{
	"id": "4a385b47-fb30-4353-8b86-16f65523a387",
	"created_at": "2026-04-06T00:12:18.126914Z",
	"updated_at": "2026-04-10T03:26:57.980725Z",
	"deleted_at": null,
	"sha1_hash": "c0b456ff91ccd1acab3e48edbd668e6797db7f97",
	"title": "Threat Group Cards: A Threat Actor Encyclopedia",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 49389,
	"plain_text": "Threat Group Cards: A Threat Actor Encyclopedia\nArchived: 2026-04-05 12:34:50 UTC\nHome \u003e List all groups \u003e List all tools \u003e List all groups using tool ZeroT\n Tool: ZeroT\nNames ZeroT\nCategory Malware\nType Downloader\nDescription\n(Proofpoint) Since the summer of 2016, this group began using a new downloader\nknown as ZeroT to install the PlugX remote access Trojan (RAT) and added Microsoft\nCompiled HTML Help (.chm) as one of the initial droppers delivered in spear-phishing\nemails.\nInformation\nMITRE ATT\u0026CK Malpedia Last change to this tool card: 23 April 2020\nDownload this tool card in JSON format\nAll groups using tool ZeroT\nChanged Name Country Observed\nAPT groups\n TA459 2017-Apr 2022\n1 group listed (1 APT, 0 other, 0 unknown)\nSource: https://apt.etda.or.th/cgi-bin/listgroups.cgi?u=5cf6ff0f-654a-4a92-8ea7-35f4ebbc0068\nhttps://apt.etda.or.th/cgi-bin/listgroups.cgi?u=5cf6ff0f-654a-4a92-8ea7-35f4ebbc0068\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://apt.etda.or.th/cgi-bin/listgroups.cgi?u=5cf6ff0f-654a-4a92-8ea7-35f4ebbc0068"
	],
	"report_names": [
		"listgroups.cgi?u=5cf6ff0f-654a-4a92-8ea7-35f4ebbc0068"
	],
	"threat_actors": [
		{
			"id": "7041fcf5-b34d-47c3-be4c-3c40f243af89",
			"created_at": "2023-01-06T13:46:38.611261Z",
			"updated_at": "2026-04-10T02:00:03.038745Z",
			"deleted_at": null,
			"main_name": "TA459",
			"aliases": [
				"G0062"
			],
			"source_name": "MISPGALAXY:TA459",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		},
		{
			"id": "0bf35542-9ebc-44a9-b319-b6df0bee4bac",
			"created_at": "2022-10-25T15:50:23.437853Z",
			"updated_at": "2026-04-10T02:00:05.36762Z",
			"deleted_at": null,
			"main_name": "TA459",
			"aliases": [
				"TA459"
			],
			"source_name": "MITRE:TA459",
			"tools": [
				"gh0st RAT",
				"NetTraveler",
				"PlugX",
				"ZeroT"
			],
			"source_id": "MITRE",
			"reports": null
		},
		{
			"id": "802552ac-1f16-4b85-8d78-76d683684124",
			"created_at": "2022-10-25T16:07:24.28032Z",
			"updated_at": "2026-04-10T02:00:04.920517Z",
			"deleted_at": null,
			"main_name": "TA459",
			"aliases": [
				"G0062"
			],
			"source_name": "ETDA:TA459",
			"tools": [
				"Agent.dhwf",
				"AngryRebel",
				"Destroy RAT",
				"DestroyRAT",
				"Farfli",
				"Gh0st RAT",
				"Ghost RAT",
				"Kaba",
				"Korplug",
				"Moudour",
				"Mydoor",
				"NetTraveler",
				"Netfile",
				"PCRat",
				"PlugX",
				"RedDelta",
				"Sogu",
				"TIGERPLUG",
				"TVT",
				"Thoper",
				"TravNet",
				"Xamtrav",
				"ZeroT"
			],
			"source_id": "ETDA",
			"reports": null
		}
	],
	"ts_created_at": 1775434338,
	"ts_updated_at": 1775791617,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/c0b456ff91ccd1acab3e48edbd668e6797db7f97.pdf",
		"text": "https://archive.orkl.eu/c0b456ff91ccd1acab3e48edbd668e6797db7f97.txt",
		"img": "https://archive.orkl.eu/c0b456ff91ccd1acab3e48edbd668e6797db7f97.jpg"
	}
}