Posted by malvuln on Apr 30

Discovery / credits: Malvuln – malvuln.com (c) 2021
Original source:
https://malvuln.com/advisory/7c92e59e776355734781bbf05571d0f0.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln

Threat: Backdoor.Win32.Agent.kte
Vulnerability: Remote Stack Buffer Overflow (UDP Datagram)
Description: The malware drops an executable named “aspimgr.exe” under
SysWOW64 dir, which listens on TCP port 80 and UDP port 53. Third-party
attackers…
Read More – Full Disclosure


By |2021-04-30T09:18:53-04:00April 30th, 2021|