{
	"id": "3ebbdf49-25fa-45e1-b026-dbad12d54bf8",
	"created_at": "2026-04-06T00:18:34.803061Z",
	"updated_at": "2026-04-10T03:33:20.014984Z",
	"deleted_at": null,
	"sha1_hash": "4069ca0c10e1158e18531abc5aff50edb4c526b3",
	"title": "Exile RAT (Malware Family)",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 34050,
	"plain_text": "Exile RAT (Malware Family)\r\nBy Fraunhofer FKIE\r\nArchived: 2026-04-05 17:20:07 UTC\r\nwin.exilerat (Back to overview)\r\nExile RAT\r\nActor(s): TA413\r\nExileRAT is a simple RAT platform capable of getting information on the system (computer name, username,\r\nlisting drives, network adapter, process name), getting/pushing files and executing/terminating processes.\r\nReferences\r\n2019-02-04 ⋅ Cisco ⋅ Jaeson Schultz, Paul Rascagnères, Warren Mercer\r\nExileRAT shares C2 with LuckyCat, targets Tibet\r\nLuckyCat Exile RAT\r\nThere is no Yara-Signature yet.\r\nSource: https://malpedia.caad.fkie.fraunhofer.de/details/win.exilerat\r\nhttps://malpedia.caad.fkie.fraunhofer.de/details/win.exilerat\r\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://malpedia.caad.fkie.fraunhofer.de/details/win.exilerat"
	],
	"report_names": [
		"win.exilerat"
	],
	"threat_actors": [
		{
			"id": "3b1367ff-99dc-41f0-986f-4a1dcb41bbbf",
			"created_at": "2022-10-25T16:07:24.273478Z",
			"updated_at": "2026-04-10T02:00:04.918037Z",
			"deleted_at": null,
			"main_name": "TA413",
			"aliases": [
				"White Dev 9"
			],
			"source_name": "ETDA:TA413",
			"tools": [
				"Exile RAT",
				"ExileRAT",
				"Sepulcher"
			],
			"source_id": "ETDA",
			"reports": null
		},
		{
			"id": "9792e41f-4165-474b-99fa-e74ec332bd87",
			"created_at": "2023-01-06T13:46:38.986789Z",
			"updated_at": "2026-04-10T02:00:03.172308Z",
			"deleted_at": null,
			"main_name": "Lucky Cat",
			"aliases": [
				"TA413",
				"White Dev 9"
			],
			"source_name": "MISPGALAXY:Lucky Cat",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		},
		{
			"id": "86182dd7-646c-49c5-91a6-4b62fd2119a7",
			"created_at": "2025-08-07T02:03:24.617638Z",
			"updated_at": "2026-04-10T02:00:03.738499Z",
			"deleted_at": null,
			"main_name": "BRONZE HOBART",
			"aliases": [
				"APT23",
				"Earth Centaur ",
				"KeyBoy ",
				"Pirate Panda ",
				"Red Orthrus ",
				"TA413 ",
				"Tropic Trooper "
			],
			"source_name": "Secureworks:BRONZE HOBART",
			"tools": [
				"Crowdoor",
				"DSNGInstaller",
				"KeyBoy",
				"LOWZERO",
				"Mofu",
				"Pfine",
				"Sepulcher",
				"Xiangoop Loader",
				"Yahaoyah"
			],
			"source_id": "Secureworks",
			"reports": null
		}
	],
	"ts_created_at": 1775434714,
	"ts_updated_at": 1775792000,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/4069ca0c10e1158e18531abc5aff50edb4c526b3.pdf",
		"text": "https://archive.orkl.eu/4069ca0c10e1158e18531abc5aff50edb4c526b3.txt",
		"img": "https://archive.orkl.eu/4069ca0c10e1158e18531abc5aff50edb4c526b3.jpg"
	}
}