{
	"id": "7089ff5d-ef52-4565-9434-100fbf5e6a68",
	"created_at": "2026-04-06T00:15:19.745201Z",
	"updated_at": "2026-04-10T13:12:17.878073Z",
	"deleted_at": null,
	"sha1_hash": "21d42e3de690e507456d7eccf8fd7a30cba6ea66",
	"title": "MAR-10322463-7.v1 - AppleJeus: Ants2Whale | CISA",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 70959,
	"plain_text": "MAR-10322463-7.v1 - AppleJeus: Ants2Whale | CISA\r\nPublished: 2021-02-17 · Archived: 2026-04-05 17:57:36 UTC\r\nbody#cma-body { font-family: Franklin Gothic Medium, Franklin Gothic, ITC Franklin Gothic, Arial, sans-serif; font-size:\r\n15px; } table#cma-table { width: 900px; margin: 2px; table-layout: fixed; border-collapse: collapse; } div#cma-exercise {\r\nwidth: 900px; height: 30px; text-align: center; line-height: 30px; font-weight: bold; font-size: 18px; } div.cma-header { text-align: center; margin-bottom: 40px; } div.cma-footer { text-align: center; margin-top: 20px; } h2.cma-tlp { background-color: #000; color: #ffffff; width: 180px; height: 30px; text-align: center; line-height: 30px; font-weight: bold; font-size:\r\n18px; float: right; } span.cma-fouo { line-height: 30px; font-weight: bold; font-size: 16px; } h3.cma-section-title { font-size:\r\n18px; font-weight: bold; padding: 0 10px; margin-top: 10px; } h4.cma-object-title { font-size: 16px; font-weight: bold;\r\nmargin-left: 20px; } h5.cma-data-title { padding: 3px 0 3px 10px; margin: 10px 0 0 20px; background-color: #e7eef4; font-size: 15px; } p.cma-text { margin: 5px 0 0 25px !important; word-wrap: break-word !important; } div.cma-section { border-bottom: 5px solid #aaa; margin: 5px 0; padding-bottom: 10px; } div.cma-avoid-page-break { page-break-inside: avoid; }\r\ndiv#cma-summary { page-break-after: always; } div#cma-faq { page-break-after: always; } table.cma-content { border-collapse: collapse; margin-left: 20px; } table.cma-hashes { table-layout: fixed; width: 880px; } table.cma-hashes td{ width:\r\n780px; word-wrap: break-word; } .cma-left th { text-align: right; vertical-align: top; padding: 3px 8px 3px 20px;\r\nbackground-color: #f0f0f0; border-right: 1px solid #aaa; } .cma-left td { padding-left: 8px; } .cma-color-title th, .cma-color-list th, .cma-color-title-only th { text-align: left; padding: 3px 0 3px 20px; background-color: #f0f0f0; } .cma-color-title td,\r\n.cma-color-list td, .cma-color-title-only td { padding: 3px 20px; } .cma-color-title tr:nth-child(odd) { background-color:\r\n#f0f0f0; } .cma-color-list tr:nth-child(even) { background-color: #f0f0f0; } td.cma-relationship { max-width: 310px; word-wrap: break-word; } ul.cma-ul { margin: 5px 0 10px 0; } ul.cma-ul li { line-height: 20px; margin-bottom: 5px; word-wrap:\r\nbreak-word; } #cma-survey { font-weight: bold; font-style: italic; } div.cma-banner-container { position: relative; text-align:\r\ncenter; color: white; } img.cma-banner { max-width: 900px; height: auto; } img.cma-nccic-logo { max-height: 60px; width:\r\nauto; float: left; margin-top: -15px; } div.cma-report-name { position: absolute; bottom: 32px; left: 12px; font-size: 20px; }\r\ndiv.cma-report-number { position: absolute; bottom: 70px; right: 100px; font-size: 18px; } div.cma-report-date { position:\r\nabsolute; bottom: 32px; right: 100px; font-size: 18px; } img.cma-thumbnail { max-height: 100px; width: auto; vertical-align: top; } img.cma-screenshot { margin: 10px 0 0 25px; max-width: 800px; height: auto; vertical-align: top; border: 1px\r\nsolid #000; } div.cma-screenshot-text { margin: 10px 0 0 25px; } .cma-break-word { word-wrap: break-word; } .cma-tag {\r\nborder-radius: 5px; padding: 1px 10px; margin-right: 10px; } .cma-tag-info { background: #f0f0f0; } .cma-tag-warning {\r\nbackground: #ffdead; }\r\nNotification\r\nThis report is provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not\r\nprovide any warranties of any kind regarding any information contained herein. The DHS does not endorse any commercial\r\nproduct or service referenced in this bulletin or otherwise.