www.malvuln.com
Open in
urlscan Pro
50.62.141.185
Public Scan
URL:
https://www.malvuln.com/
Submission: On June 01 via manual from FR — Scanned from FR
Submission: On June 01 via manual from FR — Scanned from FR
Form analysis
0 forms found in the DOMText Content
* Contact * About * PGP key * 29c02a6fe5c3d09ba32a9901a6824fb9 Malvuln Powered by malware TM Finding and exploiting vulnerable Malware. Download RansomLord v3 - Anti-Ransomware exploitation tool. Download Adversary3 - Malware vulnerability Intel Tool for third-party attackers By continuing to access this website you are agreeing to the full disclaimer below. TROJANSPY.WIN64.EMOTET.A Arbitrary Code Execution MD5: f917c77f60c3c1ac6dbbadbf366ddd30 MVID-2024-0684 BACKDOOR.WIN32.ASYNCRAT Arbitrary Code Execution MD5: 2337b9a12ecf50b94fc95e6ac34b3ecc MVID-2024-0683 PANEL.SMOKELOADER Cross Site Request Forgery (CSRF) - Persistent XSS MD5: 4b5fc3a2489985f314b81d35eac3560f MVID-2024-0682 PANEL.SMOKELOADER Cross Site Scripting (XSS) MD5: 4b5fc3a2489985f314b81d35eac3560f MVID-2024-0681 PANEL.AMADEY.D.C Cross Site Scripting (XSS) MD5: 50467c891bf7de34d2d65fa93ab8b558 MVID-2024-0680 BACKDOOR.WIN32.DUMADOR.C Remote Stack Buffer Overflow (SEH) MD5: 6cc630843cabf23621375830df474bc5 MVID-2024-0679 TROJAN.WIN32.RAZY.ABC Insecure Permissions (In memory IPC) MD5: 0eb4a9089d3f7cf431d6547db3b9484d MVID-2024-0678 BACKDOOR.WIN32.AGENT.JU Authentication Bypass RCE MD5: 0e6e40aad3e8d46e3c0c26ccc6ab94b3 MVID-2024-0677 RANSOM.WIN32.STOP (SMOKELOADER) Remote Code Execution (MITM) MD5: 3b9e9e130d52fe95c8be82aa4b8feb74 MVID-2024-0676 BACKDOOR.WIN32.EMEGRAB.B Remote Stack Buffer Overflow (SEH) MD5: 19a14d0414aec62ef38378de2e8b259d MVID-2024-0675 BACKDOOR.WIN32.BEASTDOOR.OQ Unauthenticated Remote Command Execution MD5: 6268df4c9c805c90725dde4fe5ef6fea MVID-2024-0674 BACKDOOR.WIN32.AGENT.AMT Authentication Bypass MD5: 2a442d3da88f721a786ff33179c664b7 MVID-2024-0673 BACKDOOR.WIN32.JEEMP.C Cleartext Hardcoded Credentials MD5: d6b192a4027c7d635499133ca6ce067f MVID-2024-0672 BACKDOOR.WIN32.AUTOSPY.10 Unauthenticated Remote Command Execution MD5: b012704cad2bae6edbd23135394b9127 MVID-2024-0671 BACKDOOR.WIN32.ARMAGEDDON.R Hardcoded Cleartext Credentials MD5: 68d135936512e88cc0704b90bb3839e0 MVID-2024-0670 TROJAN.WIN32 BANKSHOT Remote Stack Buffer Overflow (SEH) MD5: f2fd6a7b400782bb43499e722fb62cf4 MVID-2024-0669 TROJANSPY WIN32.NIVDORT Insecure Permissions - EoP (SYSTEM) MD5: 15bda00b57e2ed729a45f7cfa62165da MVID-2024-0668 BACKDOOR.WIN32 CARBANAK (ANUNAK) Named Pipe Null DACL MD5: b8e1e5b832e5947f41fd6ae6ef6d09a1 MVID-2024-0667 RANSOM.WIN64.ATOMSILO Crypto Logic Flaw MD5: 5559e9f5e1645f8554ea020a29a5a3ee MVID-2022-0666 BACKDOOR.WIN32.INCOMMANDER.17.B Hardcoded Cleartext Credentials MD5: dd76d8a5874bf8bf05279e35c68449ca MVID-2022-0665 TROJAN-DROPPER.WIN32.DECAY.DXV (CYBERGATE V1.00.0) Insecure Proprietary Password Encryption MD5: 618f28253d1268132a9f10819a6947f2 MVID-2022-0664 BACKDOOR.WIN32.DELF.GJ Information Disclosure MD5: 8872c2ec49ff3382240762a029631684 MVID-2022-0663 WIN32.RANSOM.CONTI Crypto Logic Flaw MD5: 99e55ce93392068c970384ab24a0e13d MVID-2022-0662 TROJAN.WIN32.DARKNEURON.GEN Named Pipe Null DACL MD5: d891c9374ccb2a4cae2274170e8644d8 MVID-2022-0661 BACKDOOR.WIN32.AUTOCRAT.B Weak Hardcoded Credentials MD5: 4262a8b52b902aa2e6bf02a156d1b8d4 MVID-2022-0660 BACKDOOR.WIN32.SERMAN.A Unauthenticated Open Proxy MD5: f312e3a436995b86b205a1a37b1bf10f MVID-2022-0659 BACKDOOR.WIN32.OBLIVION.01.A Insecure Transit Password Disclosure MD5: aef85cf0d521eaa6aade11f95ea07ebe MVID-2022-0658 TROJAN.WIN32.PLATINUM.GEN Arbitrary Code Execution MD5: 71a76adeadc7b51218d265771fc2b0d1 MVID-2022-0657 BACKDOOR.WIN32.QUUX Weak Hardcoded Credentials MD5: 13ce53de9ca4c4e6c58f990b442cb419 MVID-2022-0656 BACKDOOR.WIN32.REMSERV.D Unauthenticated Remote Command Execution MD5: 05a082d441d9cf365749c0e1eb904c85 MVID-2022-0655 HEUR:TROJAN.MSIL.AGENT.GEN Information Disclosure MD5: bc2ccf92bea475f828dcdcb1c8f6cc92 MVID-2022-0654 BACKDOOR.WIN32.APHEXDOOR.LITESOCK Remote Stack Buffer Overflow (SEH) MD5: 2047ac6183da4dfb61d2562721ba0720 MVID-2022-0653 EMAIL-WORM.WIN32.KIPIS.C Remote File Write Code Execution MD5: 8d0df60c96e4011c312d61ed3e6dc70e MVID-2022-0652 BACKDOOR.WIN32.PSYCHWARD.10 Unauthenticated Remote Command Execution MD5: 70c5f8d61f6ac67091c0c5860e456427 MVID-2022-0651 BACKDOOR.WIN32.DELF.ARH Authentication Bypass MD5: b3b19524967d22d6eb7517b03b660b00 MVID-2022-0650 BACKDOOR.WIN32.REDKOD.D Weak Hardcoded Credentials MD5: bb309bdd071d5733efefe940a89fcbe8 MVID-2022-0649 BACKDOOR.WIN32.DARKSKY.23 Remote Stack Buffer Overflow (SEH) MD5: 1164ef21ef2af97e0339359c0dce5e7d MVID-2022-0648 BACKDOOR.WIN32.DELF.EG Unauthenticated Remote Command Execution MD5: de6220a8e8fcbbee9763fb10e0ca23d7 MVID-2022-0647 BACKDOOR.WIN32.NTRC Weak Hardcoded Credentials MD5: 273fd3f33279cc9c0378a49cf63d7a06 MVID-2022-0646 BACKDOOR.WIN32.PSYCHWARD.B Weak Hardcoded Credentials MD5: 0b8cf90ab9820cb3fcb7f1d1b45e4e57 MVID-2022-0645 BACKDOOR.WIN32.AUGUDOR.B Remote File Write Code Execution MD5: 94ccd337cbdd4efbbcc0a6c888abb87d MVID-2022-0644 BACKDOOR.WIN32.BINGLE.B Weak Hardcoded Credentials MD5: eacaa12336f50f1c395663fba92a4d32 MVID-2022-0643 BACKDOOR.WIN32.HELLZA.120 Authentication Bypass MD5: 2cbd0fcf4d5fd5fb6c8014390efb0b21 