Posted by malvuln on May 18
Discovery / credits: Malvuln – malvuln.com (c) 2021
Original source:
https://malvuln.com/advisory/a53351e8fa0cb4f7db3d0250387a0e4f.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln
Threat: Backdoor.Win32.Antilam.14.d
Vulnerability: Unauthenticated Remote Command Execution
Description: The malware listens on TCP ports 47891, 29559. Third party
attackers who can reach infected systems can execute commands made
available by the…
– Read More – Full Disclosure