{
	"id": "f4f8abff-3fa0-4cbe-ae44-fd6e969b595e",
	"created_at": "2026-04-06T00:19:28.192633Z",
	"updated_at": "2026-04-10T03:35:26.980842Z",
	"deleted_at": null,
	"sha1_hash": "da982410ee14eb41ec76879b24a692ca680ed7af",
	"title": "Threat Group Cards: A Threat Actor Encyclopedia",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 47277,
	"plain_text": "Threat Group Cards: A Threat Actor Encyclopedia\nArchived: 2026-04-05 19:46:32 UTC\nHome \u003e List all groups \u003e List all tools \u003e List all groups using tool TunnelSpecter\n Tool: TunnelSpecter\nNames TunnelSpecter\nCategory Malware\nType Backdoor\nDescription\n(Palo Alto) A variant of Gh0st RAT. TunnelSpecter’s name refers to its DNS tunneling\nfunctionality.\nInformation Malpedia Last change to this tool card: 27 December 2024\nDownload this tool card in JSON format\nAll groups using tool TunnelSpecter\nChanged Name Country Observed\nAPT groups\n Operation Diplomatic Specter 2022\n1 group listed (1 APT, 0 other, 0 unknown)\nSource: https://apt.etda.or.th/cgi-bin/listgroups.cgi?u=ed5abca9-d702-435f-93e5-328a912da205\nhttps://apt.etda.or.th/cgi-bin/listgroups.cgi?u=ed5abca9-d702-435f-93e5-328a912da205\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://apt.etda.or.th/cgi-bin/listgroups.cgi?u=ed5abca9-d702-435f-93e5-328a912da205"
	],
	"report_names": [
		"listgroups.cgi?u=ed5abca9-d702-435f-93e5-328a912da205"
	],
	"threat_actors": [
		{
			"id": "cff2cedd-a198-4e79-ae67-19048084ae7f",
			"created_at": "2024-06-20T02:02:09.945126Z",
			"updated_at": "2026-04-10T02:00:04.79991Z",
			"deleted_at": null,
			"main_name": "Operation Diplomatic Specter",
			"aliases": [
				"CL-STA-0043",
				"TGR-STA-0043"
			],
			"source_name": "ETDA:Operation Diplomatic Specter",
			"tools": [
				"Agent Racoon",
				"Agent.dhwf",
				"AngryRebel",
				"CHINACHOPPER",
				"China Chopper",
				"Destroy RAT",
				"DestroyRAT",
				"Farfli",
				"Gh0st RAT",
				"Ghost RAT",
				"HTran",
				"HUC Packet Transmit Tool",
				"JuicyPotatoNG",
				"Kaba",
				"Korplug",
				"LadonGo",
				"Mimikatz",
				"Mimilite",
				"Moudour",
				"Mydoor",
				"NBTscan",
				"Ntospy",
				"PCRat",
				"PlugX",
				"RedDelta",
				"SharpEfsPotato",
				"SinoChopper",
				"Sogu",
				"SweetSpecter",
				"TIGERPLUG",
				"TVT",
				"Thoper",
				"TunnelSpecter",
				"Xamtrav",
				"Yasso",
				"nbtscan"
			],
			"source_id": "ETDA",
			"reports": null
		}
	],
	"ts_created_at": 1775434768,
	"ts_updated_at": 1775792126,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/da982410ee14eb41ec76879b24a692ca680ed7af.pdf",
		"text": "https://archive.orkl.eu/da982410ee14eb41ec76879b24a692ca680ed7af.txt",
		"img": "https://archive.orkl.eu/da982410ee14eb41ec76879b24a692ca680ed7af.jpg"
	}
}