{
	"id": "449c325e-2efc-4836-a744-5da0f5b44638",
	"created_at": "2026-04-06T00:09:20.0012Z",
	"updated_at": "2026-04-10T03:30:47.793615Z",
	"deleted_at": null,
	"sha1_hash": "9b6b5884c99e57873bf5cb23aecfd1e72042fc1f",
	"title": "LevelBlue - Open Threat Exchange",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 33067,
	"plain_text": "LevelBlue - Open Threat Exchange\r\nArchived: 2026-04-05 23:16:54 UTC\r\nPulses (\r\n)\r\nUsers (\r\n)\r\nGroups (\r\n)\r\nIndicators (\r\n)\r\nMalware Families ( 0\r\n)\r\nIndustries ( 0\r\n)\r\nAdversaries (\r\n)\r\nShow:\r\nAll\r\nSort:\r\nRecently Modified\r\nLoading more Pulses  \r\nSort:\r\nMost Pulses\r\nLoading more users  \r\nSort:\r\nhttps://otx.alienvault.com/browse/pulses?q=tag:sykipot\r\nPage 1 of 4\n\nMost Members\r\nLoading more groups  \r\nIndicators Search\r\nFilter by:\r\nReset Filters\r\nAll Time\r\nShow expired indicators\r\nIndicator Type\r\nAll (0)\r\nCIDR (0)\r\nCVE (0)\r\nDomain (0)\r\nEmail (0)\r\nFileHash-IMPHASH (0)\r\nFileHash-MD5 (0)\r\nFileHash-PEHASH (0)\r\nFileHash-SHA1 (0)\r\nFileHash-SHA256 (0)\r\nFilePath (0)\r\nHostname (0)\r\nIPv4 (0)\r\nIPv6 (0)\r\nMutex (0)\r\nNIDS (0)\r\nURI (0)\r\nURL (0)\r\nhttps://otx.alienvault.com/browse/pulses?q=tag:sykipot\r\nPage 2 of 4\n\nYARA (0)\r\nRole\r\nAdware\r\nBackdoor\r\nBruteforce\r\nCommand \u0026 Control\r\nDelivery Email\r\nDocument Exploit\r\nDomain Owner\r\nExploit Kit\r\nExploit Source\r\nFile Scanning\r\nHacking Tools\r\nHunting\r\nMacro Malware\r\nMalvertising\r\nMalware Hosting\r\nMemory Scanning\r\nPCAP Scanning\r\nPhishing\r\nRAT\r\nRansomware\r\nScanning Host\r\nTrojan\r\nUnknown\r\nWeb Attack\r\nhttps://otx.alienvault.com/browse/pulses?q=tag:sykipot\r\nPage 3 of 4\n\nWorm\r\nSearching...\r\nSort:\r\nRecently Modified\r\nSort:\r\nName Ascending\r\nSort:\r\nAscending\r\nSort:\r\nAscending\r\nLoading more adversaries  \r\nSource: https://otx.alienvault.com/browse/pulses?q=tag:sykipot\r\nhttps://otx.alienvault.com/browse/pulses?q=tag:sykipot\r\nPage 4 of 4",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://otx.alienvault.com/browse/pulses?q=tag:sykipot"
	],
	"report_names": [
		"pulses?q=tag:sykipot"
	],
	"threat_actors": [
		{
			"id": "68cc6e37-f16d-4995-a75b-5e8e2a6cbb3d",
			"created_at": "2024-05-01T02:03:07.943593Z",
			"updated_at": "2026-04-10T02:00:03.795229Z",
			"deleted_at": null,
			"main_name": "BRONZE EDISON",
			"aliases": [
				"APT4 ",
				"DarkSeoul",
				"Maverick Panda ",
				"Salmon Typhoon ",
				"Sodium ",
				"Sykipot ",
				"TG-0623 ",
				"getkys"
			],
			"source_name": "Secureworks:BRONZE EDISON",
			"tools": [
				"Gh0st RAT",
				"Wkysol",
				"ZxPortMap"
			],
			"source_id": "Secureworks",
			"reports": null
		},
		{
			"id": "6fbff48b-7a3e-4e54-ac22-b10f11e32337",
			"created_at": "2022-10-25T16:07:23.318008Z",
			"updated_at": "2026-04-10T02:00:04.539063Z",
			"deleted_at": null,
			"main_name": "APT 4",
			"aliases": [
				"APT 4",
				"Bronze Edison",
				"Maverick Panda",
				"Salmon Typhoo",
				"Sodium",
				"Sykipot",
				"TG-0623",
				"Wisp Team"
			],
			"source_name": "ETDA:APT 4",
			"tools": [
				"Getkys",
				"Sykipot",
				"Wkysol",
				"XMRig"
			],
			"source_id": "ETDA",
			"reports": null
		}
	],
	"ts_created_at": 1775434160,
	"ts_updated_at": 1775791847,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/9b6b5884c99e57873bf5cb23aecfd1e72042fc1f.pdf",
		"text": "https://archive.orkl.eu/9b6b5884c99e57873bf5cb23aecfd1e72042fc1f.txt",
		"img": "https://archive.orkl.eu/9b6b5884c99e57873bf5cb23aecfd1e72042fc1f.jpg"
	}
}