{
	"id": "402c58b9-48b6-4289-a4cc-61449397e40c",
	"created_at": "2026-04-06T00:16:42.460556Z",
	"updated_at": "2026-04-10T03:35:26.972746Z",
	"deleted_at": null,
	"sha1_hash": "75f958786ff0fe27a291face0f8df75a7274344d",
	"title": "Threat Group Cards: A Threat Actor Encyclopedia",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 46383,
	"plain_text": "Threat Group Cards: A Threat Actor Encyclopedia\r\nArchived: 2026-04-05 19:03:53 UTC\r\nHome \u003e List all groups \u003e List all tools \u003e List all groups using tool SharpEfsPotato\r\n Tool: SharpEfsPotato\r\nNames SharpEfsPotato\r\nCategory Exploits\r\nType Backdoor\r\nDescription A local privilege escalation tool using EfsRpc, built from SweetPotato.\r\nInformation \u003chttps://github.com/bugch3ck/SharpEfsPotato\u003e\r\nLast change to this tool card: 19 June 2024\r\nDownload this tool card in JSON format\r\nAll groups using tool SharpEfsPotato\r\nChanged Name Country Observed\r\nAPT groups\r\n  Operation Diplomatic Specter 2022  \r\n1 group listed (1 APT, 0 other, 0 unknown)\r\nSource: https://apt.etda.or.th/cgi-bin/listgroups.cgi?u=273be077-2621-4eb5-b000-ca8372b0ceec\r\nhttps://apt.etda.or.th/cgi-bin/listgroups.cgi?u=273be077-2621-4eb5-b000-ca8372b0ceec\r\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://apt.etda.or.th/cgi-bin/listgroups.cgi?u=273be077-2621-4eb5-b000-ca8372b0ceec"
	],
	"report_names": [
		"listgroups.cgi?u=273be077-2621-4eb5-b000-ca8372b0ceec"
	],
	"threat_actors": [
		{
			"id": "cff2cedd-a198-4e79-ae67-19048084ae7f",
			"created_at": "2024-06-20T02:02:09.945126Z",
			"updated_at": "2026-04-10T02:00:04.79991Z",
			"deleted_at": null,
			"main_name": "Operation Diplomatic Specter",
			"aliases": [
				"CL-STA-0043",
				"TGR-STA-0043"
			],
			"source_name": "ETDA:Operation Diplomatic Specter",
			"tools": [
				"Agent Racoon",
				"Agent.dhwf",
				"AngryRebel",
				"CHINACHOPPER",
				"China Chopper",
				"Destroy RAT",
				"DestroyRAT",
				"Farfli",
				"Gh0st RAT",
				"Ghost RAT",
				"HTran",
				"HUC Packet Transmit Tool",
				"JuicyPotatoNG",
				"Kaba",
				"Korplug",
				"LadonGo",
				"Mimikatz",
				"Mimilite",
				"Moudour",
				"Mydoor",
				"NBTscan",
				"Ntospy",
				"PCRat",
				"PlugX",
				"RedDelta",
				"SharpEfsPotato",
				"SinoChopper",
				"Sogu",
				"SweetSpecter",
				"TIGERPLUG",
				"TVT",
				"Thoper",
				"TunnelSpecter",
				"Xamtrav",
				"Yasso",
				"nbtscan"
			],
			"source_id": "ETDA",
			"reports": null
		}
	],
	"ts_created_at": 1775434602,
	"ts_updated_at": 1775792126,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/75f958786ff0fe27a291face0f8df75a7274344d.pdf",
		"text": "https://archive.orkl.eu/75f958786ff0fe27a291face0f8df75a7274344d.txt",
		"img": "https://archive.orkl.eu/75f958786ff0fe27a291face0f8df75a7274344d.jpg"
	}
}