Posted by malvuln on Feb 01

Discovery / credits: Malvuln – malvuln.com (c) 2022
Original source:
https://malvuln.com/advisory/f375f6569e146e432e23589b8f112165.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln

Threat: Backdoor.Win32.Wollf.m
Vulnerability: Weak Hardcoded Password
Description: The malware runs with SYSTEM integrity and listens on TCP port
9842. Authentication is required. However, the password “holybolt” is weak
and hardcoded in the PE…
Read More – Full Disclosure


By |2022-02-02T00:18:47-05:00February 2nd, 2022|