{
	"id": "4532c8b0-44c2-4d0b-b3d5-19237d8e9162",
	"created_at": "2026-04-06T00:07:12.056203Z",
	"updated_at": "2026-04-10T03:32:15.040118Z",
	"deleted_at": null,
	"sha1_hash": "ef2964122a40fe07a9fbc88a42a77e4ec9852ded",
	"title": "Threat Group Cards: A Threat Actor Encyclopedia",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 48070,
	"plain_text": "Threat Group Cards: A Threat Actor Encyclopedia\nArchived: 2026-04-05 21:18:12 UTC\nHome \u003e List all groups \u003e List all tools \u003e List all groups using tool Moudoor\n Tool: Moudoor\nNames\nMoudoor\nSCAR\nCategory Malware\nType Info stealer\nDescription\n(TechNewsWorld) The Moudoor team uses that Trojan liberally without fear of being\ndiscovered because it lets the attackers grab some information swiftly -- and, more\nimportantly, serves as a smokescreen for the Naid attack, Symantec's Thakur said.\nInformation\nLast change to this tool card: 20 April 2020\nDownload this tool card in JSON format\nAll groups using tool Moudoor\nChanged Name Country Observed\nAPT groups\n Hidden Lynx, Aurora Panda 2009-2014\n1 group listed (1 APT, 0 other, 0 unknown)\nSource: https://apt.etda.or.th/cgi-bin/listgroups.cgi?u=4a41e339-cf0c-4717-a248-4beb31bd683d\nhttps://apt.etda.or.th/cgi-bin/listgroups.cgi?u=4a41e339-cf0c-4717-a248-4beb31bd683d\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://apt.etda.or.th/cgi-bin/listgroups.cgi?u=4a41e339-cf0c-4717-a248-4beb31bd683d"
	],
	"report_names": [
		"listgroups.cgi?u=4a41e339-cf0c-4717-a248-4beb31bd683d"
	],
	"threat_actors": [
		{
			"id": "4b076dcb-516e-42fb-9c8f-f153902cd5e9",
			"created_at": "2022-10-25T16:07:23.708745Z",
			"updated_at": "2026-04-10T02:00:04.720108Z",
			"deleted_at": null,
			"main_name": "Hidden Lynx",
			"aliases": [
				"Aurora Panda",
				"Group 8",
				"Heart Typhoon",
				"Hidden Lynx",
				"Operation SMN"
			],
			"source_name": "ETDA:Hidden Lynx",
			"tools": [
				"AGENT.ABQMR",
				"AGENT.AQUP.DROPPER",
				"AGENT.BMZA",
				"AGENT.GUNZ",
				"BlackCoffee",
				"HiKit",
				"MCRAT.A",
				"Mdmbot.E",
				"Moudoor",
				"Naid",
				"PNGRAT",
				"Trojan.Naid",
				"ZoxPNG",
				"gresim"
			],
			"source_id": "ETDA",
			"reports": null
		},
		{
			"id": "a7aefdda-98f1-4790-a32d-14cc99de2d60",
			"created_at": "2023-01-06T13:46:38.281844Z",
			"updated_at": "2026-04-10T02:00:02.909711Z",
			"deleted_at": null,
			"main_name": "APT17",
			"aliases": [
				"BRONZE KEYSTONE",
				"G0025",
				"Group 72",
				"G0001",
				"HELIUM",
				"Heart Typhoon",
				"Group 8",
				"AURORA PANDA",
				"Hidden Lynx",
				"Tailgater Team"
			],
			"source_name": "MISPGALAXY:APT17",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		},
		{
			"id": "ee39ecf0-d311-49e5-b0ae-3e3d71f71def",
			"created_at": "2025-08-07T02:03:24.626625Z",
			"updated_at": "2026-04-10T02:00:03.605175Z",
			"deleted_at": null,
			"main_name": "BRONZE KEYSTONE",
			"aliases": [
				"APT17 ",
				"Aurora Panda ",
				"DeputyDog ",
				"Group 72 ",
				"Hidden Lynx ",
				"TG-8153 ",
				"Tailgater Team"
			],
			"source_name": "Secureworks:BRONZE KEYSTONE",
			"tools": [
				"9002",
				"BlackCoffee",
				"DeputyDog",
				"Derusbi",
				"Gh0stHTTPSDropper",
				"HiKit",
				"InternalCMD",
				"PlugX",
				"PoisonIvy",
				"ZxShell"
			],
			"source_id": "Secureworks",
			"reports": null
		}
	],
	"ts_created_at": 1775434032,
	"ts_updated_at": 1775791935,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/ef2964122a40fe07a9fbc88a42a77e4ec9852ded.pdf",
		"text": "https://archive.orkl.eu/ef2964122a40fe07a9fbc88a42a77e4ec9852ded.txt",
		"img": "https://archive.orkl.eu/ef2964122a40fe07a9fbc88a42a77e4ec9852ded.jpg"
	}
}