{
	"id": "e0e32b42-f2fa-415f-87b1-0a4587972ba4",
	"created_at": "2026-04-06T00:14:44.892907Z",
	"updated_at": "2026-04-10T03:31:49.12032Z",
	"deleted_at": null,
	"sha1_hash": "fd25d9b16f9b8553ca36f2bce5f7e4229949d727",
	"title": "OpGhoul (Malware Family)",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 34012,
	"plain_text": "OpGhoul (Malware Family)\r\nBy Fraunhofer FKIE\r\nArchived: 2026-04-05 19:47:59 UTC\r\nwin.opghoul (Back to overview)\r\nOpGhoul\r\nThis entry serves as a placeholder of malware observed during Operation Ghoul. The samples will likely be\r\nassigned to their respective families. Some families involved and identified were Alina POS (Katrina variant) and\r\nTreasureHunter POS.\r\nReferences\r\n2016-08-17 ⋅ Kaspersky Labs ⋅ Mohamad Amin Hasbini\r\nOperation Ghoul: targeted attacks on industrial and engineering organizations\r\nOpGhoul\r\n2016-08-17 ⋅ Kaspersky Labs ⋅ Mohamad Amin Hasbini\r\nOperation Ghoul: targeted attacks on industrial and engineering organizations\r\nOpGhoul Operation Ghoul\r\nThere is no Yara-Signature yet.\r\nSource: https://malpedia.caad.fkie.fraunhofer.de/details/win.opghoul\r\nhttps://malpedia.caad.fkie.fraunhofer.de/details/win.opghoul\r\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://malpedia.caad.fkie.fraunhofer.de/details/win.opghoul"
	],
	"report_names": [
		"win.opghoul"
	],
	"threat_actors": [
		{
			"id": "373f10d9-9fdb-4451-b158-da634c6bfb22",
			"created_at": "2024-02-06T02:00:04.148051Z",
			"updated_at": "2026-04-10T02:00:03.579412Z",
			"deleted_at": null,
			"main_name": "Operation Ghoul",
			"aliases": [],
			"source_name": "MISPGALAXY:Operation Ghoul",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		},
		{
			"id": "d5919968-4173-411e-801d-9a1a3bd6a10c",
			"created_at": "2022-10-25T16:07:23.959228Z",
			"updated_at": "2026-04-10T02:00:04.808278Z",
			"deleted_at": null,
			"main_name": "Operation Ghoul",
			"aliases": [],
			"source_name": "ETDA:Operation Ghoul",
			"tools": [
				"OpGhoul"
			],
			"source_id": "ETDA",
			"reports": null
		}
	],
	"ts_created_at": 1775434484,
	"ts_updated_at": 1775791909,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/fd25d9b16f9b8553ca36f2bce5f7e4229949d727.pdf",
		"text": "https://archive.orkl.eu/fd25d9b16f9b8553ca36f2bce5f7e4229949d727.txt",
		"img": "https://archive.orkl.eu/fd25d9b16f9b8553ca36f2bce5f7e4229949d727.jpg"
	}
}