Posted by malvuln on Mar 19

Discovery / credits: Malvuln – malvuln.com (c) 2021
Original source:
https://malvuln.com/advisory/f589ae5fb7879eb0b98fb8096d7152a5.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln

Threat: Backdoor.Win32.Agent.mzn
Vulnerability: Remote SEH Buffer Overflow
Description: Agent.mzn drops an executable named “aspimgr.exe” that runs
with SYSTEM integrity, listening on TCP port 80 and UDP 53. Attackers who
can reach the infected…
Read More – Full Disclosure


By |2021-03-19T17:18:45+00:00March 19th, 2021|