{
	"id": "31e729bc-7e98-46ed-98dd-c61f076aa5ac",
	"created_at": "2026-04-06T03:36:10.799832Z",
	"updated_at": "2026-04-10T03:20:48.86239Z",
	"deleted_at": null,
	"sha1_hash": "7e352cd9e6c280a8929b0b8aa95bbf4e2c446ad1",
	"title": "PseudoManuscrypt (Malware Family)",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 28500,
	"plain_text": "PseudoManuscrypt (Malware Family)\r\nBy Fraunhofer FKIE\r\nArchived: 2026-04-06 03:16:16 UTC\r\nAccording to PCrisk, PseudoManuscrypt is the name of the malware that spies on victims. It is similar to another\r\nmalware called Manuscrypt. We have discovered PseudoManuscrypt while checking installers for pirated software\r\n(one of the examples is a fake pirated installer for SolarWinds - a network monitoring software).\r\n[TLP:WHITE] win_pseudo_manuscrypt_auto (20251219 | Detects win.pseudo_manuscrypt.)\r\nSource: https://malpedia.caad.fkie.fraunhofer.de/details/win.pseudo_manuscrypt\r\nhttps://malpedia.caad.fkie.fraunhofer.de/details/win.pseudo_manuscrypt\r\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://malpedia.caad.fkie.fraunhofer.de/details/win.pseudo_manuscrypt"
	],
	"report_names": [
		"win.pseudo_manuscrypt"
	],
	"threat_actors": [],
	"ts_created_at": 1775446570,
	"ts_updated_at": 1775791248,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/7e352cd9e6c280a8929b0b8aa95bbf4e2c446ad1.pdf",
		"text": "https://archive.orkl.eu/7e352cd9e6c280a8929b0b8aa95bbf4e2c446ad1.txt",
		"img": "https://archive.orkl.eu/7e352cd9e6c280a8929b0b8aa95bbf4e2c446ad1.jpg"
	}
}