enterprise |
T1071 |
Application Layer Protocol |
- |
enterprise |
T1071.001 |
Web Protocols |
Micropsia uses HTTP and HTTPS for C2 network communications. |
enterprise |
T1560 |
Archive Collected Data |
- |
enterprise |
T1560.001 |
Archive via Utility |
Micropsia creates a RAR archive based on collected files on the victim’s machine. |
enterprise |
T1123 |
Audio Capture |
Micropsia can perform microphone recording. |
enterprise |
T1119 |
Automated Collection |
Micropsia executes an RAR tool to recursively archive files based on a predefined list of file extensions (.xls, .xlsx, .csv, .odt, .doc, .docx, .ppt, .pptx, .pdf, .mdb, .accdb, .accde, *.txt). |
enterprise |
T1547 |
Boot or Logon Autostart Execution |
- |
enterprise |
T1547.009 |
Shortcut Modification |
Micropsia creates a shortcut to maintain persistence. |
enterprise |
T1059 |
Command and Scripting Interpreter |
- |
enterprise |
T1059.003 |
Windows Command Shell |
Micropsia creates a command-line shell using cmd.exe. |
enterprise |
T1083 |
File and Directory Discovery |
Micropsia can perform a recursive directory listing for all volume drives available on the victim’s machine and can also fetch specific files by their paths. |
enterprise |
T1564 |
Hide Artifacts |
- |
enterprise |
T1564.001 |
Hidden Files and Directories |
Micropsia creates a new hidden directory to store all components’ outputs in a dedicated sub-folder for each. |
enterprise |
T1105 |
Ingress Tool Transfer |
Micropsia can download and execute an executable from the C2 server. |
enterprise |
T1056 |
Input Capture |
- |
enterprise |
T1056.001 |
Keylogging |
Micropsia has keylogging capabilities. |
enterprise |
T1027 |
Obfuscated Files or Information |
Micropsia obfuscates the configuration with a custom Base64 and XOR. |
enterprise |
T1113 |
Screen Capture |
Micropsia takes screenshots every 90 seconds by calling the Gdi32.BitBlt API. |
enterprise |
T1518 |
Software Discovery |
- |
enterprise |
T1518.001 |
Security Software Discovery |
Micropsia searches for anti-virus software and firewall products installed on the victim’s machine using WMI. |
enterprise |
T1082 |
System Information Discovery |
Micropsia gathers the hostname and OS version from the victim’s machine. |
enterprise |
T1033 |
System Owner/User Discovery |
Micropsia collects the username from the victim’s machine. |
enterprise |
T1047 |
Windows Management Instrumentation |
Micropsia searches for anti-virus software and firewall products installed on the victim’s machine using WMI. |