{
	"id": "9d09332c-7d7f-40ae-a618-5de7c5a1d4e9",
	"created_at": "2026-04-06T00:15:42.276537Z",
	"updated_at": "2026-04-10T03:37:33.021759Z",
	"deleted_at": null,
	"sha1_hash": "0a53db230b964a89576244b6034c6dbf8cc7cf62",
	"title": "奇安信威胁情报中心",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 2966948,
	"plain_text": "奇安信威胁情报中心\r\nArchived: 2026-04-05 17:14:48 UTC\r\n背景\r\nAPT29，又名CozyBear, Nobelium, TheDukes，奇安信内部编号APT-Q-77，被认为是与东欧某国政府有关\r\n的APT组织。该组织攻击活动可追溯至2008年，主要攻击目标包括西方政府组织机构、智囊团。APT29曾\r\n多次实施大规模鱼叉攻击，收集攻击目标机构或附属组织的人员信息，并针对其中的高价值目标采取进\r\n一步的网络间谍活动。\r\n2021年5月，微软披露了该组织几种攻击武器，其中包括EnvyScout[1]，这种恶意软件通过HTML文件释放\r\n包含后续恶意载荷的ISO文件。2022年4月，Mandiant将2020年SolarWinds攻击事件的幕后黑手UNC2452组\r\n织归并到APT29[2]。APT29在今年上半年被披露的鱼叉攻击活动中屡次利用合法通信服务作为C\u0026C信道\r\n[3,4]，比如团队协作服务Trello和文件托管服务Dropbox。\r\n概述\r\n近期，奇安信威胁情报中心红雨滴团队在日常的威胁狩猎中捕获到EnvyScout攻击样本，该样本释放的\r\nISO文件中包含LNK文件以及设置了文件隐藏属性的PE文件，LNK文件启动其中的正常EXE，进而以侧加\r\n载方式执行恶意DLL。恶意DLL利用团队协作通信服务Slack作为C\u0026C信道，获取后续载荷并执行。\r\n国外安全研究人员进一步发现了与该EnvyScout攻击样本相关的钓鱼邮件和PDF诱饵文档[5]。邮件与PDF\r\n均使用意大利语，内容是要求机构部门人员完成COVID-19疫苗接种的通知，钓鱼邮件使用意大利政府域\r\n名进行伪装，因此可以认为此次攻击目标位于意大利。结合对同源样本的分析，我们发现此次攻击活动\r\n至少从6月中旬开始。\r\n样本攻击流程如下所示。\r\nhttps://ti.qianxin.com/blog/articles/analysis-of-apt29%27s-attack-activities-against-italy/\r\nPage 1 of 14\n\n样本分析\r\n攻击入口\r\n作为攻击入口的钓鱼邮件如下，邮件伪造来自意大利政府域名governo.it，但实际的发件地址\r\n为”info@cesmoscan.org”，此外邮件内容中“COVID-19“出现了拼写错误。\r\n邮件附件PDF文档”Dekret.pdf”打开后内容如下，是对邮件正文提到的所谓第348/2022号政府法令的说明。\r\nhttps://ti.qianxin.com/blog/articles/analysis-of-apt29%27s-attack-activities-against-italy/\r\nPage 2 of 14\n\n诱饵PDF中的链接指向hxxps://www.agencijazaregistraciju.rs/i.html，该URL存放的就是我们捕获的\r\nEnvyScout攻击样本。APT29此前使用EnvyScout时一般是直接将其作为钓鱼邮件的附件，而在此次攻击活\r\n动中，EnvyScout通过诱饵文档中的远程链接触发，更具隐蔽性。\r\nEnvyScout\r\n捕获的EnvyScout攻击样本i.html的基本信息如下。\r\n- -\r\n文件名 i.html\r\nMD5 3aa44a7951ad95d02c426e9e2a174c2e\r\n文件类型 HTML\r\ni.html的具体内容如下所示。受害者访问i.html时，User-Agent和IP信息会发送到\r\nhxxps://www.agencijazaregistraciju.rs/t.php。然后页面中嵌入的ISO文件数据伪装为诱饵PDF文档中提到的\r\n疫苗接种问卷，引导受害者下载。\r\nhttps://ti.qianxin.com/blog/articles/analysis-of-apt29%27s-attack-activities-against-italy/\r\nPage 3 of 14\n\nDecret.iso\r\n下载的Decret.iso基本信息如下。\r\n- -\r\n文件名 Decret.iso\r\nMD5 6228d15e3bb50adfa59c1bdf5f6ce9f0\r\n文件类型 ISO\r\nDecret.iso中包含的文件如下，其中Decret.lnk和HPScanApi.dll为恶意文件，文件修改时间均为北京时间6月\r\n29日。ISO解压打开后除Decret.lnk之外，其余文件均被设置了文件隐藏属性，使得受害者只能看到\r\nDecret.lnk这一快捷方式文件。\r\nhttps://ti.qianxin.com/blog/articles/analysis-of-apt29%27s-attack-activities-against-italy/\r\nPage 4 of 14\n\nDecret.lnk文件信息如下，受害者点击后，启动同目录下的HP2.exe。\r\n- -\r\n文件名 Decret.lnk\r\nMD5 59b5d262532dab929bbe56c90a0257d2\r\n文件类型 LNK\r\nHP2.exe加载version.dll，而version.dll会进一步加载后门HPScanApi.dll。