{
	"id": "55aeaca4-537f-4f1b-ad92-ca2b5ff31afb",
	"created_at": "2026-04-06T00:19:11.6277Z",
	"updated_at": "2026-04-10T03:21:28.501355Z",
	"deleted_at": null,
	"sha1_hash": "8edb0224e0d078e57da3727fa23f8c3287e9603f",
	"title": "DarkTequila (Malware Family)",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 28265,
	"plain_text": "DarkTequila (Malware Family)\r\nBy Fraunhofer FKIE\r\nArchived: 2026-04-05 16:08:16 UTC\r\nDark Tequila is a complex malicious campaign targeting Mexican users, with the primary purpose of stealing\r\nfinancial information, as well as login credentials to popular websites that range from code versioning repositories\r\nto public file storage accounts and domain registrars.\r\n[TLP:WHITE] win_darktequila_auto (20251219 | Detects win.darktequila.)\r\nSource: https://malpedia.caad.fkie.fraunhofer.de/details/win.darktequila\r\nhttps://malpedia.caad.fkie.fraunhofer.de/details/win.darktequila\r\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://malpedia.caad.fkie.fraunhofer.de/details/win.darktequila"
	],
	"report_names": [
		"win.darktequila"
	],
	"threat_actors": [],
	"ts_created_at": 1775434751,
	"ts_updated_at": 1775791288,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/8edb0224e0d078e57da3727fa23f8c3287e9603f.pdf",
		"text": "https://archive.orkl.eu/8edb0224e0d078e57da3727fa23f8c3287e9603f.txt",
		"img": "https://archive.orkl.eu/8edb0224e0d078e57da3727fa23f8c3287e9603f.jpg"
	}
}