MVID-2022-0642 BACKDOOR.WIN32.HELLZA.120 Unauthorized Remote Command Execution MD5: 2cbd0fcf4d5fd5fb6c8014390efb0b21 MVID-2022-0641 TROJAN.RANSOM.RYUK.A Arbitrary Code Execution MD5: 5ac0f050f93f86e69026faea1fbb4450 MVID-2022-0640 TROJAN-DROPPER.WIN32.CORTY.10 Insecure Credential Storage MD5: f72138e574743640bdcdb9f102dff0a5 MVID-2022-0639 TROJAN.WIN32.AUTOIT.FHJ Named Pipe Null DACL MD5: d871836f77076eeed87eb0078c1911c7 MVID-2022-0638 TROJAN.WIN32.AUTOIT.FHJ Insecure Permissions MD5: d871836f77076eeed87eb0078c1911c7 MVID-2022-0637 TROJAN-RANSOM.WIN32.HIVE.BV Arbitrary Code Execution MD5: 44aba241dd3f0d156c6ed82a0ab3a9e1 MVID-2022-0636 TROJAN-SPY.WIN32.POPHOT.BSL Insecure Permissions MD5: 8c0e6ec6b8ac9eb1169e63df71f24456 MVID-2022-0635 BACKDOOR.WIN32.HUPIGON.ASPG Insecure Service Path MD5: 121bf601275e2aed0c3a6fe7910f9826 MVID-2022-0634 BACKDOOR.WIN32.WINSHELL.5_0 Weak Hardcoded Credentials MD5: 5bc5f72d19019a2fa3b75896e82ae1e5 MVID-2022-0633 WIN32.RANSOM.BLUESKY Arbitrary Code Execution MD5: 961fa85207cdc4ef86a076bbff07a409 MVID-2022-0632 BACKDOOR.WIN32.GUPTACHAR.20 Insecure Credential Storage MD5: 857999d2306f257b80d1b8f6a51ae8b0 MVID-2022-0631 BACKDOOR.WIN32.BUSHTROMMEL.122 Unauthenticated Remote Command Execution MD5: 76c09bc82984c7f7ef55eb13018e0d87 MVID-2022-0630 BACKDOOR.WIN32.BUSHTROMMEL.122 Authentication Bypass MD5: 76c09bc82984c7f7ef55eb13018e0d87 MVID-2022-0629 BACKDOOR.WIN32.JOKERDOOR Remote Stack Buffer Overflow MD5: 783a191e7944e1af84ec0fa96d933f30 MVID-2022-0628 BACKDOOR.WIN32.DESTRUKOR.20 Unauthenticated Remote Command Execution MD5: c790749f851d48e66e7d59cc2e451956 MVID-2022-0627 BACKDOOR.WIN32.DESTRUKOR.20 Authentication Bypass MD5: c790749f851d48e66e7d59cc2e451956 MVID-2022-0626 BACKDOOR.WIN32.ECLIPSE.H Weak Hardcoded Credentials MD5: 8b470931114527b4dce42034a95ebf46 MVID-2022-0625 BUILDER XTREMERAT V3.7 Insecure Crypto Bypass MD5: 7f314e798c150aedd9ce41ed39318f65 MVID-2022-0624 BUILDER XTREMERAT V3.7 Insecure Permissions MD5: 7f314e798c150aedd9ce41ed39318f65 MVID-2022-0623 BACKDOOR.WIN32.HONEYPOT.A Weak Hardcoded Password MD5: e3bb503f9b02cf57341695f30e31128f MVID-2022-0622 RANSOM LOCKBIT 3.0 Code Execution MD5: 38745539b71cf201bb502437f891d799 MVID-2022-0621 RANSOM LOCKBIT 3.0 Local Unicode Buffer Overflow (SEH) MD5: 38745539b71cf201bb502437f891d799 MVID-2022-0620 BACKDOOR.WIN32.EVILGOAT.B Weak Hardcoded Credentials MD5: 20daf01e941f966b21a7ae431faefc65 MVID-2022-0619 BACKDOOR.WIN32.COREDOOR.10.A Authentication Bypass MD5: 49da40a2ac819103da9dc5ed10d08ddb MVID-2022-0618 BACKDOOR.WIN32.CAFEINI.B Weak Hardcoded Credentials MD5: a8fc1b3f7a605dc06a319bf0e14ca68b MVID-2022-0617 TROJAN-MAILFINDER.WIN32.VB.P Insecure Permissions MD5: 20e438d84aa2828826d52540d80bf7f MVID-2022-0616 BACKDOOR.WIN32.SHARK.BTU Insecure Permissions MD5: 5a83f8b8c8a8b7a85b3ff632aa60e793 MVID-2022-0615 BACKDOOR.WIN32.INFECDOOR.17.C Insecure Permissions MD5: 1fd70e41918c3a75c634b1c234ec36fb MVID-2022-0614 YASHMA RANSOMWARE BUILDER V1.2 Insecure Permissions MD5: 13e878ed7e547523cffc5728f6ba4190 MVID-2022-0613 BACKDOOR.WIN32.CABROTOR.10.D Unauthenticated Remote Command Execution MD5: 40acf109fa9621eae6930ef18f804909 MVID-2022-0612 TROJAN-BANKER.WIN32.BANBRA.CYT Insecure Permissions MD5: e0f2bee25dd103d92e91e895e313ec34 MVID-2022-0611 TROJAN-PROXY.WIN32.SYMBAB.O Heap Corruption MD5: bffc519fbaf2d119bd307cd22368cdc7 MVID-2022-0610 RANSOM.HARON Code Execution MD5: dedad693898bba0e4964e6c9a749d380 MVID-2022-0609 TROJAN-BANKER.WIN32.BANKER.AGZG Insecure Permissions MD5: ef1e59148c9a902ae5454760aaab73fe MVID-2022-0608 TROJAN-RANSOM.THANOS Code Execution MD5: be60e389a0108b2871dff12dfbb542ac MVID-2022-0607 RANSOM.CONTI Code Execution MD5: eedd1cfc7acd012bbec464aebc679ee4 MVID-2022-0606 RANSOM.CONTI Code Execution MD5: 146ec3f6c262d0f287e67ddb3cc69892 MVID-2022-0605 RANSOM.CONTI Code Execution MD5: 0c4502d6655264a9aa420274a0ddeaeb MVID-2022-0604 RANSOM.CONTI Code Execution MD5: 6748dfe8e64dea2fc4c14691f7e766c6 MVID-2022-0603 RANSOM.CONTI Code Execution MD5: 7ba20fce7ac259f6062f73290c2e28cf MVID-2022-0602 RANSOM.CONTI Code Execution MD5: b485c36f28c5c967a50001c9e8d2c29c MVID-2022-0601 RANSOM.REVIL Code Execution MD5: daab2c9d58acc367032f32bb8097e310 MVID-2022-0600 RANSOM.REVIL Code Execution MD5: ab1aaa8f96c61684736da00ece5a9c83 MVID-2022-0599 RANSOM.REVIL Code Execution MD5: c9bf7216cdc2673bf4ee2af8b19bcfc8 MVID-2022-0598 RANSOM.REVIL Code Execution MD5: 7ff073cc9e4e6750ba52135ba02ee531 MVID-2022-0597 RANSOM.REVIL Code Execution MD5: 8ca35b7867e23a1bbb0fea6d51fc1b61 MVID-2022-0596 RANSOM.REVIL Code Execution MD5: 7a96d7a1f28bfb6ae36a15263a8a7135 MVID-2022-0595 APT28 FANCYBEAR Code Execution MD5: d6751b148461e0f863548be84020b879 MVID-2022-0594 RANSOM.SATANA Code Execution MD5: 46bfd4f1d581d7c0121d2b19a005d3df MVID-2022-0593 RANSOM.CONTI Code Execution MD5: 20f0c736a966142de88dee06a2e4a5b1 MVID-2022-0592 RANSOM.PETYA Code Execution MD5: 8ed9a60127aee45336102bf12059a850 MVID-2022-0591 RANSOM.CRYAKL Code Execution MD5: 2aea3b217e6a3d08ef684594192cafc8 MVID-2022-0590 TROJAN-RANSOM.RADAMANT Code Execution MD5: 6152709e741c4d5a5d793d35817b4c3d MVID-2022-0589 TROJAN.CRYPTOLOCKER Code Execution MD5: 209a288c68207d57e0ce6e60ebf60729 MVID-2022-0588 TROJAN-RANSOM.LOCKERGOGA Code Execution MD5: 3b200c8173a92c94441cb062d38012f6 MVID-2022-0587 