\r\nThis document is marked TLP:WHITE--Disclosure is not limited. Sources may use TLP:WHITE when information carries\r\nminimal or no foreseeable risk of misuse, in accordance with applicable rules and procedures for public release. Subject to\r\nstandard copyright rules, TLP:WHITE information may be distributed without restriction. For more information on the\r\nTraffic Light Protocol (TLP), see http://www.us-cert.gov/tlp.\r\nSummary\r\nDescription\r\nThis Malware Analysis Report (MAR) is the result of analytic efforts among the Federal Bureau of Investigation (FBI), the\r\nCybersecurity and Infrastructure Security Agency (CISA), and the Department of Treasury (Treasury) to highlight the cyber\r\nthreat to cryptocurrency posed by North Korea, formally known as the Democratic People’s Republic of Korea (DPRK), and\r\nprovide mitigation recommendations. Working with U.S. government partners, FBI, CISA, and Treasury assess that Lazarus\r\nGroup—which these agencies attribute to North Korean state-sponsored advanced persistent threat (APT) actors—is\r\ntargeting individuals and companies, including cryptocurrency exchanges and financial service companies, through the\r\ndissemination of cryptocurrency trading applications that have been modified to include malware that facilitates theft of\r\ncryptocurrency.\r\nThis MAR highlights this cyber threat posed by North Korea and provides detailed indicators of compromise (IOCs) used by\r\nthe North Korean government. The U.S. Government refers to malicious cyber activity by the North Korean government as\r\nHIDDEN COBRA. For more information on other versions of AppleJeus and recommended steps to mitigate this threat, see\r\nhttps://us-cert.cisa.gov/ncas/analysis-reports/ar21-048g\r\nPage 1 of 8\n\nJoint Cybersecurity Advisory AA21-048A: AppleJeus: Analysis of North Korea's Cryptocurrency Malware at\r\nhttps://www.us-cert.cisa.gov/ncas/alerts/AA21-048A.\r\nThere have been multiple versions of AppleJeus malware discovered since its initial discovery in August 2018. In most\r\nversions, the malware appears to be from a legitimate-looking cryptocurrency trading company and website, whereby an\r\nunsuspecting individual downloads a third-party application from a website that appears legitimate.\r\nThe U.S. Government has identified AppleJeus malware version—Ants2Whale—and associated IOCs used by the North\r\nKorean government in AppleJeus operations.\r\nAnts2Whale, discovered in October 2020, is a legitimate-looking cryptocurrency trading software that is marketed and\r\ndistributed by a company and website—Ants2Whale and ants2whale[.]com, respectively—that appear legitimate. Some\r\ninformation has been redacted from this report to preserve victim anonymity.\r\nFor a downloadable copy of IOCs, see: MAR-10322463-7.v1.stix.\r\nSubmitted Files (3)\r\nbb430087484c1f4587c54efc75681eb60cf70956ef2a999a75ce7b563b8bd694 (Ants2WhaleHelper)\r\nd5ac680e14b013e0624470da7f46e84809d00b59a7544f6a42b110cf0e29254e (Ants2Whale)\r\n[Redacted] (Ants2Whale.dmg)\r\nDomains (2)\r\nants2whale.com\r\nqnalytica.com\r\nIPs (1)\r\n45.147.231.77\r\nFindings\r\n[Redacted]\r\nTags\r\ndownloaderloader\r\nDetails\r\nName Ants2Whale.dmg\r\nSize [Redacted] bytes\r\nType zlib compressed data\r\nMD5 [Redacted]\r\nSHA1 [Redacted]\r\nSHA256 [Redacted]\r\nSHA512 [Redacted]\r\nssdeep [Redacted]\r\nEntropy [Redacted]\r\nAntivirus\r\nAvira OSX/Agent.denpi\r\nIkarus OSX.Agent\r\nhttps://us-cert.cisa.gov/ncas/analysis-reports/ar21-048g\r\nPage 2 of 8\n\nZillya! Downloader.Agent.OSX.390\r\nYARA Rules\r\nNo matches found.