{
	"id": "a5ec1e72-44f5-4ec4-92e7-cc549eb5f456",
	"created_at": "2026-04-06T00:12:35.844402Z",
	"updated_at": "2026-04-10T03:31:42.917218Z",
	"deleted_at": null,
	"sha1_hash": "c792649804698dd66ec854b2443c540eabb8b296",
	"title": "Threat Group Cards: A Threat Actor Encyclopedia",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 43195,
	"plain_text": "Threat Group Cards: A Threat Actor Encyclopedia\nArchived: 2026-04-05 21:14:21 UTC\nHome \u003e List all groups \u003e List all tools \u003e List all groups using tool Handala\n Tool: Handala\nNames Handala\nCategory Malware\nType Loader\nDescription\n(Intezer) During our analysis, we unearthed a second-stage loader coded in Delphi—which\nspearheads the execution of an AutoIt injector. This injector has been given the name\n‘Handala’.\nInformation Malpedia Last change to this tool card: 27 December 2024\nDownload this tool card in JSON format\nAll groups using tool Handala\nChanged Name Country Observed\nOther groups\n Handala Hack Team [Unknown] 2023-Dec 2023\n1 group listed (0 APT, 1 other, 0 unknown)\nSource: https://apt.etda.or.th/cgi-bin/listgroups.cgi?u=bfbd16aa-847a-43e4-9ca5-d534aef48ed0\nhttps://apt.etda.or.th/cgi-bin/listgroups.cgi?u=bfbd16aa-847a-43e4-9ca5-d534aef48ed0\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://apt.etda.or.th/cgi-bin/listgroups.cgi?u=bfbd16aa-847a-43e4-9ca5-d534aef48ed0"
	],
	"report_names": [
		"listgroups.cgi?u=bfbd16aa-847a-43e4-9ca5-d534aef48ed0"
	],
	"threat_actors": [
		{
			"id": "d0fef355-9eb9-4adc-8d90-a8c7494c4a81",
			"created_at": "2024-01-18T02:02:34.735032Z",
			"updated_at": "2026-04-10T02:00:05.011663Z",
			"deleted_at": null,
			"main_name": "Handala Hack Team",
			"aliases": [
				"Operation HamsaUpdate"
			],
			"source_name": "ETDA:Handala Hack Team",
			"tools": [
				"Hamsa Wiper",
				"Handala",
				"Hatef Wiper"
			],
			"source_id": "ETDA",
			"reports": null
		},
		{
			"id": "4134675e-5b72-4b50-8d70-1a8f18aafbb4",
			"created_at": "2024-10-04T02:00:04.766263Z",
			"updated_at": "2026-04-10T02:00:03.715945Z",
			"deleted_at": null,
			"main_name": "Handala",
			"aliases": [],
			"source_name": "MISPGALAXY:Handala",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		},
		{
			"id": "b3ebf51d-8f64-48a9-bbfb-674db872cccb",
			"created_at": "2025-08-07T02:03:24.769383Z",
			"updated_at": "2026-04-10T02:00:03.860954Z",
			"deleted_at": null,
			"main_name": "COBALT MYSTIQUE",
			"aliases": [
				"Banished Kitten ",
				"DEV-0842 ",
				"Druidfly ",
				"Handala Hack Team",
				"Homeland Justice",
				"Karmabelow80",
				"Red Sandstorm ",
				"Storm-0842 ",
				"Void Manticore "
			],
			"source_name": "Secureworks:COBALT MYSTIQUE",
			"tools": [
				"AllinOneNeo",
				"Bibi",
				"GramPy",
				"GramPyLoader"
			],
			"source_id": "Secureworks",
			"reports": null
		}
	],
	"ts_created_at": 1775434355,
	"ts_updated_at": 1775791902,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/c792649804698dd66ec854b2443c540eabb8b296.pdf",
		"text": "https://archive.orkl.eu/c792649804698dd66ec854b2443c540eabb8b296.txt",
		"img": "https://archive.orkl.eu/c792649804698dd66ec854b2443c540eabb8b296.jpg"
	}
}