Posted by malvuln on Jan 24

Discovery / credits: Malvuln – (c) 2022
Original source:
Contact: malvuln13 () gmail com

Threat: Backdoor.Win32.Wollf.16
Vulnerability: Weak Hardcoded Credentials
Description: The malware runs with SYSTEM integrity, listens on TCP port
1015 and is protected by Armadillo(3.00a-3.70a) & UPX(1.07)NRV,brute.
However, the password…
Read More – Full Disclosure

By |2022-01-24T20:19:05-05:00January 24th, 2022|