. Automate file\r\nsample submissions for analysis and report output ingestion and processing.\r\nRespond Faster to Attacks\r\nUse intel from malware analyses to speed analysis, threat detection and blocking, and incident response activities.\r\nhttps://threatconnect.com/blog/crimsonias-listening-for-an-3v1l-user/\r\nPage 1 of 2\n\nAutomate Malware Search and Discovery\r\nLeverage playbook automation and intel from malware analyses to determine the scope of an attack and speed\r\nresponse activities.\r\nSource: https://threatconnect.com/blog/crimsonias-listening-for-an-3v1l-user/\r\nhttps://threatconnect.com/blog/crimsonias-listening-for-an-3v1l-user/\r\nPage 2 of 2",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"Malpedia"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://threatconnect.com/blog/crimsonias-listening-for-an-3v1l-user/"
	],
	"report_names": [
		"crimsonias-listening-for-an-3v1l-user"
	],
	"threat_actors": [],
	"ts_created_at": 1775434532,
	"ts_updated_at": 1775826768,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/74f60c294b95d1c2fefa4a3111b67b199979dbb1.pdf",
		"text": "https://archive.orkl.eu/74f60c294b95d1c2fefa4a3111b67b199979dbb1.txt",
		"img": "https://archive.orkl.eu/74f60c294b95d1c2fefa4a3111b67b199979dbb1.jpg"
	}
}