Posted by malvuln on Apr 30

Discovery / credits: Malvuln – malvuln.com (c) 2021
Original source:
https://malvuln.com/advisory/c7763bae3376a9f2865a1a18e84c259e.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln

Threat: Backdoor.Win32.Agent.gmug
Vulnerability: Heap Corruption
Description: The malware listens on TCP port 33308, third-party attackers
who can reach the server can send a specially crafted payload causing a
heap corruption.
Type: PE32
MD5:…
Read More – Full Disclosure


By |2021-04-30T09:18:53-04:00April 30th, 2021|