Posted by malvuln on Nov 21

Discovery / credits: Malvuln – (c) 2021
Original source:
Contact: malvuln13 () gmail com

Threat: Backdoor.Win32.Wollf.h
Vulnerability: Hardcoded Cleartext Password
Description: The malware listens on TCP port 7300 and runs with SYSTEM
integrity. Authentication is required for remote user access. However, the
password “grish5800” is…
Read More – Full Disclosure

By |2021-11-21T19:19:01-05:00November 21st, 2021|