Posted by malvuln on Apr 30
Discovery / credits: Malvuln – malvuln.com (c) 2021
Original source:
https://malvuln.com/advisory/c1e92e04cdb432d83ea2610ef226d4cd.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln
Threat: Backdoor.Win32.Agent.oj
Vulnerability: Remote Stack Buffer Overflow
Description: The malware listens on TCP port 23. Third-party attackers can
send a specially crafted payload, triggering a classic stack buffer
overflow overwriting ECX, EIP…
– Read More – Full Disclosure