\r\nHPScanApi.dll\r\nHPScanApi.dll文件基本信息如下。\r\nhttps://ti.qianxin.com/blog/articles/analysis-of-apt29%27s-attack-activities-against-italy/\r\nPage 5 of 14\n\n- -\r\n文件名 HPScanApi.dll\r\nMD5 6812031432039a89fa741e9338f8e887\r\n编译时间 2022-06-29 01:07:48 (UTC+8 北京时间)\r\n文件类型 PE DLL 64-bit\r\nHPScanApi.dll中多处使用下面这种异或的方式解密得到所需的字符串，后门dll首先会检查运行的进程名\r\n称是否为HP2.exe。\r\n以ntdll模块中的RtlFindSetBits函数为入口点创建线程，修改该线程上下文的rcx寄存器，使其指向后门dll\r\n中的函数sub_68B0BD10，当恢复线程运行状态后，控制流会转移到该函数。该控制流转移方法与具体的\r\n线程入口点函数无关，只与系统恢复线程运行状态的过程有关。\r\nhttps://ti.qianxin.com/blog/articles/analysis-of-apt29%27s-attack-activities-against-italy/\r\nPage 6 of 14\n\n函数sub_68B0BD10为后门dll的主要恶意功能所在。首先调用函数sub_68B02F90重新从磁盘文件中加载\r\nntdll.dll和wininet.dll的text段，此举可能是为了消除针对这两个DLL中API设置的断点。\r\n然后调用函数sub_68B06AB0实现持久化。该函数先检查dll的文件路径中”\\”出现次数是否为1。若为1表示\r\n该DLL是直接通过打开ISO文件得到的，则继续进行后续操作，否则函数直接返回。\r\n在%appdata%目录下创建名为HPScanLib的子目录。然后将HPScanApi.dll, HP2.exe, version.dll复制到该目\r\n录下。\r\n在注册表”HKCU\\ Software\\Microsoft\\Windows\\CurrentVersion\\Run”键下设置名为”LibHP”的值，指向复制\r\n的HP2.exe文件路径。\r\n完成持久化后，函数sub_68B0BD10开始利用Slack服务建立C\u0026C信道。Slack是一款在线团队协作通信服\r\n务，并且支持API操作。\r\nhttps://ti.qianxin.com/blog/articles/analysis-of-apt29%27s-attack-activities-against-italy/\r\nPage 7 of 14\n\n后门借助Slack服务与攻击者通信的流程如下。\r\n后门中sub_68B08EF0函数负责建立信道，包括创建slack channel以及向新建的channel中添加攻击者的用户\r\nid。\r\n首先获取受害者主机的用户名以及主机名，加上4位随机数，构成创建channel的名称。\r\n后门在发送请求时添加的HTTP首部如下，其中包括攻击者使用的Slack API认证令牌（红字标记）。\r\nContent\\-Type: application/x\\-www\\-form\\-urlencoded\r\nAuthorization: Bearer xoxb\\-3746750028880\\-3716488860102\\-2pXQRNc7uoS4DT5HVmdnjgEv\r\n后门伪造的User-Agent如下：\r\nhttps://ti.qianxin.com/blog/articles/analysis-of-apt29%27s-attack-activities-against-italy/\r\nPage 8 of 14\n\nMozilla/5\\.0 \\(Windows NT 10\\.0\\) AppleWebKit/537\\.36 \\(KHTML, like Gecko\\) Chrome/99\\.0\\.7113\\.93 Safari/537\\\r\n当我们在分析过程中尝试建立连接时，得到” invalid_auth”的错误信息。查阅Slack API文档，该错误信息\r\n可能源自令牌失效，也可能是服务端限制了访问的IP地址。\r\n如果请求成功，后门会从返回的json数据结果中取出channel id，然后调用“conversations.invite”这个API向\r\n新建的channel中添加攻击者的用户id。添加的用户id为” U03MMK35QQ1”。\r\n信道建立后，后门进入C\u0026C通信的while循环。在循环中首先用“chat.postMessage“ API在新建的channel中\r\n发送信标消息，如果未收到服务端的正常回应，则休眠一段时间，收到回应则进行后续操作。\r\n调用“files.list“过滤channel中攻击者对应用户创建的文件，并从返回的文件信息列表json数据中提\r\n取”url_private”字段内容。\r\nhttps://ti.qianxin.com/blog/articles/analysis-of-apt29%27s-attack-activities-against-italy/\r\nPage 9 of 14\n\n接着从hxxps:// files.slack.com下载文件。文件中的数据并不是shellcode本身，而是shellcode每个字节数据\r\n在后门硬编码字符表中的索引位置。后门将还原后的shellcode复制到分配的内存上，然后执行shellcode。