ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Report
Search
Home > List all groups > List all tools > List all groups using tool Micropsia

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link Tool: Micropsia

NamesMicropsia
CategoryMalware
TypeInfo stealer, Keylogger, Exfiltration
Description(Palo Alto) The MICROPSIA malware family is written in Delphi and is an information stealing malware family with a wide range of data theft functionality built in.

The main capabilities of the malware are as follows:
• Logging of keystrokes to a hardcoded text file and exfiltration to a remote server
• Capturing screenshots of the infected machines
• Searching for files with extensions matching Microsoft Office documents and using WinRAR to archive these prior to exfiltration.
Information<https://unit42.paloaltonetworks.com/unit42-targeted-attacks-middle-east-using-kasperagent-micropsia/>
<http://blog.talosintelligence.com/2017/06/palestine-delphi.html>
<https://research.checkpoint.com/apt-attack-middle-east-big-bang/>
MITRE ATT&CK<https://attack.mitre.org/software/S0339/>
Malpedia<https://malpedia.caad.fkie.fraunhofer.de/details/win.micropsia>
AlienVault OTX<https://otx.alienvault.com/browse/pulses?q=tag:Micropsia>

Last change to this tool card: 14 May 2020

Download this tool card in JSON format

All groups using tool Micropsia

ChangedNameCountryObserved

APT groups

 The Big Bang[Unknown]2017 
 Desert Falcons[Gaza]2011-Oct 2023X
 Molerats, Extreme Jackal, Gaza Cybergang[Gaza]2012-Jul 2023 

3 groups listed (3 APT, 0 other, 0 unknown)

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]