RANSOM.CTBLOCKER Code Execution MD5: de25f04dedaffde1be47ef26dc9a8176 MVID-2022-0586 TROJAN-RANSOM.CERBER Code Execution MD5: ae99e6a451bc53830be799379f5c1104 MVID-2022-0585 TROJAN.RANSOM.CRYPTOWALL Code Execution MD5: 0CFFEE266A8F14103158465E2ECDD2C1 MVID-2022-0584 REVIL.RANSOM Code Execution MD5: 4c5c1731481ea8d67ef6076810c49e00 MVID-2022-0583 RANSOM.WANNACRY Code Execution MD5: 84c82835a5d21bbcf75a61706d8ab549 MVID-2022-0582 REVIL.RANSOM Code Execution MD5: 979635229dfcfae1aae74ae296ec78c8 MVID-2022-0581 RANSOM.CONTI Code Execution MD5: 3c55ee6753408bff2e3e6a392ed9f2a0 MVID-2022-0580 CONTI.RANSOM Code Execution MD5: 710a77804637f65e22a2e230ff6444f9 MVID-2022-0579 REDLINE.STEALER Code Execution MD5: 0adb0e2ac8aa969fb088ee95c4a91536 MVID-2022-0578 REVIL RANSOM Code Execution MD5: 7d7ee58c2696794b3be958b165eb61a9 MVID-2022-0577 CONTI RANSOM Code Execution MD5: 9eb9197cd58f4417a27621c4e1b25a71 MVID-2022-0576 LOKILOCKER RANSOM Code Execution MD5: 2ffc2446a2a6cf04c06a85deb43b9fb8 MVID-2022-0575 BLACKBASTA RANSOM Code Execution MD5: 998022b70d83c6de68e5bdf94e0f8d71 MVID-2022-0574 RANSOM.AVOSLOCKER Code Execution MD5: 40f2238875fcbd2a92cfefc4846a15a8 MVID-2022-0573 RANSOM.LOCKBIT DLL Hijacking MD5: 96de05212b30ec85d4cf03386c1b84af MVID-2022-0572 BACKDOOR.WIN32.AGENT.AEGG Weak Hardcoded Credentials MD5: 58be35e792476d1c015df7853112d200 MVID-2022-0571 TROJAN-DOWNLOADER.WIN32.AGENT Insecure Permissions MD5: fb3ac3c9d808de7f4b5ede68715f658f MVID-2022-0570 BACKDOOR.WIN32.CAFEINI.B Port Bounce Scan MD5: 851f8945d1b5923990f4722d627156a0 MVID-2022-0569 BACKDOOR.WIN32.CAFEINI.B Weak Hardcoded Credentials MD5: 851f8945d1b5923990f4722d627156a0 MVID-2022-0568 TROJAN-DOWNLOADER.WIN32.SMALL.AHLQ Insecure Permissions MD5: d859ba54086fd0313dc34b73b5b1eccb MVID-2022-0567 BACKDOOR.WIN32.GF.J Unauthenticated Remote Command Execution MD5: fa00524d7289cdba327d5c34ab3d9bd7 MVID-2022-0566 VIRUS.WIN32.QVOD.B Insecure Permissions MD5: c44a9580e17bad0aa27329e51b7d0ae0 MVID-2022-0565 EMAIL-WORM.WIN32.SIDEX Unauthenticated Remote Command Execution MD5: a98cdaa89da57bf269873db63e22a939 MVID-2022-0564 NET-WORM.WIN32.KIBUV.C Authentication Bypass MD5: 4243911d5ca5655d04de8895704fcae6 MVID-2022-0563 BACKDOOR.WIN32.JOKERDOOR Remote Stack Buffer Overflow MD5: 94d1b2510bf96fa6190cd65876bf4c38 MVID-2022-0562 TROJAN-BANKER.WIN32.BANKER.HEQ Insecure Permissions MD5: f15d05f74899324ecb61ee29ad162fad MVID-2022-0561 BACKDOOR.WIN32.GATEHELL.21 Port Bounce Scan MD5: 5aa81ddc996be64116754efac0e4f55d MVID-2022-0560 BACKDOOR.WIN32.GATEHELL.21 Authentication Bypass MD5: 5aa81ddc996be64116754efac0e4f55d MVID-2022-0559 BACKDOOR.WIN32.PSYCHWARD.03.A Weak Hardcoded Password MD5: 4b9a42ca1e65cf0a7febbe18f397ef24 MVID-2022-0558 BACKDOOR.WIN32.HUPIGON.HAQJ Insecure Service Path MD5: d9542df20f8df457747451dd9e16d1c0 MVID-2022-0557 BACKDOOR.WIN32.DELF.ZN Insecure Credential Storage MD5: 9acdbfc9f7c1f6e589485b30aa91bfd2 MVID-2022-0556 TROJAN.WIN32.TSCASH.C Insecure Permissions MD5: 9d18d318e017b513b9c6cd193ccdc6ff MVID-2022-0555 BACKDOOR.WIN32.LOSELOVE Denial of Service MD5: 9a8150938bff3a17fa0169c3dc6dae85 MVID-2022-0554 HACKTOOL.WIN32.DELF.VS Insecure Credential Storage MD5: 92f7f9495ffd56d05a5acf395c9e0097 MVID-2022-0553 BACKDOOR.WIN32.NINJASPY.C Authentication Bypass MD5: 9f39606d9e19771af5acc6811ccf557f MVID-2022-0552 BACKDOOR.WIN32.NETSPY.10 Unauthenticated Remote Command Execution MD5: 45d413b46f1d14a45e8fd36921813d62 MVID-2022-0551 BACKDOOR.WIN32.NETCAT32.10 Unauthenticated Remote Command Execution MD5: dcf16aed5ad4e0058a6cfcc7593dd9e3 MVID-2022-0550 HACKTOOL.WIN32.IPCSCAN.C Local Stack Buffer Overflow MD5: 8f44374d587eb1657d25da9628cb2b87 MVID-2022-0549 BACKDOOR.WIN32.PSYCHWARD.03.A Weak Hardcoded Password MD5: d069738f18957117367b8a79195a6a96 MVID-2022-0548 EMAIL-WORM.WIN32.PLUTO.B Insecure Permissions MD5: 60a7d5e2d446110d84ef65f6a37af0eb MVID-2022-0547 DENIAL OF SERVICE (UDP DATAGRAM) Backdoor.Win32.Kilo.016 MD5: 9ede6951ea527f96a785c5e32b5079e6 MVID-2022-0546 BACKDOOR.WIN32.PRORAT.CWX Insecure Permissions MD5: 2d81bf2c55c81778533b55fb444d4dc6 MVID-2022-0545 BACKDOOR.WIN32.MOTIVFTP.12 Authentication Bypass MD5: 91b2d216c5d26d9db4289acf68fa1743 MVID-2022-0544 BACKDOOR.WIN32.XLOG.21 Authentication Bypass Race Condition MD5: 2906b5dc5132dd1319827415e837168f MVID-2022-0543 BACKDOOR.WIN32.XINGDOOR Denial of Service MD5: 89000e259ffbd107b7cc9bac66dcdcf5 MVID-2022-0542 BACKDOOR.WIN32.WISELL Stack Buffer Overflow (SEH) MD5: 837ec70bfb305b5c862ff9b04e70a318 MVID-2022-0541 BACKDOOR.WIN32.FTP.LANA.01.D Port Bounce Scan MD5: ea9ab5983a6fa71e31907e74d4ddbab6 MVID-2022-0540 BACKDOOR.WIN32.FTP.LANA.01.D Weak Hardcoded Credentials MD5: ea9ab5983a6fa71e31907e74d4ddbab6 MVID-2022-0539 BACKDOOR.WIN32.VERIFY.H Unauthenticated Remote Command Execution MD5: 82641dabbb1f73dd775e200466a07ec1 MVID-2022-0538 BACKDOOR.WIN32.PTAKKS.XP.A Insecure Credential Storage MD5: e087725b01dded75d85a20db58335fa8 MVID-2022-0537 BACKDOOR.WIN32.WISELL Unauthenticated Remote Command Execution MD5: 837ec70bfb305b5c862ff9b04e70a318 MVID-2022-0536 BACKDOOR.WIN32.BIFROSE.UW Insecure Permissions MD5: 9e4f942c60044feef0fb48538ffac383 MVID-2022-0535 BACKDOOR.WIN32.EASYSERV.11.C Insecure Transit MD5: 3b5564e88a0b8a41e4fd730891e635cc MVID-2022-0534 BACKDOOR.WIN32.TINY.A Uauthenticated Remote Command