{
	"id": "4e0a6c44-fd5e-496e-aaec-9a685ebcdf60",
	"created_at": "2026-04-06T00:11:07.853713Z",
	"updated_at": "2026-04-10T03:21:27.441157Z",
	"deleted_at": null,
	"sha1_hash": "cfa695a869962169b0da9d67be31a340535f314a",
	"title": "murkytop (Malware Family)",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 28259,
	"plain_text": "murkytop (Malware Family)\r\nBy Fraunhofer FKIE\r\nArchived: 2026-04-05 16:23:05 UTC\r\na command-line reconnaissance tool. It can be used to execute files as a different user, move, and delete files\r\nlocally, schedule remote AT jobs, perform host discovery on connected networks, scan for open ports on hosts in a\r\nconnected network, and retrieve information about the OS, users, groups, and shares on remote hosts.\r\n[TLP:WHITE] win_murkytop_auto (20251219 | Detects win.murkytop.)\r\nSource: https://malpedia.caad.fkie.fraunhofer.de/details/win.murkytop\r\nhttps://malpedia.caad.fkie.fraunhofer.de/details/win.murkytop\r\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://malpedia.caad.fkie.fraunhofer.de/details/win.murkytop"
	],
	"report_names": [
		"win.murkytop"
	],
	"threat_actors": [],
	"ts_created_at": 1775434267,
	"ts_updated_at": 1775791287,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/cfa695a869962169b0da9d67be31a340535f314a.pdf",
		"text": "https://archive.orkl.eu/cfa695a869962169b0da9d67be31a340535f314a.txt",
		"img": "https://archive.orkl.eu/cfa695a869962169b0da9d67be31a340535f314a.jpg"
	}
}