Posted by malvuln on Apr 30
Discovery / credits: Malvuln – malvuln.com (c) 2021
Original source:
https://malvuln.com/advisory/509e3d4839688c6173980dfba22ebd55.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln
Threat: Backdoor.Win32.Agent.ggw
Vulnerability: Authentication Bypass
Description: The malware runs a built-in FTP server listening on one of
several random TCP ports like 32335, 27227, 27942, 14223, 14988, 11092.
Third-party attackers who can reach the…
– Read More – Full Disclosure