\r\nssdeep Matches\r\nNo matches found.\r\nRelationships\r\n[Redacted] Downloaded_By ants2whale.com\r\n[Redacted] Contains d5ac680e14b013e0624470da7f46e84809d00b59a7544f6a42b110cf0e29254e\r\n[Redacted] Contains bb430087484c1f4587c54efc75681eb60cf70956ef2a999a75ce7b563b8bd694\r\nDescription\r\nThis OSX program from the Ants2Whale site is an Apple DMG installer. The OSX program does not have a digital signature\r\nand will warn the user of that before installation. As all previous versions of AppleJeus, the Ants2Whale installer appears to\r\nbe legitimate and installs\r\n“Ants2Whale”(D5AC680E14B013E0624470DA7F46E84809D00B59A7544F6A42B110CF0E29254E) in the\r\n“/Applications/Ants2whale.app/Contents/MacOS/Ants2whale” folder and a program named Ants2WhaleHelper\r\n(BB430087484C1F4587C54EFC75681EB60CF70956EF2A999A75CE7B563B8BD694) also in the “/Library/Application\\\r\nSupport/Ants2WhaleSupport/” folder.\r\nSimilar to all previous OSX AppleJeus variants, there is a postinstall script and a plist file which creates a LaunchDaemon to\r\nautomatically run the Ants2WhaleHelper program.\r\nants2whale.com\r\nRelationships\r\nants2whale.com Downloaded [Redacted]\r\nDescription\r\nThe website appears to show a legitimate cryptocurrency company and application, though it does contain multiple spelling\r\nand grammar mistakes indicating the creator may not have English as a first language. The website states that in order to\r\ndownload, a user must contact the administrator as their product is “premium package.\"\r\nThe domain ants2whale.com had a legitimately signed Sectigo Secure Sockets Layer (SSL) certificate, which was “Domain\r\nControl Validated” just as all previous AppleJeus domain certificates. The certificate was is valid from 09/21/2020 –\r\n09/21/2021.\r\nThe domain is registered with NameCheap at the IP address 198.54.114.237 with ASN 22612. This IP is on the same ASN as\r\nthe CoinGoTrade (AppleJeus variant 5 and Dorusio IP addresses (AppleJeus variant 6).\r\nScreenshots\r\nFigure 1 - Screenshot the ants2whale.com site.\r\nFigure 2 - Screenshot of how to download Ants2Whale.\r\nd5ac680e14b013e0624470da7f46e84809d00b59a7544f6a42b110cf0e29254e\r\nTags\r\ntrojan\r\nDetails\r\nhttps://us-cert.cisa.gov/ncas/analysis-reports/ar21-048g\r\nPage 3 of 8\n\nName Ants2Whale\r\nSize 77856 bytes\r\nType Mach-O 64-bit x86_64 executable, flags:\u003cNOUNDEFS|DYLDLINK|TWOLEVEL|PIE\u003e\r\nMD5 022298cf16c0c44d7b01b5de2cf84023\r\nSHA1 939ec41183bbe1f4fb65c924323543ee91a35dbf\r\nSHA256 d5ac680e14b013e0624470da7f46e84809d00b59a7544f6a42b110cf0e29254e\r\nSHA512 bda62d09606bbf5a0ee17dac06f1f3cfc77919f98e5fc14bd50b4f41f794df521aeced7b0f2a769a89498b7a6cd69be37689dab1652c3c16e7\r\nssdeep 768:jPoXPdCyI4jB5nvjILkTSF3TSFi5UeSj0OfpZDkm+UjnAT9vSs:cXPdLI6XbIOem0EpZDX+Ujnc9v3\r\nEntropy 4.361681\r\nAntivirus\r\nNo matches found.\r\nYARA Rules\r\nNo matches found.\r\nssdeep Matches\r\nNo matches found.\r\nRelationships\r\nd5ac680e14... Contained_Within [Redacted]\r\nd5ac680e14... Connected_To 45.147.231.77\r\nDescription\r\nThis OSX sample was contained within Apple DMG installer \"Ants2Whale.dmg.\" Ants2Whale is likely a copy of an open\r\nsource cryptocurrency wallet application. When ran it loads a legitimate looking program which is fully functional and is\r\nvery similar to the AppleJeus variant 5 \"CoinGoTrade\" application. Similar to CoinGoTrade there are references to\r\n“CryptoMex” in the Ants2Whale application.\r\nSimilarly to the CoinGoTrade application, the strings from Ants2Whale reveal the C2 hxxp[:]//45.147.231.77:3000.\r\nInvestigation revealed the IP address 45.147.231.77 was hosted at Combahton GMH.\r\nScreenshots\r\nFigure 3 - Screenshot of the \"Ants2Whale\" application.