Names | EYService | |
Category | Malware | |
Type | Backdoor | |
Description | (Epic Turla) The main functionality orchestrating the different subcomponents is contained within Data.bin, later renamed to ‘svchost.exe’. The orchestrator takes 17 different three digit codes to divert functionality within a giant switch statement. Some of the codes have not been fully implemented up to the latest samples I’ve found so far, which further suggests a continued developmental effort. | |
Information | <https://www.epicturla.com/blog/the-lost-nazar> <https://blog.malwarelab.pl/posts/nazar_eyservice/> <https://research.checkpoint.com/2020/nazar-spirits-of-the-past/> | |
Malpedia | <https://malpedia.caad.fkie.fraunhofer.de/details/win.eyservice> |
Last change to this tool card: 24 April 2021
Download this tool card in JSON format
Changed | Name | Country | Observed | ||
APT groups | |||||
Nazar | 2008 |
1 group listed (1 APT, 0 other, 0 unknown)
Digital Service Security Center Follow us on |
Report incidents |
|
+66 (0)2-123-1227 | ||
[email protected] |