\r\n溯源关联\r\n溯源分析\r\nhttps://ti.qianxin.com/blog/articles/analysis-of-apt29%27s-attack-activities-against-italy/\r\nPage 10 of 14\n\n本次捕获攻击样本所使用的技术与APT29历史攻击手法有如下多处重合：\r\n(1) 首先初始攻击样本EnvyScout通过钓鱼邮件诱使受害者点击触发，是APT29近年来常用的一种攻击手\r\n段；\r\n(2) APT29在此前攻击活动中多次使用合法在线服务提供的API构建C\u0026C信道，下载后续载荷，而此次发\r\n现的攻击样本也使用了Slack服务建立C\u0026C信道；\r\n(3) 该攻击样本具有与之前国外厂商披露的APT29攻击活动[4]相同的特征，包括重新加载某些系统DLL的\r\ntext段以绕过终端防护软件的挂钩检测，以及复制文件到%appdata%的子目录下并设置注册表键值实现持\r\n久化。\r\n加上此次攻击目标位于意大利，而APT29多次针对欧洲国家发起攻击，因此可以认为该攻击活动与APT29\r\n存在明显关联。\r\n样本关联\r\n对此次捕获的样本进行关联，我们发现在6月中旬已有同名样本上传VT，国外安全研究人员也于早些时候\r\n在社交平台上对该同名样本进行了披露[6] 。\r\nhttps://ti.qianxin.com/blog/articles/analysis-of-apt29%27s-attack-activities-against-italy/\r\nPage 11 of 14\n\n其中恶意DLL（HPScanApi.dll）的编译时间为2022-06-14 10:58:50 UTC。同名样本与此次捕获的样本一\r\n样，也借助Slack服务建立C\u0026C信道，使用的API认证令牌如下，攻击者的用户id为” U03K4RNC751”。\r\nAuthorization: Bearer xoxb-3644332911574-3644381968246-wwNbyQaqlooogPAv2JjHh663\r\n不过在这个早期样本中，通过C\u0026C信道获取的文件里面保存的就是shellcode本身，没有经过字符表的查表\r\n转换，可见攻击者在短时间内仍在不断更新攻击手法以绕过安全防护软件的检测。\r\nhttps://ti.qianxin.com/blog/articles/analysis-of-apt29%27s-attack-activities-against-italy/\r\nPage 12 of 14\n\n总结\r\nAPT29组织在此次针对意大利的攻击活动中采用了与以往相同的攻击手法，并在一些细节之处不断改进，\r\n尽可能避开安全防护软件的检出与拦截。由于采用合法通信服务作为C\u0026C信道，攻击者开展网络间谍活\r\n动的过程变得更加隐蔽。\r\n尽管此次攻击活动暂未发现国内受到影响，不过奇安信红雨滴团队仍在此提醒广大用户，切勿打开社交\r\n媒体分享的来历不明的链接，不点击执行未知来源的邮件附件，不运行夸张标题的未知文件，不安装非\r\n正规途径来源的APP。做到及时备份重要文件，更新安装补丁。\r\n若需运行，安装来历不明的应用，可先通过奇安信威胁情报文件深度分析平台\r\n（https://sandbox.ti.qianxin.com/sandbox/page）进行判别。目前已支持包括Windows、安卓平台在内的多种\r\n格式文件深度分析。\r\n目前，基于奇安信威胁情报中心的威胁情报数据的全线产品，包括奇安信威胁情报平台（TIP）、天擎、\r\n天眼高级威胁检测系统、奇安信NGSOC、奇安信态势感知等，都已经支持对此类攻击的精确检测。\r\nIOCs\r\nMD5\r\n3aa44a7951ad95d02c426e9e2a174c2e\r\n6228d15e3bb50adfa59c1bdf5f6ce9f0\r\n59b5d262532dab929bbe56c90a0257d2\r\n6812031432039a89fa741e9338f8e887\r\neb25d1887b5943f3d86d997fd8099e37\r\n79d8a62c0513c6138bfa7a5370a022a3\r\n47ddd6003534a108a173aa1fb3361739\r\nhttps://ti.qianxin.com/blog/articles/analysis-of-apt29%27s-attack-activities-against-italy/\r\nPage 13 of 14\n\nC2\r\nwww[.]agencijazaregistraciju.rs\r\nURL\r\nhxxps://www.agencijazaregistraciju.rs/i.html\r\nhxxps://www.agencijazaregistraciju.rs/t.php\r\nhttps://slack.com/api/files.list?channel=\u003cchannel_id\u003e\u0026user=U03MMK35QQ1\r\nhttps://slack.com/api/files.list?channel=\u003cchannel_id\u003e\u0026user=U03K4RNC751\r\n参考链接\r\n[1] https://www.microsoft.com/security/blog/2021/05/28/breaking-down-nobeliums-latest-early-stage-toolset/\r\n[2] https://www.mandiant.com/resources/unc2452-merged-into-apt29\r\n[3] https://www.mandiant.com/resources/tracking-apt29-phishing-campaigns\r\n[4] https://cluster25.io/2022/05/13/cozy-smuggled-into-the-box/\r\n[5] https://twitter.com/JAMESWT_MHT/status/1545303433959411714\r\n[6] https://twitter.com/h2jazi/status/1537830185319514112\r\nSource: https://ti.qianxin.com/blog/articles/analysis-of-apt29%27s-attack-activities-against-italy/\r\nhttps://ti.qianxin.com/blog/articles/analysis-of-apt29%27s-attack-activities-against-italy/\r\nPage 14 of 14",
