Posted by malvuln on May 25

Discovery / credits: Malvuln – (c) 2021
Original source:
Contact: malvuln13 () gmail com

Threat: Backdoor.Win32.Tonerok.d
Vulnerability: Unauthenticated Remote Command Execution
Description: The malware listens on TCP port 10002 and drops an
executable named “svchost.exe” under Windows dir. Third-party attackers who
can reach an…
Read More – Full Disclosure

By |2021-05-25T17:18:59-04:00May 25th, 2021|