{
	"id": "e9ddbe0c-00ff-4958-adf7-aa07e1b01d76",
	"created_at": "2026-04-06T03:37:24.267395Z",
	"updated_at": "2026-04-10T03:34:54.750112Z",
	"deleted_at": null,
	"sha1_hash": "776810b8a2f27c5cd142e045339b25f694229c15",
	"title": "Threat Group Cards: A Threat Actor Encyclopedia",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 30939,
	"plain_text": "Threat Group Cards: A Threat Actor Encyclopedia\r\nArchived: 2026-04-06 03:18:07 UTC\r\nDescription(Qihoo 360) Starting in April this year, 360 Baize Lab intercepted a large number of attack samples\r\nfrom an unknown hacker organization. The hacker organization sent a phishing email to the victim by forging a\r\npolice station investigation letter, COVID-19 detection notice, etc. Through the backdoor virus to control the\r\nvictim’s machine, steal valuable sensitive data related to the target.\r\n(Proofpoint) In late March 2020, Proofpoint researchers began tracking a new actor with a penchant for using\r\nNanoCore and later AsyncRAT, popular commodity remote access trojans (RATs). Dubbed TA2719 by Proofpoint,\r\nthe actor uses localized lures with colorful images that impersonate local banks, law enforcement, and shipping\r\nservices. To date, Proofpoint has observed this actor send low volume campaigns to recipients in Austria, Chile,\r\nGreece, Hungary, Italy, North Macedonia, Netherlands, Spain, Sweden, Taiwan, United States, and Uruguay.\r\nSource: https://apt.etda.or.th/cgi-bin/showcard.cgi?u=94f7768b-107e-44ae-87c7-a028cee60e32\r\nhttps://apt.etda.or.th/cgi-bin/showcard.cgi?u=94f7768b-107e-44ae-87c7-a028cee60e32\r\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://apt.etda.or.th/cgi-bin/showcard.cgi?u=94f7768b-107e-44ae-87c7-a028cee60e32"
	],
	"report_names": [
		"showcard.cgi?u=94f7768b-107e-44ae-87c7-a028cee60e32"
	],
	"threat_actors": [
		{
			"id": "40451441-a311-494f-8025-fdbad7a527d4",
			"created_at": "2024-02-06T02:00:04.114318Z",
			"updated_at": "2026-04-10T02:00:03.571851Z",
			"deleted_at": null,
			"main_name": "TA2719",
			"aliases": [],
			"source_name": "MISPGALAXY:TA2719",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		},
		{
			"id": "3a0cfbbc-2acf-4cc8-afe1-1859679c522c",
			"created_at": "2022-10-25T16:07:24.373716Z",
			"updated_at": "2026-04-10T02:00:04.963615Z",
			"deleted_at": null,
			"main_name": "Vendetta",
			"aliases": [
				"TA2719"
			],
			"source_name": "ETDA:Vendetta",
			"tools": [
				"AsyncRAT",
				"Atros2.CKPN",
				"Nancrat",
				"NanoCore",
				"NanoCore RAT",
				"ReZer0",
				"Remcos",
				"RemcosRAT",
				"Remvio",
				"RoboSki",
				"Socmer",
				"Zurten"
			],
			"source_id": "ETDA",
			"reports": null
		}
	],
	"ts_created_at": 1775446644,
	"ts_updated_at": 1775792094,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/776810b8a2f27c5cd142e045339b25f694229c15.pdf",
		"text": "https://archive.orkl.eu/776810b8a2f27c5cd142e045339b25f694229c15.txt",
		"img": "https://archive.orkl.eu/776810b8a2f27c5cd142e045339b25f694229c15.jpg"
	}
}