Posted by malvuln on May 18

Discovery / credits: Malvuln – malvuln.com (c) 2021
Original source:
https://malvuln.com/advisory/85f7ef2b6b8da9adb7723a13b91ac1c7_B.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln

Threat: Backdoor.Win32.Danton.43
Vulnerability: MITM Port Bounce Scan
Description: The backdoor FTP server listens on TCP port 6974, hardcoding
weak plaintext credentials within the executable. Third-party adversaries
who successfully logon can abuse…
Read More – Full Disclosure


By |2021-05-18T18:19:00-04:00May 18th, 2021|