{
	"id": "83c77b44-8405-4ce8-9400-848428db2517",
	"created_at": "2026-04-06T00:11:10.125346Z",
	"updated_at": "2026-04-10T03:35:26.971338Z",
	"deleted_at": null,
	"sha1_hash": "ccb9783ac167f2b03dc712f23f83df982cbb5186",
	"title": "Threat Group Cards: A Threat Actor Encyclopedia",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 47681,
	"plain_text": "Threat Group Cards: A Threat Actor Encyclopedia\nArchived: 2026-04-05 18:28:41 UTC\nHome \u003e List all groups \u003e List all tools \u003e List all groups using tool SweetSpecter\n Tool: SweetSpecter\nNames SweetSpecter\nCategory Malware\nType Backdoor\nDescription\n(Palo Alto) A variant of Gh0st RAT. SweetSpecter’s name references similarities to the\nSugarGh0st RAT specifically.\nInformation Malpedia Last change to this tool card: 27 December 2024\nDownload this tool card in JSON format\nAll groups using tool SweetSpecter\nChanged Name Country Observed\nAPT groups\n Operation Diplomatic Specter 2022\n1 group listed (1 APT, 0 other, 0 unknown)\nSource: https://apt.etda.or.th/cgi-bin/listgroups.cgi?u=453d3f13-cb34-4a51-8687-689fc4d3c022\nhttps://apt.etda.or.th/cgi-bin/listgroups.cgi?u=453d3f13-cb34-4a51-8687-689fc4d3c022\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://apt.etda.or.th/cgi-bin/listgroups.cgi?u=453d3f13-cb34-4a51-8687-689fc4d3c022"
	],
	"report_names": [
		"listgroups.cgi?u=453d3f13-cb34-4a51-8687-689fc4d3c022"
	],
	"threat_actors": [
		{
			"id": "cff2cedd-a198-4e79-ae67-19048084ae7f",
			"created_at": "2024-06-20T02:02:09.945126Z",
			"updated_at": "2026-04-10T02:00:04.79991Z",
			"deleted_at": null,
			"main_name": "Operation Diplomatic Specter",
			"aliases": [
				"CL-STA-0043",
				"TGR-STA-0043"
			],
			"source_name": "ETDA:Operation Diplomatic Specter",
			"tools": [
				"Agent Racoon",
				"Agent.dhwf",
				"AngryRebel",
				"CHINACHOPPER",
				"China Chopper",
				"Destroy RAT",
				"DestroyRAT",
				"Farfli",
				"Gh0st RAT",
				"Ghost RAT",
				"HTran",
				"HUC Packet Transmit Tool",
				"JuicyPotatoNG",
				"Kaba",
				"Korplug",
				"LadonGo",
				"Mimikatz",
				"Mimilite",
				"Moudour",
				"Mydoor",
				"NBTscan",
				"Ntospy",
				"PCRat",
				"PlugX",
				"RedDelta",
				"SharpEfsPotato",
				"SinoChopper",
				"Sogu",
				"SweetSpecter",
				"TIGERPLUG",
				"TVT",
				"Thoper",
				"TunnelSpecter",
				"Xamtrav",
				"Yasso",
				"nbtscan"
			],
			"source_id": "ETDA",
			"reports": null
		}
	],
	"ts_created_at": 1775434270,
	"ts_updated_at": 1775792126,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/ccb9783ac167f2b03dc712f23f83df982cbb5186.pdf",
		"text": "https://archive.orkl.eu/ccb9783ac167f2b03dc712f23f83df982cbb5186.txt",
		"img": "https://archive.orkl.eu/ccb9783ac167f2b03dc712f23f83df982cbb5186.jpg"
	}
}