Posted by malvuln on May 18

Discovery / credits: Malvuln – malvuln.com (c) 2021
Original source:
https://malvuln.com/advisory/f60a8d71a822e0e485f22ada8f26c31e.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln

Threat: Backdoor.Win32.Psychward.c
Vulnerability: Unauthenticated Remote Command Execution
Description: The malware listens on TCP port 33777. Remote attackers who
can reach infected systems can execute commands made available by the
backdoor.
Type: PE32…
Read More – Full Disclosure


By |2021-05-19T03:19:04-04:00May 19th, 2021|