Posted by malvuln on Mar 08

Discovery / credits: Malvuln – malvuln.com (c) 2021
Original source:
https://malvuln.com/advisory/3f3ee9dce39e816b4001bd6ae66e8f1a.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln

Threat: Backdoor.Win32.Antilam.14.o
Vulnerability: Unauthenticated Remote Command Execution
Description: The malware listens on TCP ports 47891 and 29559. Third party
attackers who can reach infected systems can execute commands made
available by the…
Read More – Full Disclosure


By |2021-03-09T08:20:51+00:00March 9th, 2021|