{
	"id": "0566913b-0433-4835-8906-f98ad5767299",
	"created_at": "2026-04-06T00:12:41.840498Z",
	"updated_at": "2026-04-10T13:12:11.274262Z",
	"deleted_at": null,
	"sha1_hash": "e9eee479497bb52cdf9f2eb01d513387fae1dae7",
	"title": "Threat Group Cards: A Threat Actor Encyclopedia",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 47657,
	"plain_text": "Threat Group Cards: A Threat Actor Encyclopedia\nArchived: 2026-04-05 14:48:55 UTC\nHome \u003e List all groups \u003e List all tools \u003e List all groups using tool DvDupdate.dll\n Tool: DvDupdate.dll\nNames DvDupdate.dll\nCategory Malware\nType Loader\nDescription\n(Kaspersky) This is a service DLL, but with all the same exports you would expect from a\nCOM object. Basically, it’s a payload loader.\nThe whole code is obfuscated with different Windows API calls and loops. It wasn’t designed\nto confuse a reverse engineer or to make reverse engineering harder, but to bypass some\nsimple AV emulation engines.\nInformation Last change to this tool card: 20 April 2020\nDownload this tool card in JSON format\nAll groups using tool DvDupdate.dll\nChanged Name Country Observed\nAPT groups\n Platinum 2009-Nov 2019\n1 group listed (1 APT, 0 other, 0 unknown)\nSource: https://apt.etda.or.th/cgi-bin/listgroups.cgi?u=385daa4a-b683-4d5f-b74b-fc7890615a3a\nhttps://apt.etda.or.th/cgi-bin/listgroups.cgi?u=385daa4a-b683-4d5f-b74b-fc7890615a3a\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://apt.etda.or.th/cgi-bin/listgroups.cgi?u=385daa4a-b683-4d5f-b74b-fc7890615a3a"
	],
	"report_names": [
		"listgroups.cgi?u=385daa4a-b683-4d5f-b74b-fc7890615a3a"
	],
	"threat_actors": [
		{
			"id": "7d8ef10e-1d7b-49a0-ab6e-f1dae465a1a4",
			"created_at": "2023-01-06T13:46:38.595679Z",
			"updated_at": "2026-04-10T02:00:03.033762Z",
			"deleted_at": null,
			"main_name": "PLATINUM",
			"aliases": [
				"TwoForOne",
				"G0068",
				"ATK33"
			],
			"source_name": "MISPGALAXY:PLATINUM",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		},
		{
			"id": "e61c46f7-88a1-421a-9fed-0cfe2eeb820a",
			"created_at": "2022-10-25T16:07:24.061767Z",
			"updated_at": "2026-04-10T02:00:04.854503Z",
			"deleted_at": null,
			"main_name": "Platinum",
			"aliases": [
				"ATK 33",
				"G0068",
				"Operation EasternRoppels",
				"TwoForOne"
			],
			"source_name": "ETDA:Platinum",
			"tools": [
				"AMTsol",
				"Adupib",
				"Adupihan",
				"Dipsind",
				"DvDupdate.dll",
				"JPIN",
				"LOLBAS",
				"LOLBins",
				"Living off the Land",
				"RedPepper",
				"RedSalt",
				"Titanium",
				"adbupd",
				"psinstrc.ps1"
			],
			"source_id": "ETDA",
			"reports": null
		},
		{
			"id": "33f527a5-a5da-496a-a48c-7807cc858c3e",
			"created_at": "2022-10-25T15:50:23.803657Z",
			"updated_at": "2026-04-10T02:00:05.333523Z",
			"deleted_at": null,
			"main_name": "PLATINUM",
			"aliases": [
				"PLATINUM"
			],
			"source_name": "MITRE:PLATINUM",
			"tools": [
				"JPIN",
				"Dipsind",
				"adbupd"
			],
			"source_id": "MITRE",
			"reports": null
		}
	],
	"ts_created_at": 1775434361,
	"ts_updated_at": 1775826731,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/e9eee479497bb52cdf9f2eb01d513387fae1dae7.pdf",
		"text": "https://archive.orkl.eu/e9eee479497bb52cdf9f2eb01d513387fae1dae7.txt",
		"img": "https://archive.orkl.eu/e9eee479497bb52cdf9f2eb01d513387fae1dae7.jpg"
	}
}