{
	"id": "32cb3e20-510d-4b50-83fd-474bdbf5cb36",
	"created_at": "2026-04-06T00:19:01.353912Z",
	"updated_at": "2026-04-10T13:11:32.25986Z",
	"deleted_at": null,
	"sha1_hash": "8df3a0598881ff93821a24b870791875d3cf96e5",
	"title": "GhostLocker Ransomware Analysis Report - ThreatMon",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 30265,
	"plain_text": "GhostLocker Ransomware Analysis Report - ThreatMon\r\nBy admin\r\nPublished: 2024-10-27 · Archived: 2026-04-05 14:42:13 UTC\r\nUnified threat visibility and continuous monitoring across every cyber asset.\r\nProtect your digital identity, monitor the dark web, and receive instant alerts – all from your phone.\r\nRun controlled DDoS simulations to evaluate infrastructure resilience and ensure your defenses withstand\r\nreal-world attacks.\r\nThreatMon delivers hands-on security services aligned with your operational workflows.\r\nAl-Powered\r\nThreat Intelligence:\r\nA Comprehensive Handbook\r\nJoin our network of trusted partners to drive innovation\r\nLearn more about ThreatMon’s mission to empower organizations with proactive and intelligent\r\ncybersecurity solutions.\r\nSource: https://threatmon.io/ghostlocker-ransomware-analysis/\r\nhttps://threatmon.io/ghostlocker-ransomware-analysis/\r\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"Malpedia"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://threatmon.io/ghostlocker-ransomware-analysis/"
	],
	"report_names": [
		"ghostlocker-ransomware-analysis"
	],
	"threat_actors": [],
	"ts_created_at": 1775434741,
	"ts_updated_at": 1775826692,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/8df3a0598881ff93821a24b870791875d3cf96e5.pdf",
		"text": "https://archive.orkl.eu/8df3a0598881ff93821a24b870791875d3cf96e5.txt",
		"img": "https://archive.orkl.eu/8df3a0598881ff93821a24b870791875d3cf96e5.jpg"
	}
}