Posted by malvuln on May 11

Discovery / credits: Malvuln – malvuln.com (c) 2021
Original source:
https://malvuln.com/advisory/1ef711b34cc278449f1997e4ed06334a.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln

Threat: Backdoor.Win32.Antilam.13.a
Vulnerability: Unauthenticated Remote Command Execution
Description: The malware drops an executable named “scandisk.exe” that
listens on TCP ports 47891 and 29559. Third party attackers who can reach
infected…
Read More – Full Disclosure


By |2021-05-11T16:19:13-04:00May 11th, 2021|