Names | CWoolger Woolger WoolenLogger | |
Category | Malware | |
Type | Keylogger | |
Description | (Trend Micro) Debug strings are strings that are sometimes left behind in binaries, revealing information about the developer behind the code. This debug string shows us that the binary was compiled by a user account named “Wool3n.H4t,” and that the project behind this code was dubbed “CWoolger.” This malware is a keylogger, although from a technical point of view, it is not as advanced as its contemporaries. The malware also embedded some File Transfer Protocol (FTP) credentials of the attackers in clear text in the binary. | |
Information | <https://www.trendmicro.com.ru/media/wp/operation-woolen-goldfish-whitepaper-en.pdf> | |
Malpedia | <https://malpedia.caad.fkie.fraunhofer.de/details/win.woolger> | |
AlienVault OTX | <https://otx.alienvault.com/browse/pulses?q=tag:CWoolger> |
Last change to this tool card: 23 April 2020
Download this tool card in JSON format
Changed | Name | Country | Observed | ||
APT groups | |||||
Magic Hound, APT 35, Cobalt Illusion, Charming Kitten | 2012-Aug 2024 |
1 group listed (1 APT, 0 other, 0 unknown)
Digital Service Security Center Follow us on |
Report incidents |
|
+66 (0)2-123-1227 | ||
[email protected] |