	"extraction_quality": 1,
	"language": "ZH",
	"sources": [
		"Malpedia"
	],
	"references": [
		"https://ti.qianxin.com/blog/articles/analysis-of-apt29%27s-attack-activities-against-italy/"
	],
	"report_names": [
		"analysis-of-apt29%27s-attack-activities-against-italy"
	],
	"threat_actors": [
		{
			"id": "b43e5ea9-d8c8-4efa-b5bf-f1efb37174ba",
			"created_at": "2022-10-25T16:07:24.36191Z",
			"updated_at": "2026-04-10T02:00:04.954902Z",
			"deleted_at": null,
			"main_name": "UNC2452",
			"aliases": [
				"Dark Halo",
				"Nobelium",
				"SolarStorm",
				"StellarParticle",
				"UNC2452"
			],
			"source_name": "ETDA:UNC2452",
			"tools": [],
			"source_id": "ETDA",
			"reports": null
		},
		{
			"id": "1d3f9dec-b033-48a5-8b1e-f67a29429e89",
			"created_at": "2022-10-25T15:50:23.739197Z",
			"updated_at": "2026-04-10T02:00:05.275809Z",
			"deleted_at": null,
			"main_name": "UNC2452",
			"aliases": [
				"UNC2452",
				"NOBELIUM",
				"StellarParticle",
				"Dark Halo"
			],
			"source_name": "MITRE:UNC2452",
			"tools": [
				"Sibot",
				"Mimikatz",
				"Cobalt Strike",
				"AdFind",
				"GoldMax"
			],
			"source_id": "MITRE",
			"reports": null
		},
		{
			"id": "5b748f86-ac32-4715-be9f-6cf25ae48a4e",
			"created_at": "2024-06-04T02:03:07.956135Z",
			"updated_at": "2026-04-10T02:00:03.689959Z",
			"deleted_at": null,
			"main_name": "IRON HEMLOCK",
			"aliases": [
				"APT29 ",
				"ATK7 ",
				"Blue Kitsune ",
				"Cozy Bear ",
				"The Dukes",
				"UNC2452 ",
				"YTTRIUM "
			],
			"source_name": "Secureworks:IRON HEMLOCK",
			"tools": [
				"CosmicDuke",
				"CozyCar",
				"CozyDuke",
				"DiefenDuke",
				"FatDuke",
				"HAMMERTOSS",
				"LiteDuke",
				"MiniDuke",
				"OnionDuke",
				"PolyglotDuke",
				"RegDuke",
				"RegDuke Loader",
				"SeaDuke",
				"Sliver"
			],
			"source_id": "Secureworks",
			"reports": null
		},
		{
			"id": "a241a1ca-2bc9-450b-a07b-aae747ee2710",
			"created_at": "2024-06-19T02:03:08.150052Z",
			"updated_at": "2026-04-10T02:00:03.737173Z",
			"deleted_at": null,
			"main_name": "IRON RITUAL",
			"aliases": [
				"APT29",
				"Blue Dev 5 ",
				"BlueBravo ",
				"Cloaked Ursa ",
				"CozyLarch ",
				"Dark Halo ",
				"Midnight Blizzard ",
