{
	"id": "baf86187-ea64-44de-b21f-12dd535ed9e9",
	"created_at": "2026-04-06T00:19:43.829037Z",
	"updated_at": "2026-04-10T03:31:48.408022Z",
	"deleted_at": null,
	"sha1_hash": "d136a18135626b6fdca954a85010a2f6a9f28a8a",
	"title": "Threat Group Cards: A Threat Actor Encyclopedia",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 49614,
	"plain_text": "Threat Group Cards: A Threat Actor Encyclopedia\nArchived: 2026-04-05 14:43:47 UTC\nHome \u003e List all groups \u003e List all tools \u003e List all groups using tool Moriya\n Tool: Moriya\nNames Moriya\nCategory Malware\nType Rootkit, Backdoor\nDescription\n(Kaspersky) Based on string artefacts within the malware’s binaries, we named this rootkit\nMoriya. This tool is a passive backdoor which allows attackers to inspect all incoming traffic\nto the infected machine, filter out packets that are marked as designated for the malware and\nrespond to them. This forms a covert channel over which attackers are able to issue shell\ncommands and receive back their outputs.\nInformation\nMalpedia Last change to this tool card: 28 December 2021\nDownload this tool card in JSON format\nAll groups using tool Moriya\nChanged Name Country Observed\nAPT groups\n Earth Kurma 2020\n Operation TunnelSnake 2018\n2 groups listed (2 APT, 0 other, 0 unknown)\nhttps://apt.etda.or.th/cgi-bin/listgroups.cgi?u=b0096525-5d1e-434a-9060-4c73f5da2492\nPage 1 of 2\n\nSource: https://apt.etda.or.th/cgi-bin/listgroups.cgi?u=b0096525-5d1e-434a-9060-4c73f5da2492\r\nhttps://apt.etda.or.th/cgi-bin/listgroups.cgi?u=b0096525-5d1e-434a-9060-4c73f5da2492\r\nPage 2 of 2\n\n  Earth Kurma Operation TunnelSnake 2020 2018 \n2 groups listed (2 APT, 0 other, 0 unknown) \n   Page 1 of 2",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://apt.etda.or.th/cgi-bin/listgroups.cgi?u=b0096525-5d1e-434a-9060-4c73f5da2492"
	],
	"report_names": [
		"listgroups.cgi?u=b0096525-5d1e-434a-9060-4c73f5da2492"
	],
	"threat_actors": [
		{
			"id": "7c390b96-8206-4194-81d8-ebbabb9910ff",
			"created_at": "2023-12-03T02:00:05.147496Z",
			"updated_at": "2026-04-10T02:00:03.486417Z",
			"deleted_at": null,
			"main_name": "TunnelSnake",
			"aliases": [],
			"source_name": "MISPGALAXY:TunnelSnake",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		},
		{
			"id": "4b48e4b6-09b0-4f4d-a78c-6b455d122e67",
			"created_at": "2022-10-25T16:07:24.020115Z",
			"updated_at": "2026-04-10T02:00:04.84333Z",
			"deleted_at": null,
			"main_name": "Operation TunnelSnake",
			"aliases": [],
			"source_name": "ETDA:Operation TunnelSnake",
			"tools": [
				"Moriya"
			],
			"source_id": "ETDA",
			"reports": null
		},
		{
			"id": "222835b0-22fb-406e-8fd5-f36dae694212",
			"created_at": "2025-06-29T02:01:56.985922Z",
			"updated_at": "2026-04-10T02:00:04.666399Z",
			"deleted_at": null,
			"main_name": "Earth Kurma",
			"aliases": [],
			"source_name": "ETDA:Earth Kurma",
			"tools": [
				"Agentemis",
				"Cobalt Strike",
				"CobaltStrike",
				"DMLOADER",
				"DUNLOADER",
				"KRNRAT",
				"Moriya",
				"ODRIZ",
				"SIMPOBOXSPY",
				"TESDAT",
				"cobeacon"
			],
			"source_id": "ETDA",
			"reports": null
		},
		{
			"id": "f161dc2b-a18e-43b9-9786-2285bc745a10",
			"created_at": "2025-05-29T02:00:03.214326Z",
			"updated_at": "2026-04-10T02:00:03.867482Z",
			"deleted_at": null,
			"main_name": "Earth Kurma",
			"aliases": [],
			"source_name": "MISPGALAXY:Earth Kurma",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		}
	],
	"ts_created_at": 1775434783,
	"ts_updated_at": 1775791908,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/d136a18135626b6fdca954a85010a2f6a9f28a8a.pdf",
		"text": "https://archive.orkl.eu/d136a18135626b6fdca954a85010a2f6a9f28a8a.txt",
		"img": "https://archive.orkl.eu/d136a18135626b6fdca954a85010a2f6a9f28a8a.jpg"
	}
}