Posted by malvuln on Sep 28

Discovery / credits: Malvuln – malvuln.com (c) 2021
Original source:
https://malvuln.com/advisory/8dc8abc99c1e7908fe9d048a4e360960_B.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln

Threat: Backdoor.Win32.Hupigon.afjk
Vulnerability: Directory Traversal
Description: The malware deploys a Web server listening on TCP port 80.
Third-party attackers who can reach an infected host can read any file on
the system using “../”…
Read More – Full Disclosure


By |2021-09-28T13:18:56-04:00September 28th, 2021|