{
	"id": "29d2d4a4-2664-459d-90e8-321fdb41fcd1",
	"created_at": "2026-04-06T00:09:06.5519Z",
	"updated_at": "2026-04-10T03:21:13.157522Z",
	"deleted_at": null,
	"sha1_hash": "9aed1821b27c5f66d7004bfb25deb000f7c9761b",
	"title": "en_netwire_technical_analysis_report_02.pdf",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 29278,
	"plain_text": "en_netwire_technical_analysis_report_02.pdf\r\nArchived: 2026-04-05 15:02:41 UTC\r\nSida 2 av 17\r\n1\r\nContents\r\nCONTENTS.........................................................................................................................................................İ\r\nOVERVIEW ....................................................................................................................................................... 1\r\nXOX.EXE ANALYSIS ........................................................................................................................................... 2\r\nSTATIC ANALYSIS .....................................................................................................................................................\r\n2\r\nDYNAMIC\r\nANALYSIS.................................................................................................................................................. 3\r\nOTHNL.EXE ANALYSIS....................................................................................................................................... 4\r\nDYNAMIC\r\nANALYSIS.................................................................................................................................................. 5\r\nKIPIRKIPIR.EXE ANALYSIS ................................................................................................................................. 7\r\nSTATIC ANALYSIS......................................................................................................................................................\r\n7\r\nDYNAMİC\r\nANALYSIS.................................................................................................................................................. 9\r\nYARA RULE ..................................................................................................................................................... 12\r\nMITRE ATTACK TABLE..................................................................................................................................... 14\r\nSOLUTION PROPOSALS................................................................................................................................... 14\r\nPREPARED BY ................................................................................................................................................. 15\r\nSource: https://drive.google.com/file/d/13prt2ve_sHNRRiGthB07qtfuinftJX35/view\r\nhttps://drive.google.com/file/d/13prt2ve_sHNRRiGthB07qtfuinftJX35/view\r\nPage 1 of 1",
	"extraction_quality": 0.8641317130537045,
	"language": "FR",
	"sources": [
		"Malpedia"
	],
	"references": [
		"https://drive.google.com/file/d/13prt2ve_sHNRRiGthB07qtfuinftJX35/view"
	],
	"report_names": [
		"view"
	],
	"threat_actors": [],
	"ts_created_at": 1775434146,
	"ts_updated_at": 1775791273,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/9aed1821b27c5f66d7004bfb25deb000f7c9761b.pdf",
		"text": "https://archive.orkl.eu/9aed1821b27c5f66d7004bfb25deb000f7c9761b.txt",
		"img": "https://archive.orkl.eu/9aed1821b27c5f66d7004bfb25deb000f7c9761b.jpg"
	}
}