{
	"id": "22cfbd7b-61d2-4445-90ab-2dc364a30f68",
	"created_at": "2026-04-06T00:17:46.067025Z",
	"updated_at": "2026-04-10T03:35:17.307453Z",
	"deleted_at": null,
	"sha1_hash": "5cd938b7b8121b0ee60375e611724f8ac298ab87",
	"title": "Threat Group Cards: A Threat Actor Encyclopedia",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 46876,
	"plain_text": "Threat Group Cards: A Threat Actor Encyclopedia\nArchived: 2026-04-05 17:11:05 UTC\nHome \u003e List all groups \u003e List all tools \u003e List all groups using tool ProxyChains\n Tool: ProxyChains\nNames ProxyChains\nCategory Tools\nType Tunneling\nDescription\n(CrowdStrike) This open-source utility is capable of chaining proxies together and forcing\nnetwork traffic through said chain of proxies, even if the program generating the traffic does\nnot have proxy support. It utilizes a configuration file to specify proxies in use. The recovered\nconfiguration file contained a mixture of local IP addresses, IP addresses belonging to Vultr,\nand IP addresses belonging to eight different telecommunication organizations from around the\nworld.\nInformation Last change to this tool card: 03 November 2021\nDownload this tool card in JSON format\nAll groups using tool ProxyChains\nChanged Name Country Observed\nAPT groups\n LightBasin 2016\n1 group listed (1 APT, 0 other, 0 unknown)\nSource: https://apt.etda.or.th/cgi-bin/listgroups.cgi?u=ae97d406-b9ca-410b-8ab5-6e0ff904892b\nhttps://apt.etda.or.th/cgi-bin/listgroups.cgi?u=ae97d406-b9ca-410b-8ab5-6e0ff904892b\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://apt.etda.or.th/cgi-bin/listgroups.cgi?u=ae97d406-b9ca-410b-8ab5-6e0ff904892b"
	],
	"report_names": [
		"listgroups.cgi?u=ae97d406-b9ca-410b-8ab5-6e0ff904892b"
	],
	"threat_actors": [
		{
			"id": "ece64b74-f887-4d58-9004-2d1406d37337",
			"created_at": "2022-10-25T16:07:23.794442Z",
			"updated_at": "2026-04-10T02:00:04.751764Z",
			"deleted_at": null,
			"main_name": "LightBasin",
			"aliases": [
				"DecisiveArchitect",
				"Luminal Panda",
				"TH-239",
				"UNC1945"
			],
			"source_name": "ETDA:LightBasin",
			"tools": [
				"CordScan",
				"EVILSUN",
				"FRP",
				"Fast Reverse Proxy",
				"Impacket",
				"LEMONSTICK",
				"LOGBLEACH",
				"LOLBAS",
				"LOLBins",
				"Living off the Land",
				"OKSOLO",
				"OPENSHACKLE",
				"ProxyChains",
				"Pupy",
				"PupyRAT",
				"SIGTRANslator",
				"SLAPSTICK",
				"SMBExec",
				"STEELCORGI",
				"Tiny SHell",
				"pupy",
				"tsh"
			],
			"source_id": "ETDA",
			"reports": null
		},
		{
			"id": "31c0d0e1-f793-4374-90aa-138ea1daea50",
			"created_at": "2023-11-30T02:00:07.29462Z",
			"updated_at": "2026-04-10T02:00:03.482987Z",
			"deleted_at": null,
			"main_name": "LightBasin",
			"aliases": [
				"UNC1945",
				"CL-CRI-0025"
			],
			"source_name": "MISPGALAXY:LightBasin",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		}
	],
	"ts_created_at": 1775434666,
	"ts_updated_at": 1775792117,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/5cd938b7b8121b0ee60375e611724f8ac298ab87.pdf",
		"text": "https://archive.orkl.eu/5cd938b7b8121b0ee60375e611724f8ac298ab87.txt",
		"img": "https://archive.orkl.eu/5cd938b7b8121b0ee60375e611724f8ac298ab87.jpg"
	}
}