{
	"id": "e13b15a5-e7d7-491a-8ac8-0f509cb243ed",
	"created_at": "2026-04-06T00:15:00.707313Z",
	"updated_at": "2026-04-10T03:34:01.004015Z",
	"deleted_at": null,
	"sha1_hash": "112287909cd5e6cf676f58dc4c47a350318ac78e",
	"title": "Threat Group Cards: A Threat Actor Encyclopedia",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 45570,
	"plain_text": "Threat Group Cards: A Threat Actor Encyclopedia\nArchived: 2026-04-02 10:45:43 UTC\nHome \u003e List all groups \u003e List all tools \u003e List all groups using tool Vjw0rm\n Tool: Vjw0rm\nNames\nVjw0rm\nVengeance Justice Worm\nCategory Malware\nType Backdoor, Worm, Info stealer, DDoS\nDescription\n(Cofense) It’s called the Vengeance Justice Worm (Vjw0rm), but think of it as the Leatherman\ntool of malware. Vjw0rm wreaks havoc in highly versatile ways: information theft, denial of\nservice (DoS) attacks, and self-propagation to name a few. CofenseTM has spotted this hybrid\nthreat—a cross between a worm and a remote access trojan (RAT)—in a recent phishing\ncampaign dangling a banking lure.\nInformation Malpedia Last change to this tool card: 12 September 2022\nDownload this tool card in JSON format\nAll groups using tool Vjw0rm\nChanged Name Country Observed\nAPT groups\n TA558 [Unknown] 2018-Jun 2023\n1 group listed (1 APT, 0 other, 0 unknown)\nSource: https://apt.etda.or.th/cgi-bin/listgroups.cgi?u=30a0a6e9-ec3a-4b4b-ac8c-c17dc87cf025\nhttps://apt.etda.or.th/cgi-bin/listgroups.cgi?u=30a0a6e9-ec3a-4b4b-ac8c-c17dc87cf025\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://apt.etda.or.th/cgi-bin/listgroups.cgi?u=30a0a6e9-ec3a-4b4b-ac8c-c17dc87cf025"
	],
	"report_names": [
		"listgroups.cgi?u=30a0a6e9-ec3a-4b4b-ac8c-c17dc87cf025"
	],
	"threat_actors": [
		{
			"id": "316b23b5-e097-4dc6-8b1c-d096860c6c16",
			"created_at": "2022-10-25T16:07:24.290801Z",
			"updated_at": "2026-04-10T02:00:04.924688Z",
			"deleted_at": null,
			"main_name": "TA558",
			"aliases": [],
			"source_name": "ETDA:TA558",
			"tools": [
				"AZORult",
				"AsyncRAT",
				"Bladabindi",
				"ExtRat",
				"Jorik",
				"Loda",
				"Loda RAT",
				"LodaRAT",
				"Nymeria",
				"PuffStealer",
				"Remcos",
				"RemcosRAT",
				"Remvio",
				"Revenge RAT",
				"RevengeRAT",
				"Revetrat",
				"Rultazo",
				"Socmer",
				"Vengeance Justice Worm",
				"Vjw0rm",
				"Xtreme RAT",
				"XtremeRAT",
				"njRAT"
			],
			"source_id": "ETDA",
			"reports": null
		},
		{
			"id": "cf91b389-9602-45c0-8d6b-c61d14800f54",
			"created_at": "2023-01-06T13:46:39.448277Z",
			"updated_at": "2026-04-10T02:00:03.332604Z",
			"deleted_at": null,
			"main_name": "TA558",
			"aliases": [],
			"source_name": "MISPGALAXY:TA558",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		}
	],
	"ts_created_at": 1775434500,
	"ts_updated_at": 1775792041,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/112287909cd5e6cf676f58dc4c47a350318ac78e.pdf",
		"text": "https://archive.orkl.eu/112287909cd5e6cf676f58dc4c47a350318ac78e.txt",
		"img": "https://archive.orkl.eu/112287909cd5e6cf676f58dc4c47a350318ac78e.jpg"
	}
}