Skip to content

Hide Navigation Hide TOC

DOGCALL - S0213 (0852567d-7958-4f4b-8947-4f840ec8d57d)

DOGCALL is a backdoor used by APT37 that has been used to target South Korean government and military organizations in 2017. It is typically dropped using a Hangul Word Processor (HWP) exploit. (Citation: FireEye APT37 Feb 2018)

Cluster A Galaxy A Cluster B Galaxy B Level
DOGCALL - S0213 (0852567d-7958-4f4b-8947-4f840ec8d57d) Malware Encrypted/Encoded File - T1027.013 (0d91b3c0-5e50-47c3-949a-2a796f04d144) Attack Pattern 1
DOGCALL - S0213 (0852567d-7958-4f4b-8947-4f840ec8d57d) Malware Keylogging - T1056.001 (09a60ea3-a8d1-4ae5-976e-5783248b72a4) Attack Pattern 1
DOGCALL - S0213 (0852567d-7958-4f4b-8947-4f840ec8d57d) Malware DOGCALL (a5e851b4-e046-43b6-bc6e-c6c008e3c5aa) Tool 1
DOGCALL - S0213 (0852567d-7958-4f4b-8947-4f840ec8d57d) Malware Ingress Tool Transfer - T1105 (e6919abc-99f9-4c6c-95a5-14761e7b2add) Attack Pattern 1
Audio Capture - T1123 (1035cdf2-3e5f-446f-a7a7-e8f6d7925967) Attack Pattern DOGCALL - S0213 (0852567d-7958-4f4b-8947-4f840ec8d57d) Malware 1
DOGCALL - S0213 (0852567d-7958-4f4b-8947-4f840ec8d57d) Malware Screen Capture - T1113 (0259baeb-9f63-4c69-bf10-eb038c390688) Attack Pattern 1
DOGCALL - S0213 (0852567d-7958-4f4b-8947-4f840ec8d57d) Malware Bidirectional Communication - T1102.002 (be055942-6e63-49d7-9fa1-9cb7d8a8f3f4) Attack Pattern 1
Obfuscated Files or Information - T1027 (b3d682b6-98f2-4fb0-aa3b-b4df007ca70a) Attack Pattern Encrypted/Encoded File - T1027.013 (0d91b3c0-5e50-47c3-949a-2a796f04d144) Attack Pattern 2
Input Capture - T1056 (bb5a00de-e086-4859-a231-fa793f6797e2) Attack Pattern Keylogging - T1056.001 (09a60ea3-a8d1-4ae5-976e-5783248b72a4) Attack Pattern 2
Web Service - T1102 (830c9528-df21-472c-8c14-a036bf17d665) Attack Pattern Bidirectional Communication - T1102.002 (be055942-6e63-49d7-9fa1-9cb7d8a8f3f4) Attack Pattern 2