{
	"id": "559b87d5-729d-43d3-ab05-646cb6761b34",
	"created_at": "2026-04-06T00:13:07.784758Z",
	"updated_at": "2026-04-10T03:36:00.145522Z",
	"deleted_at": null,
	"sha1_hash": "f15f5b632c288aa2bc366807a404ade61e6611a1",
	"title": "Threat Group Cards: A Threat Actor Encyclopedia",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 47223,
	"plain_text": "Threat Group Cards: A Threat Actor Encyclopedia\nArchived: 2026-04-05 22:22:21 UTC\n Other threat group: TA554\nNames\nTA554 (Proofpoint)\nTH-163 (Yoroi)\nCountry [Unknown]\nMotivation Financial crime\nFirst seen 2017\nDescription\n(Proofpoint) Since May 2018, Proofpoint researchers have observed email campaigns using a new\ndownloader called sLoad. sLoad is a PowerShell downloader that most frequently delivers Ramnit\nbanker and includes noteworthy reconnaissance features. The malware gathers information about the\ninfected system including a list of running processes, the presence of Outlook, and the presence of\nCitrix-related files. sLoad can also take screenshots and check the DNS cache for specific domains\n(e.g., targeted banks), as well as load external binaries.\nWhile initial versions of sLoad appeared in May 2018, we began tracking the campaigns from this\nactor (internally named TA554) since at least the beginning of 2017.\nObserved\nSectors: Financial.\nCountries: Canada, Italy, UK.\nTools used DarkVNC, Godzilla, Gootkit, Gozi ISFB, PsiXBot, Ramnit, sLoad, Snatch, Living off the Land.\nInformation\nLast change to this card: 29 April 2020\nDownload this actor card in PDF or JSON format\nSource: https://apt.etda.or.th/cgi-bin/showcard.cgi?u=4ae54bc8-e451-4ec7-a8c7-08e9795cc082\nhttps://apt.etda.or.th/cgi-bin/showcard.cgi?u=4ae54bc8-e451-4ec7-a8c7-08e9795cc082\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://apt.etda.or.th/cgi-bin/showcard.cgi?u=4ae54bc8-e451-4ec7-a8c7-08e9795cc082"
	],
	"report_names": [
		"showcard.cgi?u=4ae54bc8-e451-4ec7-a8c7-08e9795cc082"
	],
	"threat_actors": [
		{
			"id": "a3808e4f-c7fd-4d25-aa84-aacc27061826",
			"created_at": "2023-01-06T13:46:39.316216Z",
			"updated_at": "2026-04-10T02:00:03.285437Z",
			"deleted_at": null,
			"main_name": "TA554",
			"aliases": [
				"TH-163"
			],
			"source_name": "MISPGALAXY:TA554",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		},
		{
			"id": "9be98f84-4a93-41c7-90bd-3ea66ba5bfd7",
			"created_at": "2022-10-25T16:07:24.581954Z",
			"updated_at": "2026-04-10T02:00:05.040995Z",
			"deleted_at": null,
			"main_name": "TA554",
			"aliases": [
				"TH-163"
			],
			"source_name": "ETDA:TA554",
			"tools": [
				"DarkVNC",
				"Godzilla",
				"Godzilla Loader",
				"Gootkit",
				"Gootloader",
				"Gozi ISFB",
				"ISFB",
				"LOLBAS",
				"LOLBins",
				"Living off the Land",
				"Nimnul",
				"Pandemyia",
				"PsiX",
				"PsiXBot",
				"Ramnit",
				"StarsLord",
				"Waldek",
				"Xswkit",
				"sLoad",
				"talalpek"
			],
			"source_id": "ETDA",
			"reports": null
		}
	],
	"ts_created_at": 1775434387,
	"ts_updated_at": 1775792160,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/f15f5b632c288aa2bc366807a404ade61e6611a1.pdf",
		"text": "https://archive.orkl.eu/f15f5b632c288aa2bc366807a404ade61e6611a1.txt",
		"img": "https://archive.orkl.eu/f15f5b632c288aa2bc366807a404ade61e6611a1.jpg"
	}
}