{
	"id": "3a0abf74-e276-4bd0-a4ee-13ce09cf667e",
	"created_at": "2026-04-06T00:12:28.879903Z",
	"updated_at": "2026-04-10T13:13:03.902326Z",
	"deleted_at": null,
	"sha1_hash": "553446138e40216edb75b2f6b7c353d3aac29490",
	"title": "GitHub - dlegezo/common",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 70216,
	"plain_text": "GitHub - dlegezo/common\r\nBy Denis Legezo\r\nArchived: 2026-04-05 13:45:18 UTC\r\nSkip to content\r\nNavigation Menu\r\nAI CODE CREATION\r\nGitHub CopilotWrite better code with AI\r\nGitHub SparkBuild and deploy intelligent apps\r\nGitHub ModelsManage and compare prompts\r\nMCP RegistryNewIntegrate external tools\r\nView all features\r\nPricing\r\nSign up\r\nNotifications\r\nFork 2\r\nStar 2\r\nFolders and files\r\nhttps://github.com/dlegezo/common\r\nPage 1 of 3\n\nName Name Last commit message\r\nLast commit\r\ndate\r\nLatest commit\r\nDenis Legezo\r\nMontys Three external sender decryptor\r\nadded\r\nOct 14, 2020\r\ne02da43 · Oct 14, 2020\r\nHistory\r\n29 Commits\r\nbase base\r\nOrigami Elephant C2 decryptor\r\noptimisation\r\nJun 27, 2020\r\nconverter converter\r\nMontys Three external sender decryptor\r\nadded\r\nSep 13, 2020\r\nio io\r\nMontys Three external sender decryptor\r\nadded\r\nOct 14, 2020\r\nlogger logger Basic C++ logger May 5, 2020\r\nmalware malware\r\nMontys Three external sender decryptor\r\nadded\r\nSep 13, 2020\r\nmbedtls mbedtls\r\nMontys Three external sender decryptor\r\nadded\r\nSep 13, 2020\r\nhttps://github.com/dlegezo/common\r\nPage 2 of 3\n\nName Name Last commit message\r\nLast commit\r\ndate\r\nprofiler profiler Basic C++ logger May 5, 2020\r\nzlib-1.1.4 zlib-1.1.4\r\nMining campaign config and plugins\r\ndecryptor, zlib\r\nJun 3, 2020\r\nREADME.md README.md Update README.md May 18, 2020\r\nREADME\r\nCommon custom decryption C++ libraries\r\nUsage sample:\r\n#include \"./malware/microcin/microcin.h\"\r\nusing namespace std;\r\nint main() {\r\n try {\r\n parse_microcin_config(\"\u003cmicrocin config path here\u003e\");\r\n parse_microcin_stegano(\"\u003cmicrocin .bmp file here\u003e\");\r\n return 0;\r\n } catch (runtime_error e) {\r\n cout \u003c\u003c e.what();\r\n return 1;\r\n }\r\n}\r\nSource: https://github.com/dlegezo/common\r\nhttps://github.com/dlegezo/common\r\nPage 3 of 3",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"Malpedia"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://github.com/dlegezo/common"
	],
	"report_names": [
		"common"
	],
	"threat_actors": [
		{
			"id": "2ac63ef4-a7b8-4a30-96ad-b30ccb2073fc",
			"created_at": "2022-10-25T16:07:23.546262Z",
			"updated_at": "2026-04-10T02:00:04.651083Z",
			"deleted_at": null,
			"main_name": "Donot Team",
			"aliases": [
				"APT-C-35",
				"Mint Tempest",
				"Origami Elephant",
				"SectorE02"
			],
			"source_name": "ETDA:Donot Team",
			"tools": [
				"BackConfig",
				"EHDevel",
				"Jaca",
				"yty"
			],
			"source_id": "ETDA",
			"reports": null
		}
	],
	"ts_created_at": 1775434348,
	"ts_updated_at": 1775826783,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/553446138e40216edb75b2f6b7c353d3aac29490.pdf",
		"text": "https://archive.orkl.eu/553446138e40216edb75b2f6b7c353d3aac29490.txt",
		"img": "https://archive.orkl.eu/553446138e40216edb75b2f6b7c353d3aac29490.jpg"
	}
}