Execution MD5: 9fa664bc52e1aa46a09ac51aaa6c7384 MVID-2022-0533 BACKDOOR.WIN32.DELF.PS Information Disclosure MD5: cf3c08afa6c2d49ba36ed0f895893d71 MVID-2022-0532 BACKDOOR.WIN32.JOKERDOOR Weak Hardcoded Credentials MD5: a6437375fff871dff97dc91c8fd6259f MVID-2022-0531 BACKDOOR.WIN32.WOLLF.H Unauthenticated Remote Command Execution MD5: 867c6b432ccd4aa51adc5e2722a4b144 MVID-2022-0530 BACKDOOR.WIN32.AVSTRAL.E Unauthenticated Remote Command Execution MD5: 35f0d754f161af35241cb081c73ea6dd MVID-2022-0529 BACKDOOR.WIN32.CHUBO.C Cross Site Scripting (XSS) MD5: c16b04a9879896ef453a6deb13528087 MVID-2022-0528 BACKDOOR.WIN32.CHUBO.C Unauthenticated Remote Command Execution MD5: c16b04a9879896ef453a6deb13528087 MVID-2022-0527 BACKDOOR.WIN32.CAFEINI.B Weak Hardcoded Credentials MD5: b24c56abb4bde960c2d51d4e509d2c68 MVID-2022-0526 BACKDOOR.WIN32.CAFEINI.B Denial of Service MD5: b24c56abb4bde960c2d51d4e509d2c68 MVID-2022-0525 BACKDOOR.WIN32.CYN.20 Insecure Permissions MD5: 3dd1da64e306cae0409e154e15dd1b80 MVID-2022-0524 BACKDOOR.WIN32.BIRDSPY.B Weak Hardcoded Credentials MD5: eba3dd81723ddf33621fd85ded577920 MVID-2022-0523 BACKDOOR.WIN32.AGENT.BXXN Open Proxy MD5: dcbc237f21839a6514c8321d5fa631a4 MVID-2022-0522 BUILDERREVENGERAT - (REVENGE-RAT V0.3) XML External Entity Injection MD5: 531d8b4ac8f7eb827d62424169321b2b MVID-2022-0521 BUILDERTORCTPHPRAT.B Remote Persistent XSS MD5: 838f67d7a4b6824ec59892057aab3bb7 MVID-2022-0520 BUILDERTORCTPHPRAT.B Arbitrary File Upload - RCE MD5: 838f67d7a4b6824ec59892057aab3bb7 MVID-2022-0519 BUILDERTORCTPHPRAT.B Insecure Credential Storage MD5: 838f67d7a4b6824ec59892057aab3bb7 MVID-2022-0518 BUILDERPANDORARAT.B Insecure Credential Storage MD5: ae4a409d217bbd538009fbbb5457e754 MVID-2022-0517 BUILDERORCUS Insecure Credential Storage MD5: cc3670f1b3e60e00b43c86d787563a44 MVID-2022-0516 BUILDERORCUS Insecure Permissions MD5: cc3670f1b3e60e00b43c86d787563a44 MVID-2022-0515 HADES RAT - WEB PANEL Remote Persistent XSS MD5: c4cc1317aea42f7dd4a1b786c5278a24 MVID-2022-0514 HADES RAT - WEB PANEL Information Disclosure MD5: c4cc1317aea42f7dd4a1b786c5278a24 MVID-2022-0513 HADES RAT - WEB PANEL Insecure Credential Storage MD5: c4cc1317aea42f7dd4a1b786c5278a24 MVID-2022-0512 REDLINE.MAINPANEL - CRACKED.EXE Insecure Permissions MD5: baf102927947289e4d589028620ce291 MVID-2022-0511 LOKI RAT (RELAPSE) WEB PANEL SQL Injection MD5: aabb54951546132e70a8e9f02bf8b5ba MVID-2022-0510 LOKI RAT (RELAPSE) WEB PANEL Directory Traversal - Arbitrary File Deletion MD5: aabb54951546132e70a8e9f02bf8b5ba MVID-2022-0509 BACKDOOR.WIN32.DIRECTCONNECTION.103 Weak Hardcoded Password MD5: 6a6ce3e7f24bf000d9a011a8f1905da8 MVID-2022-0508 BACKDOOR.WIN32.REMOTENC.BETA4 Unauthenticated Remote Command Execution MD5: 2862de561d91eedb265df4ae9b0fc872 MVID-2022-0507 BACKDOOR.WIN32.BLUANWEB Unauthenticated Remote Command Execution MD5: 30903ccbc6747c0da5a2775884b78def MVID-2022-0506 BACKDOOR.WIN32.BLUANWEB Information Disclosure MD5: 0903ccbc6747c0da5a2775884b78def MVID-2022-0505 BACKDOOR.WIN32.BLUANWEB Unauthenticated Remote Code Execution MD5: 30903ccbc6747c0da5a2775884b78def MVID-2022-0504 BACKDOOR.WIN32.FTP.NUCLEAR.10 Hardcoded Credentials MD5: 9c23dad9ba11305fecf38bed46b0cec2 MVID-2022-0503 BACKDOOR.WIN32.BNLITE Remote Stack Buffer Overflow MD5: 0d1f873f6816debd244e1e77509f6ba7 MVID-2022-0502 BACKDOOR.WIN32.AUGUDOR.A Unauthenticated Remote File Write - RCE MD5: bf1b1a2f4be78d6b62ed7c316c77a9a1 MVID-2022-0501 BACKDOOR.WIN32.FTP.ICS Port Bounce Scan (MITM) MD5: 584bc06128469423f9e50e8a359d18ac MVID-2022-0500 BACKDOOR.WIN32.FTP.ICS Unauthenticated Remote Command Execution MD5: 584bc06128469423f9e50e8a359d18ac MVID-2022-0499 BACKDOOR.WIN32.FTP.ICS Authentication Bypass MD5: 584bc06128469423f9e50e8a359d18ac MVID-2022-0498 BACKDOOR.WIN32.ACROPOLIS.10 Insecure Permissions MD5: c3e2bbe5dca96687422f2b4e8c80f4ce MVID-2022-0497 BACKDOOR.WIN32.DSOCKS.10 Hardcoded Cleartext Password MD5: 3a505e7ea1beee556860488e34db8da6 MVID-2022-0496 BACKDOOR.WIN32.AGENT.BAOL Insecure Permissions MD5: 1f84a5305b65d7f6aa3afa7e2f2bda0e MVID-2022-0495 TROJAN.WIN32.COSMU.ABIX Insecure Permissions MD5: b4638a10f7cfdbf39b9fef7539c63852 MVID-2022-0494 TROJAN-SPY.WIN32.ZBOT.AAWO.ZEUS-BUILDER Insecure Permissions MD5: fe0dacbc953d4301232b386fcb3afc23 MVID-2022-0493 BACKDOOR.WIN32.PROSTI.B Insecure Permissions MD5: 8201ba6b542fc91c004110b2fc5395aa MVID-2022-0492 EMAIL-WORM.WIN32.LAMA Insecure Permissions MD5: 1c255ef6fd44877700867f94a59875d2 MVID-2022-0491 BACKDOOR.WIN32.PRORAT.LKT Weak Hardcoded Password MD5: 65a53a37843db2b86a67a9e23277c1bf MVID-2022-0490 BACKDOOR.WIN32.ZOMBAM.B Cross Site Scripting (XSS) MD5: 1e3665a67201209609ae493a2a590bee MVID-2022-0489 BACKDOOR.WIN32.ZOMBAM.B Unauthenticated Information Disclosure MD5: 1e3665a67201209609ae493a2a590bee MVID-2022-0488 BACKDOOR.WIN32.ZOMBAM.B Remote Stack Buffer Overflow MD5: 1e3665a67201209609ae493a2a590bee MVID-2022-0487 BACKDOOR.WIN32.FREDDY.2001 Authentication Bypass Command Execution MD5: 434923afc32a7bc7355ed9a5224b9273 MVID-2022-0486 BACKDOOR.WIN32.PREXOT.A Port Bounce Scan (MITM) MD5: 29bc048d58ab8038c7001ef0d5e69c9b MVID-2022-0485 BACKDOOR.WIN32.PREXOT.A Authentication Bypass MD5: 29bc048d58ab8038c7001ef0d5e69c9b MVID-2022-0484 BACKDOOR.WIN32.WDOOR.11 Unauthenticated Remote Command Execution MD5: 