Posted by malvuln on Feb 18

Discovery / credits: Malvuln – malvuln.com (c) 2021
Original source:
https://malvuln.com/advisory/64f2fd4dbd9039e5bc054f475eaa582a.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln

Threat: Backdoor.Win32.Agent.aak
Vulnerability: Weak Hardcoded Credentials
Description: The HTTP backdoor server HBKDR v0.3 listens on TCP port 8080
and accepts HTTP POST requests in order to execute commands on the infected
system. The malware hardcodes…
Read More – Full Disclosure


By |2021-02-19T01:19:25-05:00February 19th, 2021|