				"NOBELIUM ",
				"StellarParticle ",
				"UNC2452 "
			],
			"source_name": "Secureworks:IRON RITUAL",
			"tools": [
				"Brute Ratel C4",
				"Cobalt Strike",
				"EnvyScout",
				"GoldFinder",
				"GoldMax",
				"NativeZone",
				"RAINDROP",
				"SUNBURST",
				"Sibot",
				"TEARDROP",
				"VaporRage"
			],
			"source_id": "Secureworks",
			"reports": null
		},
		{
			"id": "46b3c0fc-fa0c-4d63-a38a-b33a524561fb",
			"created_at": "2023-01-06T13:46:38.393409Z",
			"updated_at": "2026-04-10T02:00:02.955738Z",
			"deleted_at": null,
			"main_name": "APT29",
			"aliases": [
				"Cloaked Ursa",
				"TA421",
				"Blue Kitsune",
				"BlueBravo",
				"IRON HEMLOCK",
				"G0016",
				"Nobelium",
				"Group 100",
				"YTTRIUM",
				"Grizzly Steppe",
				"ATK7",
				"ITG11",
				"COZY BEAR",
				"The Dukes",
				"Minidionis",
				"UAC-0029",
				"SeaDuke"
			],
			"source_name": "MISPGALAXY:APT29",
			"tools": [
				"SNOWYAMBER",
				"HALFRIG",
				"QUARTERRIG"
			],
			"source_id": "MISPGALAXY",
			"reports": null
		},
		{
			"id": "70872c3a-e788-4b55-a7d6-b2df52001ad0",
			"created_at": "2023-01-06T13:46:39.18401Z",
			"updated_at": "2026-04-10T02:00:03.239111Z",
			"deleted_at": null,
			"main_name": "UNC2452",
			"aliases": [
				"DarkHalo",
				"StellarParticle",
				"NOBELIUM",
				"Solar Phoenix",
				"Midnight Blizzard"
			],
			"source_name": "MISPGALAXY:UNC2452",
			"tools": [
				"SNOWYAMBER",
				"HALFRIG",
				"QUARTERRIG"
			],
			"source_id": "MISPGALAXY",
			"reports": null
		},
		{
			"id": "20d3a08a-3b97-4b2f-90b8-92a89089a57a",
			"created_at": "2022-10-25T15:50:23.548494Z",
			"updated_at": "2026-04-10T02:00:05.292748Z",
			"deleted_at": null,
			"main_name": "APT29",
			"aliases": [
				"APT29",
				"IRON RITUAL",
				"IRON HEMLOCK",
				"NobleBaron",
				"Dark Halo",
				"NOBELIUM",
				"UNC2452",
				"YTTRIUM",
				"The Dukes",
				"Cozy Bear",
				"CozyDuke",
				"SolarStorm",
				"Blue Kitsune",
				"UNC3524",
				"Midnight Blizzard"
			],
			"source_name": "MITRE:APT29",
			"tools": [
				"PinchDuke",
				"ROADTools",
				"WellMail",
				"CozyCar",
				"Mimikatz",
				"Tasklist",
				"OnionDuke",
				"FatDuke",
				"POSHSPY",
				"EnvyScout",
				"SoreFang",
				"GeminiDuke",
				"reGeorg",
				"GoldMax",
				"FoggyWeb",
				"SDelete",
				"PolyglotDuke",
				"AADInternals",
				"MiniDuke",
				"SeaDuke",
				"Sibot",
				"RegDuke",
				"CloudDuke",
				"GoldFinder",
				"AdFind",
				"PsExec",
				"NativeZone",
				"Systeminfo",
				"ipconfig",
				"Impacket",
				"Cobalt Strike",
				"PowerDuke",
				"QUIETEXIT",
