{
	"id": "2153658e-399d-4e1f-9449-f2325d60dc50",
	"created_at": "2026-04-06T00:13:21.269881Z",
	"updated_at": "2026-04-10T03:32:35.32706Z",
	"deleted_at": null,
	"sha1_hash": "f4b88065b8be8e2d7baa7733c6253025ac6b60f5",
	"title": "CrypticConvo (Malware Family)",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 28747,
	"plain_text": "CrypticConvo (Malware Family)\r\nBy Fraunhofer FKIE\r\nArchived: 2026-04-05 20:39:36 UTC\r\nCrypticConvo is a dropper trojan which appears to be embedded in an automatic generator framework to deliver\r\nthe FakeM trojan. According to PaloaltoNetworks CrypticConvo and several additional trojans are believed to be\r\nincluded in a meta framework used by the \"Scarlet Mimic\" threat actor in order to quickly evade AV systems.\r\n[TLP:WHITE] win_cryptic_convo_auto (20251219 | Detects win.cryptic_convo.)\r\nSource: https://malpedia.caad.fkie.fraunhofer.de/details/win.cryptic_convo\r\nhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cryptic_convo\r\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://malpedia.caad.fkie.fraunhofer.de/details/win.cryptic_convo"
	],
	"report_names": [
		"win.cryptic_convo"
	],
	"threat_actors": [
		{
			"id": "8c5c318c-0e71-4184-92bb-d1c28f68a411",
			"created_at": "2022-10-25T15:50:23.692481Z",
			"updated_at": "2026-04-10T02:00:05.409574Z",
			"deleted_at": null,
			"main_name": "Scarlet Mimic",
			"aliases": [
				"Scarlet Mimic"
			],
			"source_name": "MITRE:Scarlet Mimic",
			"tools": [
				"Psylo",
				"MobileOrder",
				"CallMe",
				"FakeM"
			],
			"source_id": "MITRE",
			"reports": null
		},
		{
			"id": "cac03bbf-0c42-470d-951e-0e92656be6cb",
			"created_at": "2023-01-06T13:46:38.463275Z",
			"updated_at": "2026-04-10T02:00:02.985402Z",
			"deleted_at": null,
			"main_name": "Scarlet Mimic",
			"aliases": [
				"Golfing Taurus",
				"G0029"
			],
			"source_name": "MISPGALAXY:Scarlet Mimic",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		},
		{
			"id": "9fc2aed1-c838-41e9-b469-922e7bab6f94",
			"created_at": "2022-10-25T16:07:24.162936Z",
			"updated_at": "2026-04-10T02:00:04.886029Z",
			"deleted_at": null,
			"main_name": "Scarlet Mimic",
			"aliases": [
				"G0029",
				"Golfing Taurus"
			],
			"source_name": "ETDA:Scarlet Mimic",
			"tools": [
				"BrutishCommand",
				"CallMe",
				"CrypticConvo",
				"Elirks",
				"FakeFish",
				"FakeHighFive",
				"FakeM",
				"FakeM RAT",
				"FullThrottle",
				"HTran",
				"HUC Packet Transmit Tool",
				"MobileOrder",
				"Psylo",
				"RaidBase",
				"SkiBoot",
				"SubtractThis",
				"Terminator RAT"
			],
			"source_id": "ETDA",
			"reports": null
		}
	],
	"ts_created_at": 1775434401,
	"ts_updated_at": 1775791955,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/f4b88065b8be8e2d7baa7733c6253025ac6b60f5.pdf",
		"text": "https://archive.orkl.eu/f4b88065b8be8e2d7baa7733c6253025ac6b60f5.txt",
		"img": "https://archive.orkl.eu/f4b88065b8be8e2d7baa7733c6253025ac6b60f5.jpg"
	}
}