Posted by malvuln on Jun 04

Discovery / credits: Malvuln – malvuln.com (c) 2021
Original source:
https://malvuln.com/advisory/bf60f5b5c901bab08484838447f1b85e.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln

Threat: Backdoor.Win32.Androm.df
Vulnerability: Unauthenticated Remote Command Execution
Description: The Androm.df malware listens on TCP port 8000. Third-party
attackers who can reach the system can execute OS commands recompromising
the already…
Read More – Full Disclosure


By |2021-06-04T17:19:31-04:00June 4th, 2021|