{
	"id": "72a6d632-08c3-472d-86cf-76abac3579c6",
	"created_at": "2026-04-06T00:15:51.163351Z",
	"updated_at": "2026-04-10T03:31:41.86446Z",
	"deleted_at": null,
	"sha1_hash": "0efb16ea0793382f05a2c724f4d2504a7a71a8d0",
	"title": "RDCMan.ps1 - Threat Group Cards: A Threat Actor Encyclopedia",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 55133,
	"plain_text": "RDCMan.ps1 - Threat Group Cards: A Threat Actor Encyclopedia\r\nArchived: 2026-04-05 15:35:58 UTC\r\nHome \u003e List all groups \u003e List all tools \u003e List all groups using tool Decrypt-RDCMan.ps1\r\n Tool: Decrypt-RDCMan.ps1\r\nNames Decrypt-RDCMan.ps1\r\nCategory Malware\r\nType Vulnerability scanner\r\nDescription\r\n(SecureWorks) Decrypt-RDCMan.ps1 is a component of the PoshC2 penetration testing\r\nframework. It is used to decrypt passwords stored in the RDCMan configuration file, which\r\nstores details of servers and encrypted credentials to quickly establish remote desktop sessions.\r\nRecovered credentials could give the threat actors additional access within the environment.\r\nLYCEUM deployed this tool via DanBot approximately one hour after gaining initial access to\r\na compromised environment.\r\nInformation\r\n\u003chttps://www.secureworks.com/blog/lyceum-takes-center-stage-in-middle-east-campaign\u003e\r\n\u003chttps://github.com/nettitude/PoshC2/blob/master/Modules/Decrypt-RDCMan.ps1\u003e\r\nLast change to this tool card: 20 April 2020\r\nDownload this tool card in JSON format\r\nAll groups using tool Decrypt-RDCMan.ps1\r\nChanged Name Country Observed\r\nAPT groups\r\n  Hexane 2017-Jun 2022  \r\n1 group listed (1 APT, 0 other, 0 unknown)\r\nSource: https://apt.etda.or.th/cgi-bin/listgroups.cgi?u=ea6934f2-757c-4ac1-a661-68e0fe0be04c\r\nhttps://apt.etda.or.th/cgi-bin/listgroups.cgi?u=ea6934f2-757c-4ac1-a661-68e0fe0be04c\r\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://apt.etda.or.th/cgi-bin/listgroups.cgi?u=ea6934f2-757c-4ac1-a661-68e0fe0be04c"
	],
	"report_names": [
		"listgroups.cgi?u=ea6934f2-757c-4ac1-a661-68e0fe0be04c"
	],
	"threat_actors": [
		{
			"id": "cde987a8-c71f-49e2-b761-5b7fa2b4ada6",
			"created_at": "2022-10-25T16:07:23.706646Z",
			"updated_at": "2026-04-10T02:00:04.719127Z",
			"deleted_at": null,
			"main_name": "Hexane",
			"aliases": [
				"ATK 120",
				"Cobalt Lyceum",
				"G1001",
				"Lyceum",
				"Operation Out to Sea",
				"Siamesekitten",
				"Yellow Dev 9"
			],
			"source_name": "ETDA:Hexane",
			"tools": [
				"DanBot",
				"DanDrop",
				"Decrypt-RDCMan.ps1",
				"Get-LAPSP.ps1",
				"James",
				"Milan",
				"kl.ps1"
			],
			"source_id": "ETDA",
			"reports": null
		},
		{
			"id": "a7df240e-6750-4b71-99de-85831b92faa2",
			"created_at": "2022-10-25T15:50:23.859253Z",
			"updated_at": "2026-04-10T02:00:05.285965Z",
			"deleted_at": null,
			"main_name": "HEXANE",
			"aliases": [
				"Lyceum",
				"Siamesekitten",
				"Spirlin"
			],
			"source_name": "MITRE:HEXANE",
			"tools": [
				"Milan",
				"netstat",
				"BITSAdmin",
				"DnsSystem",
				"DanBot",
				"ipconfig",
				"Mimikatz",
				"Kevin",
				"PoshC2"
			],
			"source_id": "MITRE",
			"reports": null
		},
		{
			"id": "fb8f3a5f-01a9-498e-9396-52f844424c33",
			"created_at": "2023-01-06T13:46:39.045338Z",
			"updated_at": "2026-04-10T02:00:03.195743Z",
			"deleted_at": null,
			"main_name": "LYCEUM",
			"aliases": [
				"Spirlin",
				"MYSTICDOME",
				"siamesekitten",
				"Chrono Kitten",
				"Storm-0133",
				"COBALT LYCEUM",
				"UNC1530"
			],
			"source_name": "MISPGALAXY:LYCEUM",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		},
		{
			"id": "386b1b0a-9217-46d4-a0d6-73d6286154e0",
			"created_at": "2025-08-07T02:03:24.760429Z",
			"updated_at": "2026-04-10T02:00:03.619131Z",
			"deleted_at": null,
			"main_name": "COBALT LYCEUM",
			"aliases": [
				"DEV-0133 ",
				"HEXANE ",
				"ScorchedEpoch "
			],
			"source_name": "Secureworks:COBALT LYCEUM",
			"tools": [
				"DanBot",
				"MilanRAT",
				"RGDoor",
				"SharkWork RAT"
			],
			"source_id": "Secureworks",
			"reports": null
		}
	],
	"ts_created_at": 1775434551,
	"ts_updated_at": 1775791901,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/0efb16ea0793382f05a2c724f4d2504a7a71a8d0.pdf",
		"text": "https://archive.orkl.eu/0efb16ea0793382f05a2c724f4d2504a7a71a8d0.txt",
		"img": "https://archive.orkl.eu/0efb16ea0793382f05a2c724f4d2504a7a71a8d0.jpg"
	}
}