{
	"id": "1ebf3b56-99c1-4a4a-b8e6-689507f20228",
	"created_at": "2026-04-06T00:12:06.72059Z",
	"updated_at": "2026-04-10T03:33:18.500821Z",
	"deleted_at": null,
	"sha1_hash": "d11fe1b735f68d608b4ebf91bfe2e6dbc53f5857",
	"title": "8.t Dropper (Malware Family)",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 28856,
	"plain_text": "8.t Dropper (Malware Family)\r\nBy Fraunhofer FKIE\r\nArchived: 2026-04-05 20:02:10 UTC\r\n8T_Dropper has been used by Chinese threat actor TA428 in order to install Cotx RAT onto victim's machines\r\nduring Operation LagTime IT. According to Proofpoint the attack was developed against a number of government\r\nagencies in East Asia overseeing government information technology, domestic affairs, foreign affairs, economic\r\ndevelopment, and political processes. The dropper was delivered through an RTF document exploiting CVE-2018-\r\n0798.\r\n[TLP:WHITE] win_8t_dropper_auto (20251219 | Detects win.8t_dropper.)\r\nSource: https://malpedia.caad.fkie.fraunhofer.de/details/win.8t_dropper\r\nhttps://malpedia.caad.fkie.fraunhofer.de/details/win.8t_dropper\r\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://malpedia.caad.fkie.fraunhofer.de/details/win.8t_dropper"
	],
	"report_names": [
		"win.8t_dropper"
	],
	"threat_actors": [
		{
			"id": "2f07a03f-eb1f-47c8-a8e9-a1a00f2ec253",
			"created_at": "2022-10-25T16:07:24.277669Z",
			"updated_at": "2026-04-10T02:00:04.919609Z",
			"deleted_at": null,
			"main_name": "TA428",
			"aliases": [
				"Operation LagTime IT",
				"Operation StealthyTrident",
				"ThunderCats"
			],
			"source_name": "ETDA:TA428",
			"tools": [
				"8.t Dropper",
				"8.t RTF exploit builder",
				"8t_dropper",
				"Agent.dhwf",
				"Albaniiutas",
				"BlueTraveller",
				"Chymine",
				"Cotx RAT",
				"CoughingDown",
				"Darkmoon",
				"Destroy RAT",
				"DestroyRAT",
				"Gen:Trojan.Heur.PT",
				"Kaba",
				"Korplug",
				"LuckyBack",
				"PhantomNet",
				"PlugX",
				"Poison Ivy",
				"RedDelta",
				"RoyalRoad",
				"SManager",
				"SPIVY",
				"Sogu",
				"TIGERPLUG",
				"TManger",
				"TVT",
				"Thoper",
				"Xamtrav",
				"pivy",
				"poisonivy"
			],
			"source_id": "ETDA",
			"reports": null
		},
		{
			"id": "20b5fa2f-2ef1-4e69-8275-25927a762f72",
			"created_at": "2025-08-07T02:03:24.573647Z",
			"updated_at": "2026-04-10T02:00:03.765721Z",
			"deleted_at": null,
			"main_name": "BRONZE DUDLEY",
			"aliases": [
				"TA428 ",
				"Temp.Hex ",
				"Vicious Panda "
			],
			"source_name": "Secureworks:BRONZE DUDLEY",
			"tools": [
				"NCCTrojan",
				"PhantomNet",
				"PoisonIvy",
				"Royal Road"
			],
			"source_id": "Secureworks",
			"reports": null
		},
		{
			"id": "a4aca3ca-9e04-42d1-b037-f7fb3fbab0b1",
			"created_at": "2023-01-06T13:46:39.042499Z",
			"updated_at": "2026-04-10T02:00:03.194713Z",
			"deleted_at": null,
			"main_name": "TA428",
			"aliases": [
				"BRONZE DUDLEY",
				"Colourful Panda"
			],
			"source_name": "MISPGALAXY:TA428",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		}
	],
	"ts_created_at": 1775434326,
	"ts_updated_at": 1775791998,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/d11fe1b735f68d608b4ebf91bfe2e6dbc53f5857.pdf",
		"text": "https://archive.orkl.eu/d11fe1b735f68d608b4ebf91bfe2e6dbc53f5857.txt",
		"img": "https://archive.orkl.eu/d11fe1b735f68d608b4ebf91bfe2e6dbc53f5857.jpg"
	}
}