DOGCALL (81ce23c0-f505-4d75-9928-4fbd627d3bc2)
DOGCALL is a backdoor used by APT37 that has been used to target South Korean government and military organizations in 2017. It is typically dropped using a Hangul Word Processor (HWP) exploit. [FireEye APT37 Feb 2018]
Cluster A | Galaxy A | Cluster B | Galaxy B | Level |
---|---|---|---|---|
DOGCALL (81ce23c0-f505-4d75-9928-4fbd627d3bc2) | Tidal Software | APT37 (013fdfdc-aa32-4779-8f6e-7920615cbf66) | Tidal Groups | 1 |