{
	"id": "b3d7735a-7020-403c-8728-cd04ddbd411d",
	"created_at": "2026-04-06T00:13:38.017978Z",
	"updated_at": "2026-04-10T03:34:56.973528Z",
	"deleted_at": null,
	"sha1_hash": "7dc7089722d4a3ee89427d4916b6b77bc453568a",
	"title": "Threat Group Cards: A Threat Actor Encyclopedia",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 53105,
	"plain_text": "Threat Group Cards: A Threat Actor Encyclopedia\nArchived: 2026-04-05 21:15:10 UTC\nHome \u003e List all groups \u003e List all tools \u003e List all groups using tool Cmstar\n Tool: Cmstar\nNames\nCmstar\nmeciv\nCategory Malware\nType Downloader\nDescription\n(Palo Alto) This specific downloader, Cmstar, is associated with the Lurid downloader\nalso known as ‘Enfal’. Cmstar was named for the log message ‘CM**’ used by the\ndownloader.\nThe Cmstar downloader starts by manually building its import address table (IAT), much\nlike shellcode would; however, it uses a rather unique technique. Instead of finding API\nfunction names based on their hashed values, this malware enumerates libraries’ export\naddress table (EAT) and searches for the name of the API function the payload needs to\nload by using a character to offset array. The payload pairs several comma-separated lists\nof characters with comma-separated lists of numbers. Each list of characters consists of\nthe set found within the API function name the payload seeks to add to its IAT, while the\ncorresponding list of numbers specifies the offset in the function name where those\ncharacters should be placed.\nInformation\nMalpedia AlienVault OTX Last change to this tool card: 13 May 2020\nhttps://apt.etda.or.th/cgi-bin/listgroups.cgi?u=fc200bd2-4771-4e16-8d49-e231c20fdf63\nPage 1 of 2\n\nDownload this tool card in JSON format\r\nAll groups using tool Cmstar\r\nChanged Name Country Observed\r\nAPT groups\r\n  Vicious Panda 2015-Mar 2020  \r\n1 group listed (1 APT, 0 other, 0 unknown)\r\nSource: https://apt.etda.or.th/cgi-bin/listgroups.cgi?u=fc200bd2-4771-4e16-8d49-e231c20fdf63\r\nhttps://apt.etda.or.th/cgi-bin/listgroups.cgi?u=fc200bd2-4771-4e16-8d49-e231c20fdf63\r\nPage 2 of 2",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://apt.etda.or.th/cgi-bin/listgroups.cgi?u=fc200bd2-4771-4e16-8d49-e231c20fdf63"
	],
	"report_names": [
		"listgroups.cgi?u=fc200bd2-4771-4e16-8d49-e231c20fdf63"
	],
	"threat_actors": [
		{
			"id": "f5c5d5d4-3969-4e34-9982-55144c3908eb",
			"created_at": "2022-10-25T16:07:24.37846Z",
			"updated_at": "2026-04-10T02:00:04.965506Z",
			"deleted_at": null,
			"main_name": "Vicious Panda",
			"aliases": [
				"Bronze Dudley"
			],
			"source_name": "ETDA:Vicious Panda",
			"tools": [
				"8.t Dropper",
				"8.t RTF exploit builder",
				"8t_dropper",
				"BBSRAT",
				"Byeby",
				"Cmstar",
				"Enfal",
				"Lurid",
				"Pylot",
				"RoyalRoad",
				"Travle",
				"meciv"
			],
			"source_id": "ETDA",
			"reports": null
		},
		{
			"id": "6e79c98d-c678-4f28-b869-5723a78e71f4",
			"created_at": "2023-01-06T13:46:39.422441Z",
			"updated_at": "2026-04-10T02:00:03.322083Z",
			"deleted_at": null,
			"main_name": "Vicious Panda",
			"aliases": [
				"SixLittleMonkeys"
			],
			"source_name": "MISPGALAXY:Vicious Panda",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		},
		{
			"id": "20b5fa2f-2ef1-4e69-8275-25927a762f72",
			"created_at": "2025-08-07T02:03:24.573647Z",
			"updated_at": "2026-04-10T02:00:03.765721Z",
			"deleted_at": null,
			"main_name": "BRONZE DUDLEY",
			"aliases": [
				"TA428 ",
				"Temp.Hex ",
				"Vicious Panda "
			],
			"source_name": "Secureworks:BRONZE DUDLEY",
			"tools": [
				"NCCTrojan",
				"PhantomNet",
				"PoisonIvy",
				"Royal Road"
			],
			"source_id": "Secureworks",
			"reports": null
		},
		{
			"id": "7c8cf02c-623a-4793-918b-f908675a1aef",
			"created_at": "2023-01-06T13:46:38.309165Z",
			"updated_at": "2026-04-10T02:00:02.921721Z",
			"deleted_at": null,
			"main_name": "APT15",
			"aliases": [
				"Metushy",
				"Lurid",
				"Social Network Team",
				"Royal APT",
				"BRONZE DAVENPORT",
				"BRONZE IDLEWOOD",
				"VIXEN PANDA",
				"Ke3Chang",
				"Playful Dragon",
				"BRONZE PALACE",
				"G0004",
				"Red Vulture",
				"Nylon Typhoon"
			],
			"source_name": "MISPGALAXY:APT15",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		}
	],
	"ts_created_at": 1775434418,
	"ts_updated_at": 1775792096,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/7dc7089722d4a3ee89427d4916b6b77bc453568a.pdf",
		"text": "https://archive.orkl.eu/7dc7089722d4a3ee89427d4916b6b77bc453568a.txt",
		"img": "https://archive.orkl.eu/7dc7089722d4a3ee89427d4916b6b77bc453568a.jpg"
	}
}