Posted by malvuln on Jan 25

Discovery / credits: Malvuln – malvuln.com (c) 2022
Original source:
https://malvuln.com/advisory/4087cffab90fa22c2882e2f97a467e8e.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln

Threat: Backdoor.Win32.Hanuman.b
Vulnerability: Unauthenticated Remote Command Execution
Description: The malware listens on TCP port 3333. Third-party attackers
who can reach an infected system can run any OS commands hijacking the
compromised host….
Read More – Full Disclosure


By |2022-01-25T13:18:45-05:00January 25th, 2022|