\r\n45.147.231.77\r\nTags\r\ncommand-and-control\r\nPorts\r\n3000 TCP\r\nWhois\r\nQueried whois.ripe.net with \"-B 45.147.231.77\"...\r\n% Information related to '45.147.228.0 - 45.147.231.255'\r\n% Abuse contact for '45.147.228.0 - 45.147.231.255' is 'abuse@combahton.net'\r\nhttps://us-cert.cisa.gov/ncas/analysis-reports/ar21-048g\r\nPage 4 of 8\n\ninetnum:        45.147.228.0 - 45.147.231.255\r\nnetname:        DE-COMBAHTON4-20190902\r\ncountry:        DE\r\norg:            ORG-CG252-RIPE\r\nadmin-c:        JH29913-RIPE\r\ntech-c:         JH29913-RIPE\r\nstatus:         ALLOCATED PA\r\nmnt-by:         mnt-de-combahton4-1\r\nmnt-by:         RIPE-NCC-HM-MNT\r\nmnt-lower:     mnt-de-combahton4-1\r\nmnt-routes:     mnt-de-combahton4-1\r\ncreated:        2019-09-02T09:46:42Z\r\nlast-modified: 2019-09-02T09:46:42Z\r\nsource:         RIPE\r\norganisation: ORG-CG252-RIPE\r\norg-name:     combahton GmbH\r\ncountry:        DE\r\norg-type:     LIR\r\naddress:        Mitterfeld 47\r\naddress:        85419\r\naddress:        Mauern\r\naddress:        GERMANY\r\ne-mail:         decombahton4@combahton.net\r\nadmin-c:        JH29913-RIPE\r\ntech-c:         JH29913-RIPE\r\nabuse-c:        AR55171-RIPE\r\nmnt-ref:        mnt-de-combahton4-1\r\nmnt-by:         RIPE-NCC-HM-MNT\r\nmnt-by:         mnt-de-combahton4-1\r\ncreated:        2019-08-30T08:08:51Z\r\nlast-modified: 2020-12-16T13:30:44Z\r\nsource:         RIPE\r\nphone:         +4987642589890\r\nperson:         Joseph Hofmann\r\naddress:        Mitterfeld 47\r\naddress:        85419\r\naddress:        Mauern\r\naddress:        GERMANY\r\nphone:         +4987642589890\r\nnic-hdl:        JH29913-RIPE\r\nmnt-by:         mnt-de-combahton4-1\r\ncreated:        2019-08-30T08:08:51Z\r\nlast-modified: 2019-08-30T08:08:51Z\r\nsource:         RIPE\r\n% Information related to '45.147.228.0/22AS30823'\r\nroute:         45.147.228.0/22\r\norigin:         AS30823\r\nmnt-by:         mnt-de-combahton4-1\r\ncreated:        2019-09-02T09:57:36Z\r\nlast-modified: 2019-09-02T09:57:36Z\r\nsource:         RIPE\r\nRelationships\r\n45.147.231.77 Connected_From d5ac680e14b013e0624470da7f46e84809d00b59a7544f6a42b110cf0e29254e\r\nDescription\r\nhttps://us-cert.cisa.gov/ncas/analysis-reports/ar21-048g\r\nPage 5 of 8\n\nThe C2 for Ants2Whale (D5AC680E14B013E0624470DA7F46E84809D00B59A7544F6A42B110CF0E29254E).\r\nbb430087484c1f4587c54efc75681eb60cf70956ef2a999a75ce7b563b8bd694\r\nTags\r\ndownloaderloadertrojan\r\nDetails\r\nName Ants2WhaleHelper\r\nSize 69104 bytes\r\nType Mach-O 64-bit x86_64 executable, flags:\u003cNOUNDEFS|DYLDLINK|TWOLEVEL|BINDS_TO_WEAK|PIE\u003e\r\nMD5 d4d1bcdfb67ee30303f30137db752b94\r\nSHA1 34e134d614a0d5b0e4d94d63336aa8b898b0b104\r\nSHA256 bb430087484c1f4587c54efc75681eb60cf70956ef2a999a75ce7b563b8bd694\r\nSHA512 eb9b518f95658c605b1bb3a548d7bfe630f9bff93b1f84919476377f9aabcd187db28ead9bc504ffd5c982a3985d12708888505f3d70fa5ea\r\nssdeep 1536:W1mJaIKMXBmyIZFED2enSoTVIV/3MpJy5T:XagpIsjnPTV03MpJy5T\r\nEntropy 4.831788\r\nAntivirus\r\nAvira OSX/Dldr.NukeSped.efijh\r\nBitDefender Trojan.MAC.Generic.105439\r\nESET a variant of OSX/TrojanDownloader.NukeSped.B trojan\r\nEmsisoft Trojan.MAC.Generic.105439 (B)\r\nIkarus Trojan-Downloader.OSX.Nukesped\r\nLavasoft Trojan.MAC.Generic.105439\r\nMcAfee OSX/Nukesped.h\r\nQuick Heal MacOS.Trojan.40149.GC\r\nSymantec OSX.Trojan.Gen\r\nZillya! Downloader.NukeSped.OSX.13\r\nYARA Rules\r\nNo matches found.\r\nssdeep Matches\r\nNo matches found.\r\nRelationships\r\nbb43008748... Contained_Within [Redacted]\r\nbb43008748... Connected_To qnalytica.com\r\nDescription\r\nThis OSX sample was contained within Apple DMG installer \"Ants2Whale.dmg.