ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Report
Search
Home > List all groups > List all tools > List all groups using tool EYService

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link Tool: EYService

NamesEYService
CategoryMalware
TypeBackdoor
Description(Epic Turla) The main functionality orchestrating the different subcomponents is contained within Data.bin, later renamed to ‘svchost.exe’. The orchestrator takes 17 different three digit codes to divert functionality within a giant switch statement. Some of the codes have not been fully implemented up to the latest samples I’ve found so far, which further suggests a continued developmental effort.
Information<https://www.epicturla.com/blog/the-lost-nazar>
<https://blog.malwarelab.pl/posts/nazar_eyservice/>
<https://research.checkpoint.com/2020/nazar-spirits-of-the-past/>
Malpedia<https://malpedia.caad.fkie.fraunhofer.de/details/win.eyservice>

Last change to this tool card: 24 April 2021

Download this tool card in JSON format

Previous: EYE
Next: FakeFish

All groups using tool EYService

ChangedNameCountryObserved

APT groups

 NazarIran2008 

1 group listed (1 APT, 0 other, 0 unknown)

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]