{
	"id": "532d4bef-0017-4236-9e21-c43bae1c8125",
	"created_at": "2026-04-06T00:18:27.450601Z",
	"updated_at": "2026-04-10T13:13:05.725724Z",
	"deleted_at": null,
	"sha1_hash": "6a53dc561ff30ba9b32c6ed1a4c6aa3e33de35a2",
	"title": "Threat Group Cards: A Threat Actor Encyclopedia",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 52039,
	"plain_text": "Threat Group Cards: A Threat Actor Encyclopedia\r\nArchived: 2026-04-05 17:47:09 UTC\r\nHome \u003e List all groups \u003e List all tools \u003e List all groups using tool CetaRAT\r\n Tool: CetaRAT\r\nNames CetaRAT\r\nCategory Malware\r\nType Backdoor\r\nDescription\r\n(Talos) SideCopy’s staple RAT first seen in the wild in 2019. This was already disclosed\r\npublicly. We are calling it “CetaRAT” to identify it throughout this research piece.\r\nInformation\r\n\u003chttps://s3.amazonaws.com/talos-intelligence-site/production/document_files/files/000/095/591/original/062521_SideCopy_%281%29.pdf?\r\n1625657388\u003e\r\nMalpedia \u003chttps://malpedia.caad.fkie.fraunhofer.de/details/win.ceta_rat\u003e\r\nAlienVault OTX \u003chttps://otx.alienvault.com/browse/global/pulses?q=tag:cetarat\u003e\r\nLast change to this tool card: 27 December 2022\r\nDownload this tool card in JSON format\r\nAll groups using tool CetaRAT\r\nChanged Name Country Observed\r\nAPT groups\r\n  SideCopy 2019-Mar 2025\r\n1 group listed (1 APT, 0 other, 0 unknown)\r\nSource: https://apt.etda.or.th/cgi-bin/listgroups.cgi?u=af1983b4-7f79-40c4-aca5-8b0812ec8007\r\nhttps://apt.etda.or.th/cgi-bin/listgroups.cgi?u=af1983b4-7f79-40c4-aca5-8b0812ec8007\r\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://apt.etda.or.th/cgi-bin/listgroups.cgi?u=af1983b4-7f79-40c4-aca5-8b0812ec8007"
	],
	"report_names": [
		"listgroups.cgi?u=af1983b4-7f79-40c4-aca5-8b0812ec8007"
	],
	"threat_actors": [
		{
			"id": "187a0668-a968-4cf0-8bfd-4bc97c02f6dc",
			"created_at": "2022-10-27T08:27:12.955905Z",
			"updated_at": "2026-04-10T02:00:05.376527Z",
			"deleted_at": null,
			"main_name": "SideCopy",
			"aliases": [
				"SideCopy"
			],
			"source_name": "MITRE:SideCopy",
			"tools": [
				"AuTo Stealer",
				"Action RAT"
			],
			"source_id": "MITRE",
			"reports": null
		},
		{
			"id": "a4f0e383-f447-4cd6-80e3-ffc073ed4e00",
			"created_at": "2023-01-06T13:46:39.30167Z",
			"updated_at": "2026-04-10T02:00:03.280161Z",
			"deleted_at": null,
			"main_name": "SideCopy",
			"aliases": [],
			"source_name": "MISPGALAXY:SideCopy",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		},
		{
			"id": "b584b10a-7d54-4d05-9e21-b223563df7b8",
			"created_at": "2022-10-25T16:07:24.181589Z",
			"updated_at": "2026-04-10T02:00:04.892659Z",
			"deleted_at": null,
			"main_name": "SideCopy",
			"aliases": [
				"G1008",
				"Mocking Draco",
				"TAG-140",
				"UNC2269",
				"White Dev 55"
			],
			"source_name": "ETDA:SideCopy",
			"tools": [
				"ActionRAT",
				"AllaKore",
				"Allakore RAT",
				"AresRAT",
				"Bladabindi",
				"CetaRAT",
				"DetaRAT",
				"EpicenterRAT",
				"Jorik",
				"Lilith",
				"Lilith RAT",
				"MargulasRAT",
				"ReverseRAT",
				"njRAT"
			],
			"source_id": "ETDA",
			"reports": null
		}
	],
	"ts_created_at": 1775434707,
	"ts_updated_at": 1775826785,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/6a53dc561ff30ba9b32c6ed1a4c6aa3e33de35a2.pdf",
		"text": "https://archive.orkl.eu/6a53dc561ff30ba9b32c6ed1a4c6aa3e33de35a2.txt",
		"img": "https://archive.orkl.eu/6a53dc561ff30ba9b32c6ed1a4c6aa3e33de35a2.jpg"
	}
}