Posted by malvuln on Nov 09

Discovery / credits: Malvuln – malvuln.com (c) 2021
Original source:
https://malvuln.com/advisory/ee8990b5d076a7ed601a30eb677cc9be.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln

Threat: Email-Worm.Win32.Plexus.b
Vulnerability: Unauthenticated Remote Code Execution
Description: The malware listens on TCP ports 1250 (file write port) and
47435 (random FTP port). Third-party attackers who can reach infected
systems can use a socket…
Read More – Full Disclosure


By |2021-11-09T16:19:19-05:00November 9th, 2021|