{
	"id": "6a456597-9403-4186-9580-a6e84e9a63fc",
	"created_at": "2026-04-06T00:22:02.990416Z",
	"updated_at": "2026-04-10T03:35:12.383254Z",
	"deleted_at": null,
	"sha1_hash": "f4ba013d20e4ff8945af9bc7cb6b31d966a629c8",
	"title": "Cyst Downloader - Threat Group Cards: A Threat Actor Encyclopedia",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 48650,
	"plain_text": "Cyst Downloader - Threat Group Cards: A Threat Actor\r\nEncyclopedia\r\nArchived: 2026-04-05 15:33:32 UTC\r\nHome \u003e List all groups \u003e List all tools \u003e List all groups using tool Cyst Downloader\r\n Tool: Cyst Downloader\r\nNames Cyst Downloader\r\nCategory Malware\r\nType Downloader\r\nDescription\r\n(Proofpoint) In at least in one case we observed an MWI document install a previously\r\nunknown malware (SHA256:\r\naf17a3b5bf4c78283b2ee338ac6d457b9f3e7b7187c7e9d8651452b78574b3d3). We are calling\r\nit the Cyst Downloader. The functionality of this loader is limited. It can create a mutex such\r\nas “syst\u003c10 digits\u003e” and communicate with the the C\u0026C server to receive a DLL plugin. The\r\nURI path pattern of the C\u0026C beacon contains a folder (random alphanumeric name) followed\r\nby a file (random alphanumeric name) with a .jpg, .php, .gif, or .png extension. The\r\ndownloaded DLL is encrypted with a hardcoded '\\x28\\xBF\\x0A\\xBE\\x5B\\x6E\\x70\\x03' RC4\r\nkey and base64 encoded. The server sends the DLL in HTML comments in a fake 404\r\nresponse.\r\nInformation\r\n\u003chttps://www.proofpoint.com/us/threat-insight/post/microsoft-word-intruder-integrates-cve-2017-0199-utilized-cobalt-group-target\u003e\r\nLast change to this tool card: 20 April 2020\r\nDownload this tool card in JSON format\r\nAll groups using tool Cyst Downloader\r\nChanged Name Country Observed\r\nAPT groups\r\n  Cobalt Group 2016-Oct 2019\r\nhttps://apt.etda.or.th/cgi-bin/listgroups.cgi?u=89f71881-355d-455c-bfaa-b310d1695b5d\r\nPage 1 of 2\n\n1 group listed (1 APT, 0 other, 0 unknown)\r\nSource: https://apt.etda.or.th/cgi-bin/listgroups.cgi?u=89f71881-355d-455c-bfaa-b310d1695b5d\r\nhttps://apt.etda.or.th/cgi-bin/listgroups.cgi?u=89f71881-355d-455c-bfaa-b310d1695b5d\r\nPage 2 of 2",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://apt.etda.or.th/cgi-bin/listgroups.cgi?u=89f71881-355d-455c-bfaa-b310d1695b5d"
	],
	"report_names": [
		"listgroups.cgi?u=89f71881-355d-455c-bfaa-b310d1695b5d"
	],
	"threat_actors": [
		{
			"id": "610a7295-3139-4f34-8cec-b3da40add480",
			"created_at": "2023-01-06T13:46:38.608142Z",
			"updated_at": "2026-04-10T02:00:03.03764Z",
			"deleted_at": null,
			"main_name": "Cobalt",
			"aliases": [
				"Cobalt Group",
				"Cobalt Gang",
				"GOLD KINGSWOOD",
				"COBALT SPIDER",
				"G0080",
				"Mule Libra"
			],
			"source_name": "MISPGALAXY:Cobalt",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		},
		{
			"id": "2dfaa730-7079-494c-b2f0-3ff8f3598a51",
			"created_at": "2022-10-25T16:07:23.474746Z",
			"updated_at": "2026-04-10T02:00:04.623746Z",
			"deleted_at": null,
			"main_name": "Cobalt Group",
			"aliases": [
				"ATK 67",
				"Cobalt Gang",
				"Cobalt Spider",
				"G0080",
				"Gold Kingswood",
				"Mule Libra",
				"TAG-CR3"
			],
			"source_name": "ETDA:Cobalt Group",
			"tools": [
				"ATMRipper",
				"ATMSpitter",
				"Agentemis",
				"AmmyyRAT",
				"AtNow",
				"COOLPANTS",
				"CobInt",
				"Cobalt Strike",
				"CobaltStrike",
				"Cyst Downloader",
				"Fareit",
				"FlawedAmmyy",
				"Formbook",
				"Little Pig",
				"Metasploit Stager",
				"Mimikatz",
				"More_eggs",
				"NSIS",
				"Nullsoft Scriptable Install System",
				"Pony Loader",
				"Ripper ATM",
				"SDelete",
				"Siplog",
				"SoftPerfect Network Scanner",
				"SpicyOmelette",
				"Taurus Builder",
				"Taurus Builder Kit",
				"Taurus Loader",
				"Terra Loader",
				"ThreatKit",
				"VenomKit",
				"cobeacon",
				"win.xloader"
			],
			"source_id": "ETDA",
			"reports": null
		},
		{
			"id": "c11abba0-f5e8-4017-a4ee-acb1a7c8c242",
			"created_at": "2022-10-25T15:50:23.744036Z",
			"updated_at": "2026-04-10T02:00:05.294413Z",
			"deleted_at": null,
			"main_name": "Cobalt Group",
			"aliases": [
				"Cobalt Group",
				"GOLD KINGSWOOD",
				"Cobalt Gang",
				"Cobalt Spider"
			],
			"source_name": "MITRE:Cobalt Group",
			"tools": [
				"Mimikatz",
				"More_eggs",
				"SpicyOmelette",
				"SDelete",
				"Cobalt Strike",
				"PsExec"
			],
			"source_id": "MITRE",
			"reports": null
		}
	],
	"ts_created_at": 1775434922,
	"ts_updated_at": 1775792112,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/f4ba013d20e4ff8945af9bc7cb6b31d966a629c8.pdf",
		"text": "https://archive.orkl.eu/f4ba013d20e4ff8945af9bc7cb6b31d966a629c8.txt",
		"img": "https://archive.orkl.eu/f4ba013d20e4ff8945af9bc7cb6b31d966a629c8.jpg"
	}
}