{
	"id": "ef241956-1211-42fd-940c-2e4fd5b7f782",
	"created_at": "2026-04-06T00:11:05.124883Z",
	"updated_at": "2026-04-10T13:12:39.286231Z",
	"deleted_at": null,
	"sha1_hash": "311fa5a3b43599b524adaf76bf7793047a0a32bf",
	"title": "Threat Group Cards: A Threat Actor Encyclopedia",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 44562,
	"plain_text": "Threat Group Cards: A Threat Actor Encyclopedia\nArchived: 2026-04-05 16:37:10 UTC\nHome \u003e List all groups \u003e List all tools \u003e List all groups using tool JackalControl\n Tool: JackalControl\nNames JackalControl\nCategory Malware\nType Backdoor, Downloader, Exfiltration\nDescription\n(Kaspersky) This is a Trojan that allows the attackers to remotely control the target machine\nthrough a set of predefined and supported commands. These are received via an HTTPS\ncommunication channel facilitated between the malware and the C2 servers, and can instruct\nthe implant to conduct any of the following operations:\n• Execute an arbitrary program with provided arguments\n• Download arbitrary files to the local file system\n• Upload arbitrary files from the local file system\nInformation Last change to this tool card: 21 June 2023\nDownload this tool card in JSON format\nAll groups using tool JackalControl\nChanged Name Country Observed\nAPT groups\n GoldenJackal [Unknown] 2019-2022\n1 group listed (1 APT, 0 other, 0 unknown)\nSource: https://apt.etda.or.th/cgi-bin/listgroups.cgi?u=ebc87c6b-83cb-47c5-bea4-bbc5f268ceff\nhttps://apt.etda.or.th/cgi-bin/listgroups.cgi?u=ebc87c6b-83cb-47c5-bea4-bbc5f268ceff\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://apt.etda.or.th/cgi-bin/listgroups.cgi?u=ebc87c6b-83cb-47c5-bea4-bbc5f268ceff"
	],
	"report_names": [
		"listgroups.cgi?u=ebc87c6b-83cb-47c5-bea4-bbc5f268ceff"
	],
	"threat_actors": [
		{
			"id": "a8356cf9-e9d6-4585-8ccf-d30d3efe142b",
			"created_at": "2023-06-23T02:04:34.262059Z",
			"updated_at": "2026-04-10T02:00:04.711064Z",
			"deleted_at": null,
			"main_name": "GoldenJackal",
			"aliases": [],
			"source_name": "ETDA:GoldenJackal",
			"tools": [
				"JackalControl",
				"JackalPerInfo",
				"JackalScreenWatcher",
				"JackalSteal",
				"JackalWorm"
			],
			"source_id": "ETDA",
			"reports": null
		},
		{
			"id": "bacb81f4-18d1-4dcd-b277-65a9dac41b61",
			"created_at": "2023-11-04T02:00:07.680044Z",
			"updated_at": "2026-04-10T02:00:03.390891Z",
			"deleted_at": null,
			"main_name": "GoldenJackal",
			"aliases": [],
			"source_name": "MISPGALAXY:GoldenJackal",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		}
	],
	"ts_created_at": 1775434265,
	"ts_updated_at": 1775826759,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/311fa5a3b43599b524adaf76bf7793047a0a32bf.pdf",
		"text": "https://archive.orkl.eu/311fa5a3b43599b524adaf76bf7793047a0a32bf.txt",
		"img": "https://archive.orkl.eu/311fa5a3b43599b524adaf76bf7793047a0a32bf.jpg"
	}
}