{
	"id": "88056b71-8bb4-4167-8cdc-d30313e10ccd",
	"created_at": "2026-04-06T00:22:16.760337Z",
	"updated_at": "2026-04-10T13:12:06.400331Z",
	"deleted_at": null,
	"sha1_hash": "8b4a4a8690e234d6eda83ce7d9b1b1e44dce71c0",
	"title": "4h_rat (Malware Family)",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 37505,
	"plain_text": "4h_rat (Malware Family)\r\nBy Fraunhofer FKIE\r\nArchived: 2026-04-05 16:39:31 UTC\r\nwin.4h_rat (Back to overview)\r\n4h_rat\r\nActor(s): Putter Panda\r\nThere is no description at this point.\r\nReferences\r\n2023-09-25 ⋅ cocomelonc ⋅ cocomelonc\r\nMalware development trick - part 36: Enumerate process modules. Simple C++ example.\r\n4h_rat Aria-body\r\n2021-09-04 ⋅ cocomelonc ⋅ cocomelonc\r\nAV engines evasion for C++ simple malware: part 1\r\n4h_rat Azorult BADCALL BadNews BazarBackdoor Cardinal RAT\r\n2017-05-31 ⋅ MITRE ⋅ MITRE ATT\u0026CK\r\nPutter Panda\r\n4h_rat pngdowner APT2\r\n2014-06-09 ⋅ CrowdStrike ⋅ CrowdStrike\r\nCrowdstrike Intelligence Report: Putter Panda\r\n4h_rat\r\nThere is no Yara-Signature yet.\r\nSource: https://malpedia.caad.fkie.fraunhofer.de/details/win.4h_rat\r\nhttps://malpedia.caad.fkie.fraunhofer.de/details/win.4h_rat\r\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://malpedia.caad.fkie.fraunhofer.de/details/win.4h_rat"
	],
	"report_names": [
		"win.4h_rat"
	],
	"threat_actors": [
		{
			"id": "abd17060-62f6-4743-95e8-3f23c82cc229",
			"created_at": "2022-10-25T15:50:23.428772Z",
			"updated_at": "2026-04-10T02:00:05.365894Z",
			"deleted_at": null,
			"main_name": "Putter Panda",
			"aliases": [
				"Putter Panda",
				"APT2",
				"MSUpdater"
			],
			"source_name": "MITRE:Putter Panda",
			"tools": [
				"pngdowner",
				"3PARA RAT",
				"4H RAT",
				"httpclient"
			],
			"source_id": "MITRE",
			"reports": null
		},
		{
			"id": "468b7acd-895c-4c93-b572-b42f4035b4d4",
			"created_at": "2023-01-06T13:46:38.265636Z",
			"updated_at": "2026-04-10T02:00:02.902436Z",
			"deleted_at": null,
			"main_name": "APT2",
			"aliases": [
				"MSUpdater",
				"4HCrew",
				"SearchFire",
				"TG-6952",
				"G0024",
				"PLA Unit 61486",
				"PUTTER PANDA"
			],
			"source_name": "MISPGALAXY:APT2",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		},
		{
			"id": "4b066585-3591-4ddd-b3cc-f4e19e0e00ef",
			"created_at": "2022-10-25T16:07:24.086915Z",
			"updated_at": "2026-04-10T02:00:04.862463Z",
			"deleted_at": null,
			"main_name": "Putter Panda",
			"aliases": [
				"4HCrew",
				"APT 2",
				"G0024",
				"Group 36",
				"Putter Panda",
				"SearchFire",
				"TG-6952"
			],
			"source_name": "ETDA:Putter Panda",
			"tools": [
				"3PARA RAT",
				"4H RAT",
				"4h_rat",
				"MSUpdater",
				"httpclient",
				"pngdowner"
			],
			"source_id": "ETDA",
			"reports": null
		}
	],
	"ts_created_at": 1775434936,
	"ts_updated_at": 1775826726,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/8b4a4a8690e234d6eda83ce7d9b1b1e44dce71c0.pdf",
		"text": "https://archive.orkl.eu/8b4a4a8690e234d6eda83ce7d9b1b1e44dce71c0.txt",
		"img": "https://archive.orkl.eu/8b4a4a8690e234d6eda83ce7d9b1b1e44dce71c0.jpg"
	}
}