				"HAMMERTOSS",
				"BoomBox",
				"CosmicDuke",
				"WellMess",
				"VaporRage",
				"LiteDuke"
			],
			"source_id": "MITRE",
			"reports": null
		},
		{
			"id": "f27790ff-4ee0-40a5-9c84-2b523a9d3270",
			"created_at": "2022-10-25T16:07:23.341684Z",
			"updated_at": "2026-04-10T02:00:04.549917Z",
			"deleted_at": null,
			"main_name": "APT 29",
			"aliases": [
				"APT 29",
				"ATK 7",
				"Blue Dev 5",
				"BlueBravo",
				"Cloaked Ursa",
				"CloudLook",
				"Cozy Bear",
				"Dark Halo",
				"Earth Koshchei",
				"G0016",
				"Grizzly Steppe",
				"Group 100",
				"ITG11",
				"Iron Hemlock",
				"Iron Ritual",
				"Midnight Blizzard",
				"Minidionis",
				"Nobelium",
				"NobleBaron",
				"Operation Ghost",
				"Operation Office monkeys",
				"Operation StellarParticle",
				"SilverFish",
				"Solar Phoenix",
				"SolarStorm",
				"StellarParticle",
				"TEMP.Monkeys",
				"The Dukes",
				"UNC2452",
				"UNC3524",
				"Yttrium"
			],
			"source_name": "ETDA:APT 29",
			"tools": [
				"7-Zip",
				"ATI-Agent",
				"AdFind",
				"Agentemis",
				"AtNow",
				"BEATDROP",
				"BotgenStudios",
				"CEELOADER",
				"Cloud Duke",
				"CloudDuke",
				"CloudLook",
				"Cobalt Strike",
				"CobaltStrike",
				"CosmicDuke",
				"Cozer",
				"CozyBear",
				"CozyCar",
				"CozyDuke",
				"Danfuan",
				"EnvyScout",
				"EuroAPT",
				"FatDuke",
				"FoggyWeb",
				"GeminiDuke",
				"Geppei",
				"GoldFinder",
				"GoldMax",
				"GraphDrop",
				"GraphicalNeutrino",
				"GraphicalProton",
				"HAMMERTOSS",
				"HammerDuke",
				"LOLBAS",
				"LOLBins",
				"LiteDuke",
				"Living off the Land",
				"MagicWeb",
				"Mimikatz",
				"MiniDionis",
				"MiniDuke",
				"NemesisGemina",
				"NetDuke",
				"OnionDuke",
				"POSHSPY",
				"PinchDuke",
				"PolyglotDuke",
				"PowerDuke",
				"QUIETEXIT",
				"ROOTSAW",
				"RegDuke",
				"Rubeus",
				"SNOWYAMBER",
				"SPICYBEAT",
				"SUNSHUTTLE",
				"SeaDaddy",
				"SeaDask",
				"SeaDesk",
				"SeaDuke",
				"Sharp-SMBExec",
				"SharpView",
				"Sibot",
				"Solorigate",
				"SoreFang",
				"TinyBaron",
				"WINELOADER",
				"WellMail",
				"WellMess",
				"cobeacon",
				"elf.wellmess",
				"reGeorg",
				"tDiscoverer"
			],
			"source_id": "ETDA",
			"reports": null
		}
	],
	"ts_created_at": 1775434542,
	"ts_updated_at": 1775792253,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/0a53db230b964a89576244b6034c6dbf8cc7cf62.pdf",
		"text": "https://archive.orkl.eu/0a53db230b964a89576244b6034c6dbf8cc7cf62.txt",
		"img": "https://archive.orkl.eu/0a53db230b964a89576244b6034c6dbf8cc7cf62.jpg"
	}
}