Posted by malvuln on Jan 24

Discovery / credits: Malvuln – malvuln.com (c) 2022
Original source:
https://malvuln.com/advisory/57bda78cc5fd6a06017148bae28e8e39.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln

Threat: Backdoor.Win32.Wisell
Vulnerability: Unauthenticated Remote Command Execution
Description: The malware listens on TCP port 5277. Third-party attackers
who can reach an infected system can run any OS commands further
compromising the host.
Type:…
Read More – Full Disclosure


By |2022-01-24T20:19:05-05:00January 24th, 2022|