Posted by malvuln on May 18

Discovery / credits: Malvuln – malvuln.com (c) 2021
Original source:
https://malvuln.com/advisory/4de6f4104a5fc2185164747a6fcf20ce.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln

Threat: Backdoor.Win32.Agent.lyw
Vulnerability: Remote Stack Buffer Overflow (UDP)
Description: The malware drops an executable named “aspimgr.exe” under
SysWOW64 dir, which listens on TCP port 80 and UDP port 53. Third-party
attackers who can…
Read More – Full Disclosure


By |2021-05-18T18:19:00-04:00May 18th, 2021|