ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Report
Search
Home > List all groups > List all tools > List all groups using tool CWoolger

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link Tool: CWoolger

NamesCWoolger
Woolger
WoolenLogger
CategoryMalware
TypeKeylogger
Description(Trend Micro) Debug strings are strings that are sometimes left behind in binaries, revealing information about the developer behind the code. This debug string shows us that the binary was compiled by a user account named “Wool3n.H4t,” and that the project behind this code was dubbed “CWoolger.”

This malware is a keylogger, although from a technical point of view, it is not as advanced as its contemporaries. The malware also embedded some File Transfer Protocol (FTP) credentials of the attackers in clear text in the binary.
Information<https://www.trendmicro.com.ru/media/wp/operation-woolen-goldfish-whitepaper-en.pdf>
Malpedia<https://malpedia.caad.fkie.fraunhofer.de/details/win.woolger>
AlienVault OTX<https://otx.alienvault.com/browse/pulses?q=tag:CWoolger>

Last change to this tool card: 23 April 2020

Download this tool card in JSON format

All groups using tool CWoolger

ChangedNameCountryObserved

APT groups

 Magic Hound, APT 35, Cobalt Illusion, Charming KittenIran2012-Aug 2024X

1 group listed (1 APT, 0 other, 0 unknown)

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]