{
	"id": "ef1bc7ee-bd0a-4db1-b5d9-a52742deca44",
	"created_at": "2026-04-06T00:09:56.283515Z",
	"updated_at": "2026-04-10T03:20:19.936571Z",
	"deleted_at": null,
	"sha1_hash": "182d233c0d8bd8f5a4412c951665ed8bec2f3adf",
	"title": "Threat Group Cards: A Threat Actor Encyclopedia",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 46778,
	"plain_text": "Threat Group Cards: A Threat Actor Encyclopedia\nArchived: 2026-04-05 14:22:41 UTC\nHome \u003e List all groups \u003e List all tools \u003e List all groups using tool WinPot\n Tool: WinPot\nNames\nWinPot\nATMPot\nCategory Malware\nType ATM malware\nDescription\n(Kaspersky) The criminals had clearly spent some time on the interface to make it look like\nthat of a slot machine. Likely as a reference to the popular term ATM-jackpotting, which refers\nto techniques designed to empty ATMs. In the WinPot case, each cassette has a reel of its own\nnumbered 1 to 4 (4 is the max number of cash-out cassettes in an ATM) and a button labeled\nSPIN. As soon as you press the SPIN button (in our case it is greyed out because we are\nactually dispensing cash), the ATM starts dispensing cash from the corresponding cassette.\nDown from the SPIN button there is information about the cassette (bank note value and the\nnumber of bank notes in the cassette). The SCAN button rescans the ATM and updates the\nnumbers under the SLOT button, while the STOP button stops the dispensing in progress.\nInformation\nMalpedia Last change to this tool card: 28 December 2022\nDownload this tool card in JSON format\nAll groups using tool WinPot\nChanged Name Country Observed\nUnknown groups\n _[ Interesting malware not linked to an actor yet ]_\nhttps://apt.etda.or.th/cgi-bin/listgroups.cgi?u=0d7fed0f-fde7-4243-b936-54e580820edc\nPage 1 of 2\n\n1 group listed (0 APT, 0 other, 1 unknown)\r\nSource: https://apt.etda.or.th/cgi-bin/listgroups.cgi?u=0d7fed0f-fde7-4243-b936-54e580820edc\r\nhttps://apt.etda.or.th/cgi-bin/listgroups.cgi?u=0d7fed0f-fde7-4243-b936-54e580820edc\r\nPage 2 of 2",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://apt.etda.or.th/cgi-bin/listgroups.cgi?u=0d7fed0f-fde7-4243-b936-54e580820edc"
	],
	"report_names": [
		"listgroups.cgi?u=0d7fed0f-fde7-4243-b936-54e580820edc"
	],
	"threat_actors": [],
	"ts_created_at": 1775434196,
	"ts_updated_at": 1775791219,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/182d233c0d8bd8f5a4412c951665ed8bec2f3adf.pdf",
		"text": "https://archive.orkl.eu/182d233c0d8bd8f5a4412c951665ed8bec2f3adf.txt",
		"img": "https://archive.orkl.eu/182d233c0d8bd8f5a4412c951665ed8bec2f3adf.jpg"
	}
}