ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Report
Search
Home > List all groups > List all tools > List all groups using tool IsSpace

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link Tool: IsSpace

NamesIsSpace
NfLog RAT
CategoryMalware
TypeReconnaissance, Backdoor
Description(Palo Alto) To determine the flow of execution, IsSpace gathers various data about the infected host, such as administrative rights of the user, operating system version, and CPU architecture.

If IsSpace determines that it is running as an administrator on a Microsoft Windows 7 system on a 32-bit platform, it will attempt to execute itself accordingly, using a side-loading technique.
Information<https://unit42.paloaltonetworks.com/watering-hole-attack-on-aerospace-firm-exploits-cve-2015-5122-to-install-isspace-backdoor/>
<https://unit42.paloaltonetworks.com/unit42-dragonok-updates-toolset-targets-multiple-geographic-regions/>
Malpedia<https://malpedia.caad.fkie.fraunhofer.de/details/win.isspace>
AlienVault OTX<https://otx.alienvault.com/browse/pulses?q=tag:IsSpace>

Last change to this tool card: 23 April 2020

Download this tool card in JSON format

All groups using tool IsSpace

ChangedNameCountryObserved

APT groups

 DragonOKChina2015-Jan 2017 
 Samurai PandaChina2009 

2 groups listed (2 APT, 0 other, 0 unknown)

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]