\" Ants2WhaleHelper is similar to variants\r\nof AppleJeus. The Ants2WhaleHelper program contains the custom C++ \"Barbeque\" class for network communication as\r\nseen in the unioncryptoupater program. The C2 for this program is hxxps[:]//www[.]qnalytica.com/wp-rss.php.\r\nhttps://us-cert.cisa.gov/ncas/analysis-reports/ar21-048g\r\nPage 6 of 8\n\nqnalytica.com\r\nTags\r\ncommand-and-control\r\nURLs\r\nqnalytica.com/wp-rss.php\r\nWhois\r\nWhois for qnalytica.com had the following information:\r\nRegistrar: ENOM INC\r\nCreation Date: 2020-08-11\r\nRegistrar Registration Expiration Date: 2021-08-11\r\nRelationships\r\nqnalytica.com Connected_From bb430087484c1f4587c54efc75681eb60cf70956ef2a999a75ce7b563b8bd694\r\nDescription\r\nThe domain qnalytica.com has a legitimately signed SSL certificate from cPanel. cPanel is a hosting platform and certificate\r\nauthority which is a reseller for Sectigo. The domain is registered with NameCheap at the IP address 194.36.191.196 with\r\nASN 60117.\r\nRelationship Summary\r\n[Redacted] Downloaded_By ants2whale.com\r\n[Redacted] Contains d5ac680e14b013e0624470da7f46e84809d00b59a7544f6a42b110cf0e29254e\r\n[Redacted] Contains bb430087484c1f4587c54efc75681eb60cf70956ef2a999a75ce7b563b8bd694\r\nants2whale.com Downloaded [Redacted]\r\nd5ac680e14... Contained_Within [Redacted]\r\nd5ac680e14... Connected_To 45.147.231.77\r\n45.147.231.77 Connected_From d5ac680e14b013e0624470da7f46e84809d00b59a7544f6a42b110cf0e29254e\r\nbb43008748... Contained_Within [Redacted]\r\nbb43008748... Connected_To qnalytica.com\r\nqnalytica.com Connected_From bb430087484c1f4587c54efc75681eb60cf70956ef2a999a75ce7b563b8bd694\r\nRecommendations\r\nCISA recommends that users and administrators consider using the following best practices to strengthen the security\r\nposture of their organization's systems. Any configuration changes should be reviewed by system owners and administrators\r\nprior to implementation to avoid unwanted impacts.\r\nMaintain up-to-date antivirus signatures and engines.\r\nKeep operating system patches up-to-date.\r\nDisable File and Printer sharing services. If these services are required, use strong passwords or Active Directory\r\nauthentication.\r\nRestrict users' ability (permissions) to install and run unwanted software applications. Do not add users to the local\r\nadministrators group unless required.\r\nEnforce a strong password policy and implement regular password changes.\r\nExercise caution when opening e-mail attachments even if the attachment is expected and the sender appears to be\r\nknown.\r\nEnable a personal firewall on agency workstations, configured to deny unsolicited connection requests.\r\nDisable unnecessary services on agency workstations and servers.\r\nhttps://us-cert.cisa.gov/ncas/analysis-reports/ar21-048g\r\nPage 7 of 8\n\nScan for and remove suspicious e-mail attachments; ensure the scanned attachment is its \"true file type\" (i.e., the\r\nextension matches the file header).\r\nMonitor users' web browsing habits; restrict access to sites with unfavorable content.\r\nExercise caution when using removable media (e.g., USB thumb drives, external drives, CDs, etc.).\r\nScan all software downloaded from the Internet prior to executing.\r\nMaintain situational awareness of the latest threats and implement appropriate Access Control Lists (ACLs).\r\nAdditional information on malware incident prevention and handling can be found in National Institute of Standards and\r\nTechnology (NIST) Special Publication 800-83, \"Guide to Malware Incident Prevention \u0026 Handling for Desktops and\r\nLaptops\".\r\nContact Information\r\nDocument FAQ\r\nWhat is a MIFR? A Malware Initial Findings Report (MIFR) is intended to provide organizations with malware analysis in\r\na timely manner. In most instances this report will provide initial indicators for computer and network defense. To request\r\nadditional analysis, please contact CISA and provide information regarding the level of desired analysis.