
| Names | PyMICROPSIA | |
| Category | Malware | |
| Type | Reconnaissance, Backdoor, Info stealer, Keylogger, Credential stealer, Downloader | |
| Description | (Palo Alto) PyMICROPSIA has a rich set of information-stealing and control capabilities, including: • File uploading. • Payload downloading and execution. • Browser credential stealing. Clearing browsing history and profiles. • Taking screenshots. • Keylogging. • Compressing RAR files for stolen information. • Collecting process information and killing processes. • Collecting file listing information. • Deleting files. • Rebooting machine. • Collecting Outlook .ost file. Killing and disabling Outlook process. • Deleting, creating, compressing and exfiltrating files and folders. • Collecting information from USB drives, including file exfiltration. • Audio recording. • Executing commands. | |
| Information | <https://unit42.paloaltonetworks.com/pymicropsia/> | |
Last change to this tool card: 06 January 2021
Download this tool card in JSON format
| Changed | Name | Country | Observed | ||
APT groups | |||||
| Desert Falcons | [Gaza] | 2011-Oct 2023 | ![]() | ||
1 group listed (1 APT, 0 other, 0 unknown)
|
Digital Service Security Center Follow us on |
Report incidents |
|
| +66 (0)2-123-1227 | ||
| [email protected] | ||