Names | IsSpace NfLog RAT | |
Category | Malware | |
Type | Reconnaissance, Backdoor | |
Description | (Palo Alto) To determine the flow of execution, IsSpace gathers various data about the infected host, such as administrative rights of the user, operating system version, and CPU architecture. If IsSpace determines that it is running as an administrator on a Microsoft Windows 7 system on a 32-bit platform, it will attempt to execute itself accordingly, using a side-loading technique. | |
Information | <https://unit42.paloaltonetworks.com/watering-hole-attack-on-aerospace-firm-exploits-cve-2015-5122-to-install-isspace-backdoor/> <https://unit42.paloaltonetworks.com/unit42-dragonok-updates-toolset-targets-multiple-geographic-regions/> | |
Malpedia | <https://malpedia.caad.fkie.fraunhofer.de/details/win.isspace> | |
AlienVault OTX | <https://otx.alienvault.com/browse/pulses?q=tag:IsSpace> |
Last change to this tool card: 23 April 2020
Download this tool card in JSON format
Changed | Name | Country | Observed | ||
APT groups | |||||
DragonOK | 2015-Jan 2017 | ||||
Samurai Panda | 2009 |
2 groups listed (2 APT, 0 other, 0 unknown)
Digital Service Security Center Follow us on |
Report incidents |
|
+66 (0)2-123-1227 | ||
[email protected] |