{
	"id": "1b62a2f3-2fdb-4f13-8312-e3c20e95685d",
	"created_at": "2026-04-06T00:10:36.509582Z",
	"updated_at": "2026-04-10T03:25:35.323486Z",
	"deleted_at": null,
	"sha1_hash": "e3f13be614022607532629a4b8dccadc796a830b",
	"title": "Threat Group Cards: A Threat Actor Encyclopedia",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 47462,
	"plain_text": "Threat Group Cards: A Threat Actor Encyclopedia\nArchived: 2026-04-05 17:38:11 UTC\nHome \u003e List all groups \u003e List all tools \u003e List all groups using tool DoorMe\n Tool: DoorMe\nNames DoorMe\nCategory Malware\nType Backdoor\nDescription\n(Positive Technologies) Among the malware samples we found during the incident\ninvestigation, the DoorMe backdoor is the most interesting. Basically, it is a native IIS module\nthat is registered as a filter through which HTTP requests and responses are processed.\nInformation\nMalpedia Last change to this tool card: 27 December 2022\nDownload this tool card in JSON format\nAll groups using tool DoorMe\nChanged Name Country Observed\nAPT groups\n ChamelGang 2021-Jun 2023\n1 group listed (1 APT, 0 other, 0 unknown)\nSource: https://apt.etda.or.th/cgi-bin/listgroups.cgi?u=e420c439-ae93-4de2-80ee-04233fe777d4\nhttps://apt.etda.or.th/cgi-bin/listgroups.cgi?u=e420c439-ae93-4de2-80ee-04233fe777d4\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://apt.etda.or.th/cgi-bin/listgroups.cgi?u=e420c439-ae93-4de2-80ee-04233fe777d4"
	],
	"report_names": [
		"listgroups.cgi?u=e420c439-ae93-4de2-80ee-04233fe777d4"
	],
	"threat_actors": [
		{
			"id": "4434c71b-c424-4c06-b923-4f3f54f24f40",
			"created_at": "2022-10-25T16:07:23.453526Z",
			"updated_at": "2026-04-10T02:00:04.611408Z",
			"deleted_at": null,
			"main_name": "ChamelGang",
			"aliases": [
				"CamoFei"
			],
			"source_name": "ETDA:ChamelGang",
			"tools": [
				"7-Zip",
				"Agentemis",
				"BeaconLoader",
				"Cobalt Strike",
				"CobaltStrike",
				"DoorMe",
				"FRP",
				"Fast Reverse Proxy",
				"ProxyT",
				"Tiny SHell",
				"cobeacon",
				"tsh"
			],
			"source_id": "ETDA",
			"reports": null
		},
		{
			"id": "a0673493-5872-49a0-8d0d-4391302cff01",
			"created_at": "2023-03-04T02:01:54.10107Z",
			"updated_at": "2026-04-10T02:00:03.358084Z",
			"deleted_at": null,
			"main_name": "Chamelgang",
			"aliases": [
				"CamoFei"
			],
			"source_name": "MISPGALAXY:Chamelgang",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		}
	],
	"ts_created_at": 1775434236,
	"ts_updated_at": 1775791535,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/e3f13be614022607532629a4b8dccadc796a830b.pdf",
		"text": "https://archive.orkl.eu/e3f13be614022607532629a4b8dccadc796a830b.txt",
		"img": "https://archive.orkl.eu/e3f13be614022607532629a4b8dccadc796a830b.jpg"
	}
}