{
	"id": "d69d023c-83af-49ab-8d87-9cff6f6159f2",
	"created_at": "2026-04-06T00:10:23.227459Z",
	"updated_at": "2026-04-10T13:11:18.569508Z",
	"deleted_at": null,
	"sha1_hash": "33ad129eca6124ae62375ab57ff8fb7e2608b3cb",
	"title": "Threat Group Cards: A Threat Actor Encyclopedia",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 49957,
	"plain_text": "Threat Group Cards: A Threat Actor Encyclopedia\nArchived: 2026-04-02 11:38:10 UTC\nHome \u003e List all groups \u003e List all tools \u003e List all groups using tool Hancitor\n Tool: Hancitor\nNames\nHancitor\nChanitor\nCategory Malware\nType Downloader, Loader\nDescription\n(Palo Alto) In the past, Hancitor was sent as a malicious attachment in a spam email\nwhich would then download and install the attackers’ final malware like a banking\nTrojan. When they would do this, the Hancitor attachment would download and install\nthe final malware from a malicious or compromised site.\nBut as organizations have gotten more effective at blocking malicious attachments like\nHancitor, we’ve seen the attackers behind Hancitor adapt to evade detection and\nprevention.\nThey’ve done this by moving the Hancitor malware from being a malicious attachment\nin spam to itself being a malicious download. The spam the attackers use no long has a\nmalicious attachment but instead a malicious link that downloads the malicious Hancitor\nattachment.\nInformation\nMITRE ATT\u0026CK Malpedia AlienVault OTX Last change to this tool card: 30 December 2022\nhttps://apt.etda.or.th/cgi-bin/listgroups.cgi?u=75abbd4a-2ff3-4b94-af79-e864af5a4513\nPage 1 of 2\n\nDownload this tool card in JSON format\r\nAll groups using tool Hancitor\r\nChanged Name Country Observed\r\nOther groups\r\n  TA511 [Unknown] 2018-Oct 2020  \r\n1 group listed (0 APT, 1 other, 0 unknown)\r\nSource: https://apt.etda.or.th/cgi-bin/listgroups.cgi?u=75abbd4a-2ff3-4b94-af79-e864af5a4513\r\nhttps://apt.etda.or.th/cgi-bin/listgroups.cgi?u=75abbd4a-2ff3-4b94-af79-e864af5a4513\r\nPage 2 of 2",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://apt.etda.or.th/cgi-bin/listgroups.cgi?u=75abbd4a-2ff3-4b94-af79-e864af5a4513"
	],
	"report_names": [
		"listgroups.cgi?u=75abbd4a-2ff3-4b94-af79-e864af5a4513"
	],
	"threat_actors": [
		{
			"id": "1f6ae238-765f-4495-9d54-6a7883d7a319",
			"created_at": "2022-10-25T16:07:24.573456Z",
			"updated_at": "2026-04-10T02:00:05.037738Z",
			"deleted_at": null,
			"main_name": "TA511",
			"aliases": [
				"MAN1",
				"Moskalvzapoe"
			],
			"source_name": "ETDA:TA511",
			"tools": [
				"Agentemis",
				"Chanitor",
				"Cobalt Strike",
				"CobaltStrike",
				"Ficker Stealer",
				"Hancitor",
				"NetSupport",
				"NetSupport Manager",
				"NetSupport Manager RAT",
				"NetSupport RAT",
				"NetSupportManager RAT",
				"cobeacon"
			],
			"source_id": "ETDA",
			"reports": null
		},
		{
			"id": "542cf9d0-9c68-428c-aff8-81b6f59dc985",
			"created_at": "2023-02-15T02:01:49.554105Z",
			"updated_at": "2026-04-10T02:00:03.347115Z",
			"deleted_at": null,
			"main_name": "Moskalvzapoe",
			"aliases": [
				"MAN1",
				"TA511"
			],
			"source_name": "MISPGALAXY:Moskalvzapoe",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		}
	],
	"ts_created_at": 1775434223,
	"ts_updated_at": 1775826678,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/33ad129eca6124ae62375ab57ff8fb7e2608b3cb.pdf",
		"text": "https://archive.orkl.eu/33ad129eca6124ae62375ab57ff8fb7e2608b3cb.txt",
		"img": "https://archive.orkl.eu/33ad129eca6124ae62375ab57ff8fb7e2608b3cb.jpg"
	}
}