Posted by malvuln on Sep 28

Discovery / credits: Malvuln – malvuln.com (c) 2021
Original source:
https://malvuln.com/advisory/9576a6a59715a69be499fa41d6383a64.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln

Threat: Backdoor.Win32.Agent.aer
Vulnerability: Remote Denial of Service
Description: The malware listens on TCP port 1080. Third-party attackers
who can reach infected systems can send a specially crafted junk payload
for the logon credentials to trigger…
Read More – Full Disclosure


By |2021-09-28T12:19:43-04:00September 28th, 2021|