55822613e0d0f437f3ebe5c7f4155452 MVID-2022-0483 BACKDOOR.WIN32.XRAT.K Unauthenticated Remote Command Execution MD5: 3d4350282ae043177063de2ad4827b97 MVID-2022-0482 BACKDOOR.WIN32.FRAUDER.JT Insecure Permissions MD5: 16fab35b51f9e6447f2a8c04db4ebe93 MVID-2022-0481 BACKDOOR.WIN32.SMALL.ER Unauthenticated Remote Command Execution MD5: 9f11868c3beaa8e2c1f5c193f5888b85 MVID-2022-0480 BACKDOOR.WIN32.SMALL.BU (KGB- RAT SERVER V0.1) Unauthenticated Remote Command Execution MD5: 36ca28db068b6f6634d633fe61d34a7d MVID-2022-0479 BACKDOOR.WIN32.ZXMAN Unauthenticated Remote Code Execution MD5: e369bbd8acbe8322834e3adbad30ff5c MVID-2022-0478 BACKDOOR.WIN32.WOLLF.M Weak Hardcoded Password MD5: f375f6569e146e432e23589b8f112165 MVID-2022-0477 BACKDOOR.WIN32.TINY.C Unauthenticated Remote Command Execution MD5: c61733c6bcbbb11cee634e0a3fd672e9 MVID-2022-0476 HACKTOOL.WIN32.MUZZER.A Heap Based Buffer Overflow MD5: c9291c93fce757a665352567ca13ec3f MVID-2022-0475 BACKDOOR.WIN32.WINSHELL.50 Weak Hardcoded Password MD5: 1fd45364073a81ddd707d74ba5d4c121 MVID-2022-0474 COSANOSTRA BUILDER WEBPANEL Cross Site Request Forgery (CSRF) MD5: 61285c988de52b7c067fb2e703f2ab83 MVID-2022-0473 COSANOSTRA BUILDER WEBPANEL Insecure Crypto MD5: 61285c988de52b7c067fb2e703f2ab83 MVID-2022-0472 COSANOSTRA BUILDER Insecure Permissions MD5: 61285c988de52b7c067fb2e703f2ab83 MVID-2022-0471 BACKDOOR.WIN32.DRA.C Weak Hardcoded Password MD5: 5ff832ce6af4b03a709eaf380672cf34 MVID-2022-0470 BACKDOOR.WIN32.FTP.LANA.01.D Port Bounce Scan (MITM) MD5: fc100ff65f676a26293915407adc211c MVID-2022-0469 BACKDOOR.WIN32.FTP.LANA.01.D Weak Hardcoded Password MD5: fc100ff65f676a26293915407adc211c MVID-2022-0468 BACKDOOR.WIN32.HANUMAN.B Unauthenticated Remote Command Execution MD5: 4087cffab90fa22c2882e2f97a467e8e MVID-2022-0467 BACKDOOR.WIN32.FTP99 Port Bounce Scan (MITM) MD5: 09dd14d3988e08a56798b1480c55a5b0 MVID-2022-0466 BACKDOOR.WIN32.FTP99 Authentication Bypass Race Condition MD5: 09dd14d3988e08a56798b1480c55a5b0 MVID-2022-0465 BACKDOOR.WIN32.AGENT.UQ Insecure Permissions MD5: b83836d7e6b0893e08d88a7850ca84ee MVID-2022-0464 BACKDOOR.WIN32.WOLLF.16 Weak Hardcoded Credentials MD5: 204613443e555f73237ea43a2faecaa5 MVID-2022-0463 BACKDOOR.WIN32.WOLLF.16 Authentication Bypass MD5: 204613443e555f73237ea43a2faecaa5 MVID-2022-0462 RANSOMWARE BUILDER BABUK Insecure Permissions MD5: 5dfa998f62612e10d5d28d26948dd50f MVID-2022-0461 BACKDOOR.WIN32.WISELL Unauthenticated Remote Command Execution MD5: 57bda78cc5fd6a06017148bae28e8e39 MVID-2022-0460 COLLECTORSTEALERBUILDER V2.0.0 PANEL Man-in-the-Middle (MITM) MD5: 54530f88c8e4f4371c9418f00c256b1d MVID-2022-0459 COLLECTORSTEALERBUILDER V2.0.0 PANEL Insecure Credential Storage MD5: 54530f88c8e4f4371c9418f00c256b1d MVID-2022-0458 VULTURIBUILDER Insecure Permissions MD5: ca294b2f778abc14fef6313b3cea7155 MVID-2022-0457 CHAOS RANSOMEWARE BUILDER V4 Insecure Permissions MD5: 8b855e56e41a6e10d28522a20c1e0341 MVID-2022-0456 AGENTTESLA BUILDER WEB PANEL SQL Injection MD5: db9629508fda139f71f625d764c7eff7 MVID-2022-0455 AGENTTESLA BUILDER WEB PANEL Cross Site Scripting (XSS) MD5: db9629508fda139f71f625d764c7eff7 MVID-2022-0454 WIN32.MARSSTEALER WEB PANEL Unauthenticated Remote Data Deletion MD5: 8abb41f6e7010d70c90f65fd9a740faa MVID-2022-0453 WIN32.MARSSTEALER WEB PANEL Unauthenticated Remote Persistent XSS MD5: 8abb41f6e7010d70c90f65fd9a740faa MVID-2022-0452 WIN32.MARSSTEALER WEB PANEL Unauthenticated Remote Information Disclosure MD5: 8abb41f6e7010d70c90f65fd9a740faa MVID-2022-0451 AB STEALER WEB PANEL Unauthenticated Remote Persistent XSS MD5: 9e44c10307aa8194753896ecf8102167 MVID-2022-0450 BACKDOOR.WIN32.CONTROLIT.10 Unauthenticated Remote Command Execution MD5: 859aab793a42868343346163bd42f485 MVID-2022-0449 BACKDOOR.WIN32.SUBSEVEN.C Remote Stack Buffer Overflow MD5: bc7f4c4689f1b8ad395404d1e75c776f MVID-2022-0448 BACKDOOR.WIN32.SVC Directory Traversal MD5: 011961a42700e7385a106d362eb661c7 MVID-2022-0447 BACKDOOR.WIN32.SVC Remote Stack Buffer Overflow MD5: 011961a42700e7385a106d362eb661c7 MVID-2022-0446 BACKDOOR.WIN32.DSKLITE.A Insecure Transit MD5: 6c9665de78ae60a8e057d2c9cdb91596 MVID-2022-0445 BACKDOOR.WIN32.DSKLITE.A Remote Denial of Service MD5: 6c9665de78ae60a8e057d2c9cdb91596 MVID-2022-0444 BACKDOOR.WIN32.JTRAM.A Port Bounce Scan MD5: 596882dfba543b23ad3225d24ee5e800 MVID-2022-0443 BACKDOOR.WIN32.JTRAM.A Insecure Credential Storage MD5: 596882dfba543b23ad3225d24ee5e800 MVID-2022-0442 BACKDOOR.WIN32.SILENTSPY.10 Authentication Race Condition MD5: a7ce38e60cf08f2b234f34043b87e701 MVID-2021-0441 BACKDOOR.WIN32.SILENTSPY.10 Authentication Bypass Command Execution MD5: a7ce38e60cf08f2b234f34043b87e701 MVID-2021-0440 BACKDOOR.WIN32.FANTADOR Insecure Password Storage MD5: a1d045151c809535a308311931588fd0 MVID-2021-0439 BACKDOOR.WIN32.FANTADOR Divide by Zero DoS MD5: a1d045151c809535a308311931588fd0 MVID-2021-0438 BACKDOOR.WIN32.SKRAT Cleartext Hardcoded Password MD5: d724feed69ec7b624e4e178ad6579cfb MVID-2021-0437 BACKDOOR.WIN32.WOLLF.M Authentication Bypass MD5: b125a9a083447ad7d437e3e7f3ed5325 MVID-2021-0436 BACKDOOR.WIN32.WOLLF.M Weak Hardcoded Password MD5: b125a9a083447ad7d437e3e7f3ed5325 MVID-2021-0435 BACKDOOR.WIN32.JOKERDOOR Remote Stack Buffer Overflow MD5: 0fca0250fa3fe8ee7e1cf0cc45a6b2d8 MVID-2021-0434 BACKDOOR.WIN32.FTP.SIMPEL.12 