Nazar

MISP
Type:
Unknown
Country:
Unknown
First seen:
Unknown
Details:

This actor was identified by Juan Andres Guerrero-Saade from the SIG37 cluster as published in the ShadowBrokers' 'Lost in Translation' leak. Earliest known sighting potentially dates back to as far as 2008 with a confirmed center of activity around 2010-2013. The actor name is derived from a PDB debug string fragment: 'khzer'. Victimology indicates targeting of Iran, assessed with low confidence based on VT file submission locations. Nazar employs a modular toolkit where a main dropper silently registers multiple DLLs as OLE controls in the Windows registry. Functionality includes keylogging, sound and screen grabbing, as well as traffic capture using the MicroOlap Packet Sniffer library.

Aliases (106)
SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37 SIG37
Metadata
ID: 288
Created: 13/01/2026 17:48
Updated: 07/03/2026 16:00