Posted by malvuln on Aug 13

Discovery / credits: Malvuln – (c) 2021
Original source:
Contact: malvuln13 () gmail com

Threat: Backdoor.Win32.IRCBot.gen
Vulnerability: Hardcoded Weak Password
Description: The malware listens on TCP port 13013. Authentication is
required for remote user access. However, the password “sexjerx” is weak
and hardcoded in plaintext…
Read More – Full Disclosure

By |2021-08-13T17:19:05-04:00August 13th, 2021|