Insecure Crypto MD5: 1d12f9b921b38d7b521f12442bdd52d8 MVID-2021-0433 BACKDOOR.WIN32.FTP.SIMPEL.12 Port Bounce Scan MD5: 1d12f9b921b38d7b521f12442bdd52d8 MVID-2021-0432 BACKDOOR.WIN32.VISIOTROL.10 Insecure Password Storage MD5: f9dc0a462ada737f36efafac56f22b97 MVID-2021-0431 BACKDOOR.WIN32.MELLPON.B Remote Unauthenticated Information Disclosure MD5: e499a4c359a8cc46e641f39c0ed548f9 MVID-2021-0430 BACKDOOR.WIN32.BNLITE Remote Heap Based Buffer Overflow MD5: 9cec5a23887f0c73148ab3ea147a6fa4 MVID-2021-0429 BACKDOOR.WIN32.PHASE.11 Unauthenticated Remote Command Execution MD5: fb4fb710f031304d788d9cd1c4201552 MVID-2021-0428 BACKDOOR.WIN32.RAMUS Unauthenticated Remote Code Execution MD5: 20cfe4912b280ad141d51f1f7370bfa5 MVID-2021-0427 BACKDOOR.WIN32.JOKERDOOR Remote Stack Buffer Overflow MD5: 8f18703c433b5703a7131c1afeacfd74 MVID-2021-0426 BACKDOOR.WIN32.FTP.MATITEMAN Weak Hardcoded Password MD5: fc8eaa2a5752b509dbd02989d8d9f2e2 MVID-2021-0425 BACKDOOR.WIN32.BACKATTACK.20 Authentication Bypass RCE MD5: 8b484576f928c256277016104cc364c2 MVID-2021-0424 BACKDOOR.WIN32.BACKATTACK.20 Unauthenticated Remote Command Execution MD5: 8b484576f928c256277016104cc364c2 MVID-2021-0423 BACKDOOR.WIN32.NCX.B Remote Stack Buffer Overflow MD5: 991c1f02c809cee860cb712896a45338 MVID-2021-0422 BACKDOOR.WIN32.NCX.B Unauthenticated Remote Command Execution MD5: 991c1f02c809cee860cb712896a45338 MVID-2021-0421 BACKDOOR.WIN32.NUCLEROOT.MF Stack Buffer Overflow MD5: 8de56eef118187a89eeab972288ce94d MVID-2021-0420 BACKDOOR.WIN32.ASYLUM.014 Cleartext Password Storage MD5: a83989d36f3b443a757eef1c99f1a373 MVID-2021-0419 BACKDOOR.IRC.SUBHUMAN Unauthenticated Open Proxy MD5: f93e64ac9c3383d0df23662a78a76c07 MVID-2021-0418 BACKDOOR.WIN32.MECHBOT.A Insecure Permissions MD5: 8c9e7906d0ad5d0f2267be0057f2a8e3 MVID-2021-0417 BACKDOOR.WIN32.WINSHELL.50 Weak Hardcoded Password MD5: 8170928cd3e0f1a79b9d40ae19a4d217 MVID-2021-0416 BACKDOOR.WIN32.WINSHELL.50 Weak Hardcoded Password MD5: 0faecbdfccf3144d487971ed47f3665c MVID-2021-0415 BACKDOOR.WIN32.BIONET.10 Authentication Bypass RCE MD5: 99b4428521fa9d9da18e0ccd79e5b985 MVID-2021-0414 BACKDOOR.WIN32.VERNET.AXT Insecure Permissions MD5: f529d60abbdafccce3dc5e5ffd6cdfa6 MVID-2021-0413 TROJAN.WIN32.MUCC.IVK Insecure Service Path MD5: 1d622f8c72b010b8d7213c032db122e4 MVID-2021-0412 BACKDOOR.WIN32.COREDOOR.10.A Port Bounce Scan MD5: 4d10cd3fa86239ade05d2b741892b1e5 MVID-2021-0411 BACKDOOR.WIN32.COREDOOR.10.A Authentication Bypass RCE MD5: 4d10cd3fa86239ade05d2b741892b1e5 MVID-2021-0410 EMAIL-WORM.WIN32.DELTAD Insecure Permissions MD5: 33f1dc8cf5987751ac0f063601f1c324 MVID-2021-0409 BACKDOOR.WIN32.BLUEADEPT.02.A Remote Buffer Overflow MD5: 694d21679cc212c59515584d1b65dc84 MVID-2021-0408 BACKDOOR.WIN32.BNLITE Remote Heap Based Buffer Overflow MD5: a8818da39c7d36d9b5497d1a875798b8 MVID-2021-0407 BACKDOOR.WIN32.AGENT.AD Insecure Password Storage MD5: d2b933ebadd5c808ca4c68ae173e2d62 MVID-2021-0406 BACKDOOR.WIN32.WOLLF.H Hardcoded Cleartext Password MD5: 5494b78dcfaf16aa43b5dbd563dc5582 MVID-2021-0405 BACKDOOR.WIN32.WOLLF.A Weak Hardcoded Password MD5: 52d1341f73c34ba2638581469120b68a MVID-2021-0404 BACKDOOR.WIN32.ANTILAM.11 Unauthenticated Remote Command Execution MD5: 290477c9707f64a316888493ae67b1ef MVID-2021-0403 BACKDOOR.WIN32.CURIOSO.ZP Insecure Permissions MD5: 1ae08493913b2a0c8cbcb0541da5a8bc MVID-2021-0402 BACKDOOR.WIN32.ACROPOLIS.10 Insecure Permissions MD5: e865fc7225c84165d7aa0c7d8a1bcb77 MVID-2021-0401 EMAIL-WORM.WIN32.PLEXUS.B Unauthenticated Remote Code Execution MD5: ee8990b5d076a7ed601a30eb677cc9be MVID-2021-0400 TROJAN.WIN32.SKYNETREF.Y Unauthenticated Open Proxy MD5: e2d249f86890d290bb8af599ea0367f3 MVID-2021-0399 TROJAN.WIN32.SKYNETREF.X Unauthenticated Open Proxy MD5: 339ec4617eababfd46006f2219e68cb8 MVID-2021-0398 TROJAN.WIN32.SERVSTAR.POA Insecure Service Path MD5: 7588da376f496aa678cdfca4e404f38a MVID-2021-0397 BACKDOOR.WIN32.HUPIGON.BNBB Insecure Service Path MD5: 0857f2c8541dba287d648eec17163d3f MVID-2021-0396 HEUR.BACKDOOR.WIN32.DENIS.GEN Remote Denial of Service (UDP Datagram) MD5: 1a4d58e281103fea2a4ccbfab93f74d2 MVID-2021-0395 BACKDOOR.WIN32.HUPIGON.NQR Unauthenticated Open Proxy MD5: 9603420a004d9559e610ddeb9d94e20a MVID-2021-0394 BACKDOOR.WIN32.PAHADOR.AJ Authentication Bypass RCE MD5: f393943eb6a80c8321f31c4543ba0bcf MVID-2021-0393 BACKDOOR.WIN32.VB.AFU Insecure Transit Password Disclosure MD5: c6ba7fcb9eb9bdd7e081e2e84e784dcb MVID-2021-0392 BACKDOOR.WIN32.VB.AFU Insecure Permissions MD5: c6ba7fcb9eb9bdd7e081e2e84e784dcb MVID-2021-0391 BACKDOOR.WIN32.JOKERDOOR Remote Stack Buffer Overflow MD5: 6ec85a641656f63f4de853468509d3e3 MVID-2021-0390 BACKDOOR.WIN32.NCX.B Unauthenticated Remote Command Execution MD5: 885e74a43b4f7caec3cfb4dba0787de4 MVID-2021-0389 BACKDOOR.WIN32.NCX.B Remote Stack Buffer Overflow MD5: 885e74a43b4f7caec3cfb4dba0787de4 MVID-2021-0388 BACKDOOR.WIN32.OPTIX.03.B Unauthenticated Remote Command Execution MD5: 4cf1f1d740d7acea4d3836228980ebcb MVID-2021-0387 BACKDOOR.WIN32.AGENT.SAH Heap Corruption MD5: 3ee7a90b5fc3f2b7ba68911e8220df17 MVID-2021-0386 TROJAN.WIN32.DELF.BNA Information Disclosure MD5: 6bf08611410e3ef7df67d781a2e8efed MVID-2021-0385 TROJAN.WIN32.PHIRES.ZM Insecure Permissions MD5: 34fb086a88f3a2506b61a17cced3b476 MVID-2021-0384 TROJAN.WIN32.PASTA.MCA