Names | EYService | |
Category | Malware | |
Type | Backdoor | |
Description | (Epic Turla) The main functionality orchestrating the different subcomponents is contained within Data.bin, later renamed to ‘svchost.exe’. The orchestrator takes 17 different three digit codes to divert functionality within a giant switch statement. Some of the codes have not been fully implemented up to the latest samples I’ve found so far, which further suggests a continued developmental effort. | |
Information | <https://www.epicturla.com/blog/the-lost-nazar> <https://blog.malwarelab.pl/posts/nazar_eyservice/> |
Last change to this tool card: 24 April 2020
Download this tool card in JSON format
Changed | Name | Country | Observed | ||
APT groups | |||||
Nazar | ![]() | 2008 |
1 group listed (1 APT, 0 other, 0 unknown)
Thailand Computer Emergency Response Team (ThaiCERT) Follow us on![]() ![]() |
Report incidents |
|
![]() |
+66 (0)2-123-1234 | |
![]() |
report@thaicert.or.th | |
![]() |
Download PGP key |