\r\nWhat is a MAR? A Malware Analysis Report (MAR) is intended to provide organizations with more detailed malware\r\nanalysis acquired via manual reverse engineering. To request additional analysis, please contact CISA and provide\r\ninformation regarding the level of desired analysis.\r\nCan I edit this document? This document is not to be edited in any way by recipients. All comments or questions related to\r\nthis document should be directed to the CISA at 1-844-Say-CISA or CISA Central .\r\nCan I submit malware to CISA? Malware samples can be submitted via three methods:\r\nWeb: https://malware.us-cert.gov\r\nE-Mail: submit@malware.us-cert.gov\r\nFTP: ftp.malware.us-cert.gov (anonymous)\r\nCISA encourages you to report any suspicious activity, including cybersecurity incidents, possible malicious code, software\r\nvulnerabilities, and phishing-related scams. Reporting forms can be found on CISA's homepage at www.cisa.gov.\r\nSource: https://us-cert.cisa.gov/ncas/analysis-reports/ar21-048g\r\nhttps://us-cert.cisa.gov/ncas/analysis-reports/ar21-048g\r\nPage 8 of 8",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"Malpedia"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://us-cert.cisa.gov/ncas/analysis-reports/ar21-048g"
	],
	"report_names": [
		"ar21-048g"
	],
	"threat_actors": [
		{
			"id": "34eea331-d052-4096-ae03-a22f1d090bd4",
			"created_at": "2025-08-07T02:03:25.073494Z",
			"updated_at": "2026-04-10T02:00:03.709243Z",
			"deleted_at": null,
			"main_name": "NICKEL ACADEMY",
			"aliases": [
				"ATK3 ",
				"Black Artemis ",
				"COVELLITE ",
				"CTG-2460 ",
				"Citrine Sleet ",
				"Diamond Sleet ",
				"Guardians of Peace",
				"HIDDEN COBRA ",
				"High Anonymous",
				"Labyrinth Chollima ",
				"Lazarus Group ",
				"NNPT Group",
				"New Romanic Cyber Army Team",
				"Temp.Hermit ",
				"UNC577 ",
				"Who Am I?",
				"Whois Team",
				"ZINC "
			],
			"source_name": "Secureworks:NICKEL ACADEMY",
			"tools": [
				"Destover",
				"KorHigh",
				"Volgmer"
			],
			"source_id": "Secureworks",
			"reports": null
		},
		{
			"id": "544ecd2c-82c9-417c-9d98-d1ae395df964",
			"created_at": "2025-10-29T02:00:52.035025Z",
			"updated_at": "2026-04-10T02:00:05.408558Z",
			"deleted_at": null,
			"main_name": "AppleJeus",
			"aliases": [
				"AppleJeus",
				"Gleaming Pisces",
				"Citrine Sleet",
				"UNC1720",
				"UNC4736"
			],
			"source_name": "MITRE:AppleJeus",
			"tools": null,
			"source_id": "MITRE",
			"reports": null
		},
		{
			"id": "732597b1-40a8-474c-88cc-eb8a421c29f1",
			"created_at": "2025-08-07T02:03:25.087732Z",
			"updated_at": "2026-04-10T02:00:03.776007Z",
			"deleted_at": null,
			"main_name": "NICKEL GLADSTONE",
			"aliases": [
				"APT38 ",
				"ATK 117 ",
				"Alluring Pisces ",
				"Black Alicanto ",
				"Bluenoroff ",
				"CTG-6459 ",
				"Citrine Sleet ",
				"HIDDEN COBRA ",
				"Lazarus Group",
				"Sapphire Sleet ",
				"Selective Pisces ",
				"Stardust Chollima ",
				"T-APT-15 ",
				"TA444 ",
				"TAG-71 "
			],
			"source_name": "Secureworks:NICKEL GLADSTONE",
			"tools": [
				"AlphaNC",
				"Bankshot",
				"CCGC_Proxy",
				"Ratankba",
				"RustBucket",
				"SUGARLOADER",
				"SwiftLoader",
				"Wcry"
			],
			"source_id": "Secureworks",
			"reports": null
		},
		{
			"id": "a2b92056-9378-4749-926b-7e10c4500dac",
			"created_at": "2023-01-06T13:46:38.430595Z",
			"updated_at": "2026-04-10T02:00:02.971571Z",
			"deleted_at": null,
			"main_name": "Lazarus Group",
			"aliases": [
				"Operation DarkSeoul",
				"Bureau 121",
				"Group 77",
				"APT38",
				"NICKEL GLADSTONE",
				"G0082",
				"COPERNICIUM",
				"Moonstone Sleet",
				"Operation GhostSecret",