Insecure Permissions MD5: 4692b129b0034fd53cd76867d9869e49 MVID-2021-0383 BACKDOOR.WIN32.PRORAT.NTZ Weak Hardcoded Password MD5: ab96d7f9e008a0774239be6be0c8e7bb MVID-2021-0382 BACKDOOR.WIN32.PRORAT.NTZ Port Bounce Scan MD5: ab96d7f9e008a0774239be6be0c8e7bb MVID-2021-0381 VIRUS.WIN32.IPAMOR.C Unauthenticated Remote System Reboot MD5: b6bfdfe91c3e37865b6a269dc9ff9302 MVID-2021-0380 BACKDOOR.WIN32.ANTILAM.14.O Unauthenticated Remote Command Execution MD5: 2914f01e65d848655d4f1aac51ff04d1 MVID-2021-0379 HEUR.BACKDOOR.WIN32.GENERIC Unauthenticated Open Proxy MD5: 6a96fc226fbe9f0efbcc8a7b2e34b807 MVID-2021-0378 BACKDOOR.WIN32.MAZBEN.ES Unauthenticated Open Proxy MD5: fcd611ccbc756fab43761f4b18372b81 MVID-2021-0377 BACKDOOR.WIN32.HUPIGON.AFJK Authentication Bypass RCE MD5: 80b0fc8c0657c0ae7971f09af45c706b MVID-2021-0376 BACKDOOR.WIN32.HUPIGON.AFJK Port Bounce Scan MD5: 80b0fc8c0657c0ae7971f09af45c706b MVID-2021-0375 BACKDOOR.WIN32.HUPIGON.AFJK Directory Traversal MD5: 80b0fc8c0657c0ae7971f09af45c706b MVID-2021-0374 BACKDOOR.WIN32.HUPIGON.ACIO Unauthenticated Open Proxy MD5: 21f324a6a62d8125bc83b8d1865e17f9 MVID-2021-0373 BACKDOOR.WIN32.HUPIGON.ACIO Insecure Service Path MD5: 21f324a6a62d8125bc83b8d1865e17f9 MVID-2021-0372 BACKDOOR.WIN32.DELF.ARJO Insecure Service Path MD5: 05177f77f075293ff7d58a7f2915c64f MVID-2021-0371 TROJAN.WIN32.AKL.BC Insecure Permissions MD5: 0b2a0f61a209e24a7d7b2c2d5efb4d68 MVID-2021-0370 BACKDOOR.WIN32.LANAFTP.K Heap Corruption MD5: e2660742a80433e027ee9bdedc40e190 MVID-2021-0369 BACKDOOR.WIN32.LANFILTRATOR.11.B Unauthenticated Remote Command Execution MD5: 9f87546e667e5af59a8580ddf7fd43c7 MVID-2021-0368 VIRUS.WIN32.IPAMOR.C Unauthenticated Remote System Reboot MD5: bbf032a3aa288f02403295f0472d1f05 MVID-2021-0367 TROJAN-PROXY.WIN32.RANKY.Z Unauthenticated Open Proxy MD5: e312385f64e6b8fd667b4f9b5ea1ff70 MVID-2021-0366 WORM.WIN32.RUNFER.BPO Insecure Service Path MD5: ae4c226ad974c990391217f31db2a209 MVID-2021-0365 TROJAN-PROXY.WIN32.RANKY.DH Unauthenticated Open Proxy MD5: dcc58648868f1d5c0d7c53250f1bd5c9 MVID-2021-0364 WORM.WIN32.FASONG.C Insecure Service Path MD5: bc6f4a283b6b8308c60bb70cc81edfd8 MVID-2021-0363 TROJAN-SPY.WIN32.ARDAMAX.OCX Insecure Permissions MD5: 78a39875a0adb110cf3c7de3a0d1384c MVID-2021-0362 BACKDOOR.WIN32.PRORAT.LKT Port Bounce Scan (MITM) MD5: dec8f9042986d64e29d62effb482290b MVID-2021-0361 BACKDOOR.WIN32.PRORAT.LKT Weak Hardcoded Password MD5: dec8f9042986d64e29d62effb482290b MVID-2021-0360 HACKTOOL.WIN32.AGENT.GI Local Stack Buffer Overflow (SEH) MD5: e60606d19a36789662ba97b4bb5c4ccf MVID-2021-0359 TROJAN-PSW.WIN32.PDPINCH.GEN Remote Denial of Service MD5: 0e4fbfeb6f7a98e437a497013b285ffc MVID-2021-0358 BACKDOOR.WIN32.HUPIGON.GY Unauthenticated Open Proxy MD5: be74cbb86c007309d8004d910f5270f7 MVID-2021-0357 BACKDOOR.WIN32.BIFROSE.AHYG Insecure Permissions MD5: d6aff119c03ff378d386b30b36b07a69 MVID-2021-0356 HEUR.TROJAN.WIN32.GENERIC Insecure Service Path MD5: 2e4b6c5bd907995f6fd40c5eeab5c6e9 MVID-2021-0355 BACKDOOR.WIN32.YODDOS.AN Insecure Service Path MD5: bf2417bf23a3b7ae2e44676882b4b9dd MVID-2021-0354 BACKDOOR.WIN32.LOLBOT.GEN Insecure Permissions MD5: 56a93a2a0a4c6a09e2761f2e0351b020 MVID-2021-0353 VIRUS.WIN32.RENAMER.A Insecure Permissions MD5: 001fc372acc853aa1cf92588a43a7deb MVID-2021-0352 BACKDOOR.WIN32.HUPIGON.AFJK Directory Traversal MD5: 8dc8abc99c1e7908fe9d048a4e360960 MVID-2021-0351 BACKDOOR.WIN32.HUPIGON.AFJK Authentication Bypass RCE MD5: 8dc8abc99c1e7908fe9d048a4e360960 MVID-2021-0350 BACKDOOR.WIN32.HUPIGON.FJCD Unauthenticated Open Proxy MD5: 284f36e35db6a0aa9a493f39d834367e MVID-2021-0349 BACKDOOR.WIN32.RMTSVC.L Remote Denial of Service MD5: 38f9ee3ce51ead0ce6bf2edcaa462611 MVID-2021-0348 BACKDOOR.WIN32.AGENT.AER Insecure Transit Password Disclosure MD5: 9576a6a59715a69be499fa41d6383a64 MVID-2021-0347 BACKDOOR.WIN32.AGENT.AER Remote Denial of Service MD5: 9576a6a59715a69be499fa41d6383a64 MVID-2021-0346 TROJAN-DOWNLOADER.WIN32.VB.ABB Insecure Permissions MD5: 8f81373b0f0e6f60206a1a707de2ed77 MVID-2021-0345 BACKDOOR.WIN32.MINILASH.10.B Remote Denial of Service (UDP Datagram) MD5: 3c407448a00b2d53b2418f53b66d5b6b MVID-2021-0344 BACKDOOR.WIN32.HUPIGON.ASQX Unauthenticated Open Proxy MD5: a344b767d58b6c83b92bb868727e021c MVID-2021-0343 TROJAN.WIN32.AGENT.XAAMKD Insecure Permissions MD5: 095651e1704b501123b41ea2e9736820 MVID-2021-0342 BACKDOOR.WIN32.WINTERLOVE.I Hardcoded Weak Password MD5: c6c81e8ba0a7b9da6216a78dfeccec8d MVID-2021-0341 BACKDOOR.WIN32.WOLLF.H Unauthenticated Remote Command Execution MD5: d0fd60516d53b2ad602c460351dbaa85 MVID-2021-0340 BACKDOOR.WIN32.VB.AWM Authentication Bypass - Information Leakage MD5: 2271d942a23a89d7adea524d4ac3c13f MVID-2021-0339 HEUR.TROJAN.WIN32.GENERIC Insecure Permissions MD5: a6916fb9b824e3d2edfe46be69ca2501 MVID-2021-0338 BACKDOOR.WIN32.SMALL.VJT Unauthenticated Remote Command Execution MD5: 92ea873a2bbdaf0799d572bc4f30dc79 MVID-2021-0337 BACKDOOR.WIN32.SMALL.GS Unauthenticated Remote Command Execution MD5: 551674fec6add7117c4be7f6b357e7cb MVID-2021-0336 BACKDOOR.WIN32.NYARA.AQ Insecure Permissions MD5: dec17541412bbc744b9f458862349e34 MVID-2021-0335 BACKDOOR.WIN32.MOONPIE.40 Unauthenticated Remote Command Execution MD5: 9dbb6d56bc9a7813305883acd0f9a355 MVID-2021-0334 BACKDOOR.WIN32.MOONPIE.40 