Names | PyMICROPSIA | |
Category | Malware | |
Type | Reconnaissance, Backdoor, Info stealer, Keylogger, Credential stealer, Downloader | |
Description | (Palo Alto) PyMICROPSIA has a rich set of information-stealing and control capabilities, including: • File uploading. • Payload downloading and execution. • Browser credential stealing. Clearing browsing history and profiles. • Taking screenshots. • Keylogging. • Compressing RAR files for stolen information. • Collecting process information and killing processes. • Collecting file listing information. • Deleting files. • Rebooting machine. • Collecting Outlook .ost file. Killing and disabling Outlook process. • Deleting, creating, compressing and exfiltrating files and folders. • Collecting information from USB drives, including file exfiltration. • Audio recording. • Executing commands. | |
Information | <https://unit42.paloaltonetworks.com/pymicropsia/> |
Last change to this tool card: 06 January 2021
Download this tool card in JSON format
Changed | Name | Country | Observed | ||
APT groups | |||||
Desert Falcons | [Gaza] | 2011-Oct 2023 |
1 group listed (1 APT, 0 other, 0 unknown)
Digital Service Security Center Follow us on |
Report incidents |
|
+66 (0)2-123-1227 | ||
[email protected] |