DOGCALL

DOGCALL is a backdoor used by APT37 that has been used to target South Korean government and military organizations in 2017. It is typically dropped using a Hangul Word Processor (HWP) exploit. [1]

ID: S0213
Type: MALWARE
Platforms: Windows

Version: 1.1

Techniques Used

DomainIDNameUse
EnterpriseT1123Audio CaptureDOGCALL can capture microphone data from the victim's machine.[2]
EnterpriseT1056Input CaptureDOGCALL is capable of logging keystrokes.[1][2]
EnterpriseT1027Obfuscated Files or InformationDOGCALL is encrypted using single-byte XOR.[2]
EnterpriseT1105Remote File CopyDOGCALL can download and execute additional payloads.[2]
EnterpriseT1113Screen CaptureDOGCALL is capable of capturing screenshots of the victim's machine.[1][2]
EnterpriseT1102Web ServiceDOGCALL is capable of leveraging cloud storage APIs such as Cloud, Box, Dropbox, and Yandex for C2.[1][2]

Groups

Groups that use this software:

APT37

References