Skip to content

Hide Navigation Hide TOC

Reaver (22b75148-9d58-4fa7-8459-6ef25bbaf759)

Unit 42 has discovered a new malware family we’ve named “Reaver” with ties to attackers who use SunOrcal malware. SunOrcal activity has been documented to at least 2013, and based on metadata surrounding some of the C2s, may have been active as early as 2010. The new family appears to have been in the wild since late 2016 and to date we have only identified 10 unique samples, indicating it may be sparingly used. Reaver is also somewhat unique in the fact that its final payload is in the form of a Control panel item, or CPL file. To date, only 0.006% of all malware seen by Palo Alto Networks employs this technique, indicating that it is in fact fairly rare.

Cluster A Galaxy A Cluster B Galaxy B Level
SURTR (dd919e75-57e8-4e5c-9451-8be6e734f1f3) Tool Reaver (22b75148-9d58-4fa7-8459-6ef25bbaf759) Tool 1
SunOrcal (80365d3a-6d46-4195-a772-364749a6dc06) Tool Reaver (22b75148-9d58-4fa7-8459-6ef25bbaf759) Tool 1
Reaver (22b75148-9d58-4fa7-8459-6ef25bbaf759) Tool Reaver (826c31ca-2617-47e4-b236-205da3881182) Malpedia 1
SURTR (dd919e75-57e8-4e5c-9451-8be6e734f1f3) Tool surtr (8666afcc-8cc2-4856-83de-b7e8b4309367) Malpedia 2
SURTR (dd919e75-57e8-4e5c-9451-8be6e734f1f3) Tool SunOrcal (80365d3a-6d46-4195-a772-364749a6dc06) Tool 2
SunOrcal (80365d3a-6d46-4195-a772-364749a6dc06) Tool SunOrcal (a51b82ba-7e32-4a8e-b5d0-8d0441bdcce4) Malpedia 2