{
	"id": "2ea0e6b4-a312-472b-b188-19e34dc53d23",
	"created_at": "2026-04-06T00:19:39.486278Z",
	"updated_at": "2026-04-10T03:35:38.094333Z",
	"deleted_at": null,
	"sha1_hash": "6583d95052ff2e5180652717677493791a0248f1",
	"title": "Threat Group Cards: A Threat Actor Encyclopedia",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 51954,
	"plain_text": "Threat Group Cards: A Threat Actor Encyclopedia\r\nArchived: 2026-04-05 15:51:51 UTC\r\nHome \u003e List all groups \u003e List all tools \u003e List all groups using tool ActionRAT\r\n Tool: ActionRAT\r\nNames ActionRAT\r\nCategory Malware\r\nType Backdoor\r\nDescription\r\n(Talos) ActionRAT is another Delphi-based RAT used in SideCopy’s operations. At first\r\nglance, it looks quite similar to Allakore RAT but is distinct in its implementation. We also\r\nfound a C#-based version of the RAT, indicating that the attackers have ported it to the Dot\r\nNet platform, as well.\r\nInformation\r\n\u003chttps://s3.amazonaws.com/talos-intelligence-site/production/document_files/files/000/095/591/original/062521_SideCopy_%281%29.pdf?\r\n1625657388\u003e\r\nAlienVault OTX \u003chttps://otx.alienvault.com/browse/global/pulses?q=tag:actionrat\u003e\r\nLast change to this tool card: 10 August 2021\r\nDownload this tool card in JSON format\r\nAll groups using tool ActionRAT\r\nChanged Name Country Observed\r\nAPT groups\r\n  SideCopy 2019-Mar 2025\r\n1 group listed (1 APT, 0 other, 0 unknown)\r\nSource: https://apt.etda.or.th/cgi-bin/listgroups.cgi?u=12b53b3b-9f41-4da5-b261-2cda27b284bb\r\nhttps://apt.etda.or.th/cgi-bin/listgroups.cgi?u=12b53b3b-9f41-4da5-b261-2cda27b284bb\r\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://apt.etda.or.th/cgi-bin/listgroups.cgi?u=12b53b3b-9f41-4da5-b261-2cda27b284bb"
	],
	"report_names": [
		"listgroups.cgi?u=12b53b3b-9f41-4da5-b261-2cda27b284bb"
	],
	"threat_actors": [
		{
			"id": "187a0668-a968-4cf0-8bfd-4bc97c02f6dc",
			"created_at": "2022-10-27T08:27:12.955905Z",
			"updated_at": "2026-04-10T02:00:05.376527Z",
			"deleted_at": null,
			"main_name": "SideCopy",
			"aliases": [
				"SideCopy"
			],
			"source_name": "MITRE:SideCopy",
			"tools": [
				"AuTo Stealer",
				"Action RAT"
			],
			"source_id": "MITRE",
			"reports": null
		},
		{
			"id": "a4f0e383-f447-4cd6-80e3-ffc073ed4e00",
			"created_at": "2023-01-06T13:46:39.30167Z",
			"updated_at": "2026-04-10T02:00:03.280161Z",
			"deleted_at": null,
			"main_name": "SideCopy",
			"aliases": [],
			"source_name": "MISPGALAXY:SideCopy",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		},
		{
			"id": "b584b10a-7d54-4d05-9e21-b223563df7b8",
			"created_at": "2022-10-25T16:07:24.181589Z",
			"updated_at": "2026-04-10T02:00:04.892659Z",
			"deleted_at": null,
			"main_name": "SideCopy",
			"aliases": [
				"G1008",
				"Mocking Draco",
				"TAG-140",
				"UNC2269",
				"White Dev 55"
			],
			"source_name": "ETDA:SideCopy",
			"tools": [
				"ActionRAT",
				"AllaKore",
				"Allakore RAT",
				"AresRAT",
				"Bladabindi",
				"CetaRAT",
				"DetaRAT",
				"EpicenterRAT",
				"Jorik",
				"Lilith",
				"Lilith RAT",
				"MargulasRAT",
				"ReverseRAT",
				"njRAT"
			],
			"source_id": "ETDA",
			"reports": null
		}
	],
	"ts_created_at": 1775434779,
	"ts_updated_at": 1775792138,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/6583d95052ff2e5180652717677493791a0248f1.pdf",
		"text": "https://archive.orkl.eu/6583d95052ff2e5180652717677493791a0248f1.txt",
		"img": "https://archive.orkl.eu/6583d95052ff2e5180652717677493791a0248f1.jpg"
	}
}