Posted by malvuln on Feb 26

Discovery / credits: Malvuln – malvuln.com (c) 2021
Original source:
https://malvuln.com/advisory/a0479e18283ed46e8908767dd0b40f8f.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln

Threat: Trojan-Dropper.Win32.Daws.etlm
Vulnerability: Remote Unauthenticated System Reboot
Description: Daws.etlm drops an executable named “MSWDM.EXE” under Windows
dir and listens on UDP port 139. Unauthenticated third-party attackers can
send…
Read More – Full Disclosure


By |2021-02-26T09:20:02+00:00February 26th, 2021|