{
	"id": "0453c559-120f-4e2a-819a-12582c6d16f1",
	"created_at": "2026-04-06T00:16:40.552552Z",
	"updated_at": "2026-04-10T03:20:56.944056Z",
	"deleted_at": null,
	"sha1_hash": "7c8bad22101602f4c67a85e403aa20e467f82991",
	"title": "NESTEGG (Malware Family)",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 28368,
	"plain_text": "NESTEGG (Malware Family)\r\nBy Fraunhofer FKIE\r\nArchived: 2026-04-05 22:38:55 UTC\r\nNESTEGG is a memory-only backdoor that can proxy commands to other\r\ninfected systems using a custom routing scheme. It accepts commands to\r\nupload and download files, list and delete files, list and terminate processes, and\r\nstart processes. NESTEGG also creates Windows Firewall rules that allows the\r\nbackdoor to bind to a specified port number to allow for inbound traffic.\r\n[TLP:WHITE] win_nestegg_auto (20251219 | Detects win.nestegg.)\r\nSource: https://malpedia.caad.fkie.fraunhofer.de/details/win.nestegg\r\nhttps://malpedia.caad.fkie.fraunhofer.de/details/win.nestegg\r\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://malpedia.caad.fkie.fraunhofer.de/details/win.nestegg"
	],
	"report_names": [
		"win.nestegg"
	],
	"threat_actors": [],
	"ts_created_at": 1775434600,
	"ts_updated_at": 1775791256,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/7c8bad22101602f4c67a85e403aa20e467f82991.pdf",
		"text": "https://archive.orkl.eu/7c8bad22101602f4c67a85e403aa20e467f82991.txt",
		"img": "https://archive.orkl.eu/7c8bad22101602f4c67a85e403aa20e467f82991.jpg"
	}
}