{
	"id": "14797e0f-1dd2-4ea9-9dba-906bc4de2b03",
	"created_at": "2026-04-06T00:09:03.734104Z",
	"updated_at": "2026-04-10T03:20:24.04606Z",
	"deleted_at": null,
	"sha1_hash": "b5835f38a687698615ed5c8762bb4b115439c0ba",
	"title": "Numando (Malware Family)",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 28301,
	"plain_text": "Numando (Malware Family)\r\nBy Fraunhofer FKIE\r\nArchived: 2026-04-05 17:50:28 UTC\r\nAccording to PCrisk, Numando is a banking trojan written in the Delphi programming language. As the malicious\r\nprogram's classification implies, it is designed to steal banking information. Numando primarily targets Brazil,\r\nwith seldom campaigns occurring in Mexico and Spain.\r\n[TLP:WHITE] win_numando_auto (20201014 | autogenerated rule brought to you by yara-signator)\r\nSource: https://malpedia.caad.fkie.fraunhofer.de/details/win.numando\r\nhttps://malpedia.caad.fkie.fraunhofer.de/details/win.numando\r\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://malpedia.caad.fkie.fraunhofer.de/details/win.numando"
	],
	"report_names": [
		"win.numando"
	],
	"threat_actors": [],
	"ts_created_at": 1775434143,
	"ts_updated_at": 1775791224,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/b5835f38a687698615ed5c8762bb4b115439c0ba.pdf",
		"text": "https://archive.orkl.eu/b5835f38a687698615ed5c8762bb4b115439c0ba.txt",
		"img": "https://archive.orkl.eu/b5835f38a687698615ed5c8762bb4b115439c0ba.jpg"
	}
}