{
	"id": "7352c4d2-1f01-4215-9629-495b96c040e6",
	"created_at": "2026-04-06T02:12:07.607283Z",
	"updated_at": "2026-04-10T13:11:46.040694Z",
	"deleted_at": null,
	"sha1_hash": "d05099f2a1cec20e0faf825a4829a3a05c10ec30",
	"title": "Mispadu (Malware Family)",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 28595,
	"plain_text": "Mispadu (Malware Family)\r\nBy Fraunhofer FKIE\r\nArchived: 2026-04-06 02:10:08 UTC\r\nAccording to ESET Research, Mispadu is an ambitious Latin American banking trojan that utilizes McDonald’s\r\nmalvertising and extends its attack surface to web browsers. It is used to target the general public and its main\r\ngoals are monetary and credential theft. In Brazil, ESET has seen it distributing a malicious Google Chrome\r\nextension that attempts to steal credit card data and online banking data, and that compromises the Boleto\r\npayment system.\r\n[TLP:WHITE] win_mispadu_auto (20201014 | autogenerated rule brought to you by yara-signator)\r\nSource: https://malpedia.caad.fkie.fraunhofer.de/details/win.mispadu\r\nhttps://malpedia.caad.fkie.fraunhofer.de/details/win.mispadu\r\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://malpedia.caad.fkie.fraunhofer.de/details/win.mispadu"
	],
	"report_names": [
		"win.mispadu"
	],
	"threat_actors": [],
	"ts_created_at": 1775441527,
	"ts_updated_at": 1775826706,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/d05099f2a1cec20e0faf825a4829a3a05c10ec30.pdf",
		"text": "https://archive.orkl.eu/d05099f2a1cec20e0faf825a4829a3a05c10ec30.txt",
		"img": "https://archive.orkl.eu/d05099f2a1cec20e0faf825a4829a3a05c10ec30.jpg"
	}
}