{
	"id": "4e9dd449-f684-4b8d-aee7-bb3a01e8e8cc",
	"created_at": "2026-04-06T01:28:58.473632Z",
	"updated_at": "2026-04-10T03:29:45.341305Z",
	"deleted_at": null,
	"sha1_hash": "faa50663a2ea2fa42f40f14660c8b8c00c3716bb",
	"title": "Threat Group Cards: A Threat Actor Encyclopedia",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 58217,
	"plain_text": "Threat Group Cards: A Threat Actor Encyclopedia\nArchived: 2026-04-06 00:13:50 UTC\nHome \u003e List all groups \u003e List all tools \u003e List all groups using tool OddJob\n Tool: OddJob\nNames OddJob\nCategory Malware\nType Banking trojan, Backdoor, Info stealer, Credential stealer\nDescription\n(IBM) OddJob’s most obvious characteristic is that it is designed to intercept user\ncommunications through the browser to steal or inject information and terminate user sessions\ninside Internet Explorer and Firefox. We have extracted OddJob’s configuration data and\nconcluded that it is capable of performing different actions on targeted websites, depending on\nits configuration. The code is capable of logging GET and POST requests, grabbing full pages,\nterminating connections and injecting data into Web pages.\nAll logged requests and grabbed pages are sent to the C\u0026C server in real time, allowing\nfraudsters to perform session hijacks — also in real time but hidden from the legitimate user of\nthe online bank account. By tapping the session ID token, which banks use to identify a user’s\nonline banking session, the fraudsters can electronically impersonate the legitimate user and\ncomplete a range of banking operations.\nInformation\nMalpedia Last change to this tool card: 24 May 2020\nDownload this tool card in JSON format\nAll groups using tool OddJob\nChanged Name Country Observed\nAPT groups\nhttps://apt.etda.or.th/cgi-bin/listgroups.cgi?u=e86e1ae5-b560-4be2-bdf5-a5ee26ebcaa9\nPage 1 of 2\n\nEquation Group 2001-Aug 2016\r\n1 group listed (1 APT, 0 other, 0 unknown)\r\nSource: https://apt.etda.or.th/cgi-bin/listgroups.cgi?u=e86e1ae5-b560-4be2-bdf5-a5ee26ebcaa9\r\nhttps://apt.etda.or.th/cgi-bin/listgroups.cgi?u=e86e1ae5-b560-4be2-bdf5-a5ee26ebcaa9\r\nPage 2 of 2",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://apt.etda.or.th/cgi-bin/listgroups.cgi?u=e86e1ae5-b560-4be2-bdf5-a5ee26ebcaa9"
	],
	"report_names": [
		"listgroups.cgi?u=e86e1ae5-b560-4be2-bdf5-a5ee26ebcaa9"
	],
	"threat_actors": [
		{
			"id": "b740943a-da51-4133-855b-df29822531ea",
			"created_at": "2022-10-25T15:50:23.604126Z",
			"updated_at": "2026-04-10T02:00:05.259593Z",
			"deleted_at": null,
			"main_name": "Equation",
			"aliases": [
				"Equation"
			],
			"source_name": "MITRE:Equation",
			"tools": null,
			"source_id": "MITRE",
			"reports": null
		},
		{
			"id": "08623296-52be-4977-8622-50efda44e9cc",
			"created_at": "2023-01-06T13:46:38.549387Z",
			"updated_at": "2026-04-10T02:00:03.020003Z",
			"deleted_at": null,
			"main_name": "Equation Group",
			"aliases": [
				"Tilded Team",
				"EQGRP",
				"G0020"
			],
			"source_name": "MISPGALAXY:Equation Group",
			"tools": [
				"TripleFantasy",
				"GrayFish",
				"EquationLaser",
				"EquationDrug",
				"DoubleFantasy"
			],
			"source_id": "MISPGALAXY",
			"reports": null
		},
		{
			"id": "2d9fbbd7-e4c3-40e5-b751-27af27c8610b",
			"created_at": "2024-05-01T02:03:08.144214Z",
			"updated_at": "2026-04-10T02:00:03.674763Z",
			"deleted_at": null,
			"main_name": "PLATINUM COLONY",
			"aliases": [
				"Equation Group "
			],
			"source_name": "Secureworks:PLATINUM COLONY",
			"tools": [
				"DoubleFantasy",
				"EquationDrug",
				"EquationLaser",
				"Fanny",
				"GrayFish",
				"TripleFantasy"
			],
			"source_id": "Secureworks",
			"reports": null
		},
		{
			"id": "e0fed6e6-a593-4041-80ef-694261825937",
			"created_at": "2022-10-25T16:07:23.593572Z",
			"updated_at": "2026-04-10T02:00:04.680752Z",
			"deleted_at": null,
			"main_name": "Equation Group",
			"aliases": [
				"APT-C-40",
				"G0020",
				"Platinum Colony",
				"Tilded Team"
			],
			"source_name": "ETDA:Equation Group",
			"tools": [
				"Bvp47",
				"DEMENTIAWHEEL",
				"DOUBLEFANTASY",
				"DanderSpritz",
				"DarkPulsar",
				"DoubleFantasy",
				"DoubleFeature",
				"DoublePulsar",
				"Duqu",
				"EQUATIONDRUG",
				"EQUATIONLASER",
				"EQUESTRE",
				"Flamer",
				"GRAYFISH",
				"GROK",
				"OddJob",
				"Plexor",
				"Prax",
				"Regin",
				"Skywiper",
				"TRIPLEFANTASY",
				"Tilded",
				"UNITEDRAKE",
				"WarriorPride",
				"sKyWIper"
			],
			"source_id": "ETDA",
			"reports": null
		}
	],
	"ts_created_at": 1775438938,
	"ts_updated_at": 1775791785,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/faa50663a2ea2fa42f40f14660c8b8c00c3716bb.pdf",
		"text": "https://archive.orkl.eu/faa50663a2ea2fa42f40f14660c8b8c00c3716bb.txt",
		"img": "https://archive.orkl.eu/faa50663a2ea2fa42f40f14660c8b8c00c3716bb.jpg"
	}
}