{
	"id": "2ffca0e4-c0bc-4f4b-b650-bb02c3c9a7e9",
	"created_at": "2026-04-06T00:20:19.193396Z",
	"updated_at": "2026-04-10T13:12:04.550649Z",
	"deleted_at": null,
	"sha1_hash": "0fd089e3d25a5e5378b58b63778d98b2edd6a4f6",
	"title": "Micropsia (Malware Family)",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 31120,
	"plain_text": "Micropsia (Malware Family)\r\nBy Fraunhofer FKIE\r\nArchived: 2026-04-05 20:29:36 UTC\r\nMicropsia\r\nActor(s): AridViper\r\nThis malware written in Delphi is an information stealing malware family dubbed \"MICROPSIA\". It has s wide\r\nrange of data theft functionality built in.\r\nReferences\r\nYara Rules\r\n[TLP:WHITE] win_micropsia_w0 (20191121 | No description)\r\nDownload all Yara Rules\r\nSource: https://malpedia.caad.fkie.fraunhofer.de/details/win.micropsia\r\nhttps://malpedia.caad.fkie.fraunhofer.de/details/win.micropsia\r\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://malpedia.caad.fkie.fraunhofer.de/details/win.micropsia"
	],
	"report_names": [
		"win.micropsia"
	],
	"threat_actors": [
		{
			"id": "929d794b-0e1d-4d10-93a6-29408a527cc2",
			"created_at": "2023-01-06T13:46:38.70844Z",
			"updated_at": "2026-04-10T02:00:03.075002Z",
			"deleted_at": null,
			"main_name": "AridViper",
			"aliases": [
				"Desert Falcon",
				"Arid Viper",
				"APT-C-23",
				"Bearded Barbie",
				"Two-tailed Scorpion"
			],
			"source_name": "MISPGALAXY:AridViper",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		}
	],
	"ts_created_at": 1775434819,
	"ts_updated_at": 1775826724,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/0fd089e3d25a5e5378b58b63778d98b2edd6a4f6.pdf",
		"text": "https://archive.orkl.eu/0fd089e3d25a5e5378b58b63778d98b2edd6a4f6.txt",
		"img": "https://archive.orkl.eu/0fd089e3d25a5e5378b58b63778d98b2edd6a4f6.jpg"
	}
}