				"APT 38",
				"Appleworm",
				"Unit 121",
				"ATK3",
				"G0032",
				"ATK117",
				"NewRomanic Cyber Army Team",
				"Nickel Academy",
				"Sapphire Sleet",
				"Lazarus group",
				"Hastati Group",
				"Subgroup: Bluenoroff",
				"Operation Troy",
				"Black Artemis",
				"Dark Seoul",
				"Andariel",
				"Labyrinth Chollima",
				"Operation AppleJeus",
				"COVELLITE",
				"Citrine Sleet",
				"DEV-0139",
				"DEV-1222",
				"Hidden Cobra",
				"Bluenoroff",
				"Stardust Chollima",
				"Whois Hacking Team",
				"Diamond Sleet",
				"TA404",
				"BeagleBoyz",
				"APT-C-26"
			],
			"source_name": "MISPGALAXY:Lazarus Group",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		},
		{
			"id": "32a223a8-3c79-4146-87c5-8557d38662ae",
			"created_at": "2022-10-25T15:50:23.703698Z",
			"updated_at": "2026-04-10T02:00:05.261989Z",
			"deleted_at": null,
			"main_name": "Lazarus Group",
			"aliases": [
				"Lazarus Group",
				"Labyrinth Chollima",
				"HIDDEN COBRA",
				"Guardians of Peace",
				"NICKEL ACADEMY",
				"Diamond Sleet"
			],
			"source_name": "MITRE:Lazarus Group",
			"tools": [
				"RawDisk",
				"Proxysvc",
				"BADCALL",
				"FALLCHILL",
				"WannaCry",
				"MagicRAT",
				"HOPLIGHT",
				"TYPEFRAME",
				"Dtrack",
				"HotCroissant",
				"HARDRAIN",
				"Dacls",
				"KEYMARBLE",
				"TAINTEDSCRIBE",
				"AuditCred",
				"netsh",
				"ECCENTRICBANDWAGON",
				"AppleJeus",
				"BLINDINGCAN",
				"ThreatNeedle",
				"Volgmer",
				"Cryptoistic",
				"RATANKBA",
				"Bankshot"
			],
			"source_id": "MITRE",
			"reports": null
		},
		{
			"id": "f32df445-9fb4-4234-99e0-3561f6498e4e",
			"created_at": "2022-10-25T16:07:23.756373Z",
			"updated_at": "2026-04-10T02:00:04.739611Z",
			"deleted_at": null,
			"main_name": "Lazarus Group",
			"aliases": [
				"APT-C-26",
				"ATK 3",
				"Appleworm",
				"Citrine Sleet",
				"DEV-0139",
				"Diamond Sleet",
				"G0032",
				"Gleaming Pisces",
				"Gods Apostles",
				"Gods Disciples",
				"Group 77",
				"Guardians of Peace",
				"Hastati Group",
				"Hidden Cobra",
				"ITG03",
				"Jade Sleet",
				"Labyrinth Chollima",
				"Lazarus Group",
				"NewRomanic Cyber Army Team",
				"Operation 99",
				"Operation AppleJeus",
				"Operation AppleJeus sequel",
				"Operation Blockbuster: Breach of Sony Pictures Entertainment",
				"Operation CryptoCore",
				"Operation Dream Job",
				"Operation Dream Magic",
				"Operation Flame",
				"Operation GhostSecret",
				"Operation In(ter)caption",
				"Operation LolZarus",
				"Operation Marstech Mayhem",
				"Operation No Pineapple!",
				"Operation North Star",
				"Operation Phantom Circuit",
				"Operation Sharpshooter",
				"Operation SyncHole",
				"Operation Ten Days of Rain / DarkSeoul",
				"Operation Troy",
				"SectorA01",
				"Slow Pisces",
				"TA404",
				"TraderTraitor",
				"UNC2970",
				"UNC4034",
				"UNC4736",
				"UNC4899",
				"UNC577",
				"Whois Hacking Team"
			],
			"source_name": "ETDA:Lazarus Group",
			"tools": [
				"3CX Backdoor",
				"3Rat Client",
				"3proxy",
				"AIRDRY",
				"ARTFULPIE",
				"ATMDtrack",
				"AlphaNC",
				"Alreay",
				"Andaratm",
				"AngryRebel",
				"AppleJeus",
				"Aryan",
				"AuditCred",
				"BADCALL",
				"BISTROMATH",
				"BLINDINGCAN",
				"BTC Changer",
				"BUFFETLINE",
				"BanSwift",
				"Bankshot",
				"Bitrep",
				"Bitsran",
				"BlindToad",
				"Bookcode",
				"BootWreck",
				"BottomLoader",
				"Brambul",
				"BravoNC",
				"Breut",
				"COLDCAT",
				"COPPERHEDGE",
				"CROWDEDFLOUNDER",
				"Castov",
				"CheeseTray",
				"CleanToad",
				"ClientTraficForwarder",
				"CollectionRAT",
				"Concealment Troy",
				"Contopee",
				"CookieTime",
				"Cyruslish",
				"DAVESHELL",
				"DBLL Dropper",
				"DLRAT",
				"DRATzarus",
