Reaver

Reaver is a malware family that has been in the wild since at least late 2016. Reporting indicates victims have primarily been associated with the "Five Poisons," which are movements the Chinese government considers dangerous. The type of malware is rare due to its final payload being in the form of Control Panel items.[1]

ID: S0172
Type: MALWARE
Platforms: Windows
Version: 1.2
Created: 16 January 2018
Last Modified: 11 April 2024

Techniques Used

Domain ID Name Use
Enterprise T1543 .003 创建或修改系统进程: Windows Service

Reaver installs itself as a new service.[1]

Enterprise T1547 .001 启动或登录自动启动执行: Registry Run Keys / Startup Folder

Reaver creates a shortcut file and saves it in a Startup folder to establish persistence.[1]

.009 启动或登录自动启动执行: Shortcut Modification

Reaver creates a shortcut file and saves it in a Startup folder to establish persistence.[1]

Enterprise T1071 .001 应用层协议: Web Protocols

Some Reaver variants use HTTP for C2.[1]

Enterprise T1560 .003 归档收集数据: Archive via Custom Method

Reaver encrypts collected data with an incremental XOR key prior to exfiltration.[1]

Enterprise T1012 查询注册表

Reaver queries the Registry to determine the correct Startup path to use for persistence.[1]

Enterprise T1027 .013 混淆文件或信息: Encrypted/Encoded File

Reaver encrypts some of its files with XOR.[1]

Enterprise T1070 .004 移除指标: File Deletion

Reaver deletes the original dropped file from the victim.[1]

Enterprise T1218 .002 系统二进制代理执行: Control Panel

Reaver drops and executes a malicious CPL file as its payload.[1]

Enterprise T1082 系统信息发现

Reaver collects system information from the victim, including CPU speed, computer name, volume serial number, ANSI code page, OEM code page identifier for the OS, Microsoft Windows version, and memory information.[1]

Enterprise T1033 系统所有者/用户发现

Reaver collects the victim's username.[1]

Enterprise T1016 系统网络配置发现

Reaver collects the victim's IP address.[1]

Enterprise T1095 非应用层协议

Some Reaver variants use raw TCP for C2.[1]

References