{
	"id": "4c5bc13b-0bcb-42cd-8696-f75728434e75",
	"created_at": "2026-04-06T00:11:41.518663Z",
	"updated_at": "2026-04-10T03:21:02.70364Z",
	"deleted_at": null,
	"sha1_hash": "d22637001241c76d0844eb22bf7dcdafe59c1407",
	"title": "RoyalCli (Malware Family)",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 26354,
	"plain_text": "RoyalCli (Malware Family)\r\nBy Fraunhofer FKIE\r\nArchived: 2026-04-05 23:39:25 UTC\r\n[TLP:WHITE] win_royalcli_auto (20251219 | Detects win.royalcli.)\r\nSource: https://malpedia.caad.fkie.fraunhofer.de/details/win.royalcli\r\nhttps://malpedia.caad.fkie.fraunhofer.de/details/win.royalcli\r\nPage 1 of 1\n\n  https://malpedia.caad.fkie.fraunhofer.de/details/win.royalcli \nRoyalCli (Malware Family) \nBy Fraunhofer FKIE  \nArchived: 2026-04-05 23:39:25 UTC \n[TLP:WHITE] win_royalcli_auto (20251219 | Detects win.royalcli.)\nSource: https://malpedia.caad.fkie.fraunhofer.de/details/win.royalcli   \n   Page 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://malpedia.caad.fkie.fraunhofer.de/details/win.royalcli"
	],
	"report_names": [
		"win.royalcli"
	],
	"threat_actors": [],
	"ts_created_at": 1775434301,
	"ts_updated_at": 1775791262,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/d22637001241c76d0844eb22bf7dcdafe59c1407.pdf",
		"text": "https://archive.orkl.eu/d22637001241c76d0844eb22bf7dcdafe59c1407.txt",
		"img": "https://archive.orkl.eu/d22637001241c76d0844eb22bf7dcdafe59c1407.jpg"
	}
}