{
	"id": "8b269eaf-5662-49b9-a3d9-f51513eb3238",
	"created_at": "2026-04-06T01:29:58.423373Z",
	"updated_at": "2026-04-10T13:12:35.311572Z",
	"deleted_at": null,
	"sha1_hash": "a404752b8241b2f74e81a980c8f85d4b2c476fd7",
	"title": "Houdini (Malware Family)",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 28352,
	"plain_text": "Houdini (Malware Family)\r\nBy Fraunhofer FKIE\r\nArchived: 2026-04-06 00:50:15 UTC\r\nHoudini is a VBS-based RAT dating back to 2013. Past in the days, it used to be wrapped in an .exe but started\r\nbeing spamvertized or downloaded by other malware directly as .vbs in 2018. In 2019, WSHRAT appeared, a\r\nJavascript-based version of Houdini, recoded by the name of Kognito.\r\n[TLP:WHITE] win_houdini_auto (20201014 | autogenerated rule brought to you by yara-signator)\r\nSource: https://malpedia.caad.fkie.fraunhofer.de/details/win.houdini\r\nhttps://malpedia.caad.fkie.fraunhofer.de/details/win.houdini\r\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://malpedia.caad.fkie.fraunhofer.de/details/win.houdini"
	],
	"report_names": [
		"win.houdini"
	],
	"threat_actors": [],
	"ts_created_at": 1775438998,
	"ts_updated_at": 1775826755,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/a404752b8241b2f74e81a980c8f85d4b2c476fd7.pdf",
		"text": "https://archive.orkl.eu/a404752b8241b2f74e81a980c8f85d4b2c476fd7.txt",
		"img": "https://archive.orkl.eu/a404752b8241b2f74e81a980c8f85d4b2c476fd7.jpg"
	}
}