Names | ReZer0 | |
Category | Malware | |
Type | Backdoor | |
Description | (Qihoo 360) The execution logic of ReZer0 is controlled by hard-coded built-in instructions. According to different instructions, different malicious functions are executed. Its design logic resembles the design method of backdoor programs. In the 360 massive data, we found that ReZer0 has an obvious version identification. In conjunction with the above-mentioned large number of instructions used, we speculate that the software is still in the development stage, and it will not be ruled out that the program will be controlled through network communication in the future. In addition to the nature of the backdoor virus, ReZer0 also carries known remote control Trojans such as NanoCore RAT and RemcosRAT in the resources. | |
Information | <https://blog.360totalsecurity.com/en/vendetta-new-threat-actor-from-europe/> |
Last change to this tool card: 21 May 2020
Download this tool card in JSON format
Changed | Name | Country | Observed | ||
APT groups | |||||
Vendetta, TA2719 | 2020 |
1 group listed (1 APT, 0 other, 0 unknown)
Digital Service Security Center Follow us on |
Report incidents |
|
+66 (0)2-123-1227 | ||
[email protected] |