				"DRATzarus RAT",
				"Dacls",
				"Dacls RAT",
				"DarkComet",
				"DarkKomet",
				"DeltaCharlie",
				"DeltaNC",
				"Dembr",
				"Destover",
				"DoublePulsar",
				"Dozer",
				"Dtrack",
				"Duuzer",
				"DyePack",
				"ECCENTRICBANDWAGON",
				"ELECTRICFISH",
				"Escad",
				"EternalBlue",
				"FALLCHILL",
				"FYNLOS",
				"FallChill RAT",
				"Farfli",
				"Fimlis",
				"FoggyBrass",
				"FudModule",
				"Fynloski",
				"Gh0st RAT",
				"Ghost RAT",
				"Gopuram",
				"HARDRAIN",
				"HIDDEN COBRA RAT/Worm",
				"HLOADER",
				"HOOKSHOT",
				"HOPLIGHT",
				"HOTCROISSANT",
				"HOTWAX",
				"HTTP Troy",
				"Hawup",
				"Hawup RAT",
				"Hermes",
				"HotCroissant",
				"HotelAlfa",
				"Hotwax",
				"HtDnDownLoader",
				"Http Dr0pper",
				"ICONICSTEALER",
				"Joanap",
				"Jokra",
				"KANDYKORN",
				"KEYMARBLE",
				"Kaos",
				"KillDisk",
				"KillMBR",
				"Koredos",
				"Krademok",
				"LIGHTSHIFT",
				"LIGHTSHOW",
				"LOLBAS",
				"LOLBins",
				"Lazarus",
				"LightlessCan",
				"Living off the Land",
				"MATA",
				"MBRkiller",
				"MagicRAT",
				"Manuscrypt",
				"Mimail",
				"Mimikatz",
				"Moudour",
				"Mydoom",
				"Mydoor",
				"Mytob",
				"NACHOCHEESE",
				"NachoCheese",
				"NestEgg",
				"NickelLoader",
				"NineRAT",
				"Novarg",
				"NukeSped",
				"OpBlockBuster",
				"PCRat",
				"PEBBLEDASH",
				"PLANKWALK",
				"POOLRAT",
				"PSLogger",
				"PhanDoor",
				"Plink",
				"PondRAT",
				"PowerBrace",
				"PowerRatankba",
				"PowerShell RAT",
				"PowerSpritz",
				"PowerTask",
				"Preft",
				"ProcDump",
				"Proxysvc",
				"PuTTY Link",
				"QUICKRIDE",
				"QUICKRIDE.POWER",
				"Quickcafe",
				"QuiteRAT",
				"R-C1",
				"ROptimizer",
				"Ratabanka",
				"RatabankaPOS",
				"Ratankba",
				"RatankbaPOS",
				"RawDisk",
				"RedShawl",
				"Rifdoor",
				"Rising Sun",
				"Romeo-CoreOne",
				"RomeoAlfa",
				"RomeoBravo",
				"RomeoCharlie",
				"RomeoCore",
				"RomeoDelta",
				"RomeoEcho",
				"RomeoFoxtrot",
				"RomeoGolf",
				"RomeoHotel",
				"RomeoMike",
				"RomeoNovember",
				"RomeoWhiskey",
				"Romeos",
				"RustBucket",
				"SHADYCAT",
				"SHARPKNOT",
				"SIGFLIP",
				"SIMPLESEA",
				"SLICKSHOES",
				"SORRYBRUTE",
				"SUDDENICON",
				"SUGARLOADER",
				"SheepRAT",
				"SierraAlfa",
				"SierraBravo",
				"SierraCharlie",
				"SierraJuliett-MikeOne",
				"SierraJuliett-MikeTwo",
				"SimpleTea",
				"SimplexTea",
				"SmallTiger",
				"Stunnel",
				"TAINTEDSCRIBE",
				"TAXHAUL",
				"TFlower",
				"TOUCHKEY",
				"TOUCHMOVE",
				"TOUCHSHIFT",
				"TOUCHSHOT",
				"TWOPENCE",
				"TYPEFRAME",
				"Tdrop",
				"Tdrop2",
				"ThreatNeedle",
				"Tiger RAT",
				"TigerRAT",
				"Trojan Manuscript",
				"Troy",
				"TroyRAT",
				"VEILEDSIGNAL",
				"VHD",
				"VHD Ransomware",
				"VIVACIOUSGIFT",
				"VSingle",
				"ValeforBeta",
				"Volgmer",
				"Vyveva",
				"W1_RAT",
				"Wana Decrypt0r",
				"WanaCry",
				"WanaCrypt",
				"WanaCrypt0r",
				"WannaCry",
				"WannaCrypt",
				"WannaCryptor",
				"WbBot",
				"Wcry",
				"Win32/KillDisk.NBB",
				"Win32/KillDisk.NBC",
				"Win32/KillDisk.NBD",
				"Win32/KillDisk.NBH",
				"Win32/KillDisk.NBI",
				"WinorDLL64",
				"Winsec",
				"WolfRAT",
				"Wormhole",
				"YamaBot",
				"Yort",
				"ZetaNile",
				"concealment_troy",
				"http_troy",
				"httpdr0pper",
				"httpdropper",
				"klovbot",
				"sRDI"
			],
			"source_id": "ETDA",
			"reports": null
		}
	],
	"ts_created_at": 1775434519,
	"ts_updated_at": 1775826737,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/21d42e3de690e507456d7eccf8fd7a30cba6ea66.pdf",
		"text": "https://archive.orkl.eu/21d42e3de690e507456d7eccf8fd7a30cba6ea66.txt",
		"img": "https://archive.orkl.eu/21d42e3de690e507456d7eccf8fd7a30cba6ea66.jpg"
	}
}