Port Bounce Scan MD5: 9dbb6d56bc9a7813305883acd0f9a355 MVID-2021-0333 BACKDOOR.WIN32.MOONPIE.40 Authentication Bypass RCE MD5: 9dbb6d56bc9a7813305883acd0f9a355 MVID-2021-0332 BACKDOOR.WIN32.HUPIGON.AEJQ Directory Traversal MD5: 2a366cea300b84b4e6f8204a8c229266 MVID-2021-0331 BACKDOOR.WIN32.HUPIGON.AEJQ Port Bounce Scan MD5: 2a366cea300b84b4e6f8204a8c229266 MVID-2021-0330 BACKDOOR.WIN32.HUPIGON.AEJQ Authentication Bypass RCE MD5: 2a366cea300b84b4e6f8204a8c229266 MVID-2021-0329 BACKDOOR.WIN32.BO2K.11.D (BACK ORIFICE) Local Stack Buffer Overflow MD5: abc6a590d237b8ee180638007f67089e MVID-2021-0328 BACKDOOR.WIN32.DELF.WR Port Bounce Scan MD5: fc74e80ff2f49380972904d77df1c0f1 MVID-2021-0327 BACKDOOR.WIN32.DELF.WR Authentication Bypass RCE MD5: fc74e80ff2f49380972904d77df1c0f1 MVID-2021-0326 BACKDOOR.WIN32.DELF.UM Authentication Bypass RCE MD5: d5256768a01a0e7c2ad5ba1264777f71 MVID-2021-0325 BACKDOOR.WIN32.ANTILAM.11 Unauthenticated Remote Code Execution MD5: 9adffcc98cd658a7f9c5419480013f72 MVID-2021-0324 HEUR.TROJAN.WIN32.DELF.GEN Insecure Permissions MD5: 058ef1acc6456a924737d940f3cf81aa MVID-2021-0323 BACKDOOR.WIN32.HUPIGON.ABE Unauthenticated Open Proxy MD5: 5d7908e7e95d0eb4a7351d24605e62a6 MVID-2021-0322 TROJAN-PROXY.WIN32.RAZNEW.GEN Unauthenticated Open Proxy MD5: 033ccd3a926441c49d3898dab97aefed MVID-2021-0321 BACKDOOR.WIN32.DARKKOMET.ASPL Insecure Permissions MD5: 5c644104f96ccad7a8cf324c2e523530 MVID-2021-0320 HACKTOOL.WIN32.HKIT Unauthenticated Remote Command Execution MD5: 6209db6e8cfd7c7a315ca858129bd226 MVID-2021-0319 HACKTOOL.WIN32.HIDD.B Remote Stack Buffer Overflow (UDP Datagram) MD5: 665a408981294ca49be23096363eec2f MVID-2021-0318 BACKDOOR.WIN32.IRCBOT.GEN Hardcoded Weak Password MD5: bcfc89ca07bd0ad7b9396a0815c9fc39 MVID-2021-0317 TROJAN-PROXY.WIN32.RAZNEW.GEN Unauthenticated Open Proxy MD5: 55ce4b6c2ec10838c54dca54d96801d6 MVID-2021-0316 BACKDOOR.WIN32.ZARATUSTRA Unauthenticated Remote File Write (Remote Code Exec) MD5: f240c16af2189ea9c94f317281ce7e59 MVID-2021-0315 BACKDOOR.WIN32.ZDEMON.126 Unauthenticated Remote Command Execution MD5: cedc886b593f013133df39bb6b43a762 MVID-2021-0314 BACKDOOR.WIN32.ZDEMON.10 Unauthenticated Remote Command Execution MD5: d12f38e959d70af76fd263aa1933033c MVID-2021-0313 TROJAN-DROPPER.WIN32.SMALL.FP Unauthenticated Open Proxy MD5: 07122dd3b069bbbb445e060c1249d5a2 MVID-2021-0312 CONSTRUCTOR.WIN32.SS.11.C Unauthenticated Open Proxy MD5: da60b92742abff72930879fa8560b3c3 MVID-2021-0311 BACKDOOR.WIN32.WINSHELL.40 Unauthenticated Remote Command Execution MD5: c98e23742807f3cb5a095f34e0eb0e52 MVID-2021-0310 BACKDOOR.WIN32.NBDD.BGZ Remote Stack Buffer Overflow MD5: 6fab73bf104c6a9211b94f9559faa134 MVID-2021-0309 BACKDOOR.WIN32.BIFROSE.ACCI Local Stack Buffer Overflow MD5: 611dbff0d68df777c6d6881e00440143 MVID-2021-0308 BACKDOOR.WIN32.PSYRAT.B Remote Denial of Service MD5: 5817183894cb513239f6aef28895130c MVID-2021-0307 BACKDOOR.WIN32.PSYRAT.B Unauthenticated Remote Command Execution MD5: 5817183894cb513239f6aef28895130c MVID-2021-0306 BACKDOOR.WIN32.AGENT.CU Unauthenticated Remote Command Execution MD5: ce1963d3fd6a8e1383aac40a1f1c4107 MVID-2021-0305 BACKDOOR.WIN32.AGENT.CU Port Bounce Scan (MITM) MD5: ce1963d3fd6a8e1383aac40a1f1c4107 MVID-2021-0304 BACKDOOR.WIN32.AGENT.CU Authentication Bypass RCE MD5: ce1963d3fd6a8e1383aac40a1f1c4107 MVID-2021-0303 BACKDOOR.WIN32.MAZBEN.ME Unauthenticated Open Proxy MD5: 6681d5e4b68abd21a14c704edf9e2ff5 MVID-2021-0302 BACKDOOR.WIN32.HUPIGON.AAUR Unauthenticated Open Proxy MD5: 16d598c01f7b391986c8c19eded005b1 MVID-2021-0301 BACKDOOR.WIN32.IRCBOT.GEN Unauthenticated Remote Command Execution MD5: 96f5cdfa5b3416c819d76060f11dc88d MVID-2021-0300 TROJAN-SPY.WIN32.SPYEYES.HQD Insecure Permissions MD5: 6f484fea8f6bb3974185fc856f37541b MVID-2021-0299 TROJAN-SPY.WIN32.SPYEYES.ABDB Insecure Permissions MD5: 9185538b01ad700603f38fb0eb8b6e3b MVID-2021-0298 BACKDOOR.WIN32.AGENT.BJEV Insecure Permissions MD5: ca40998b5d62ee7f936537ff3de7993d MVID-2021-0297 HEUR.BACKDOOR.WIN32.WINNTI.GEN Insecure Permissions MD5: eb272fe923ccf3e66fde1bf309cbc464 MVID-2021-0296 BACKDOOR.WIN32.IRCBOT.GEN Weak Hardcoded Password MD5: 9b12ff6b8b025e7fb0a171abad41c79c MVID-2021-0295 HEUR.BACKDOOR.WIN32.GENERIC Unauthenticated Open Proxy MD5: f2b5429feaa7d229418cf499ce5f5822 MVID-2021-0294 HEUR.BACKDOOR.WIN32.GENERIC Unauthenticated Open Proxy MD5: bcf45d515f2a0c6ead1e44ea6371276b MVID-2021-0293 VIRTOOL.WIN32.AFIX Local Stack Buffer Overflow MD5: c971e978198331bb0b56dc8b47f0b4b0 MVID-2021-0292 VIRTOOL.WIN32.AFIX Local Stack Buffer Overflow MD5: 35100db8750364871fe70ef6de4833f7 MVID-2021-0291 BACKDOOR.WIN32.SURILA.J Remote Denial of Service MD5: b1cec4b806c71c82bbd9002bdaf21d1f MVID-2021-0290 BACKDOOR.WIN32.SURILA.J Authentication Bypass MD5: b1cec4b806c71c82bbd9002bdaf21d1f MVID-2021-0289 BACKDOOR.WIN32.SURILA.J Port Bounce Scan MD5: b1cec4b806c71c82bbd9002bdaf21d1f MVID-2021-0288 TROJAN.WIN32.RASFLOODER.B Hardcoded Plaintext Password MD5: 6baf47d953de7e4e07aef9b1af0c0d72 MVID-2021-0287 BACKDOOR.WIN32.NERTE.A Unauthenticated Remote Command Execution MD5: 125364b0cdae80c10f00b75c8e2cfa47 MVID-2021-0286 BACKDOOR.WIN32.NERTE.A Authentication Bypass RCE MD5: 125364b0cdae80c10f00b75c8e2cfa47 MVID-2021-0285 TROJAN-PROXY.WIN32.RANKY.GEN Unauthenticated Open Proxy MD5: c0d6a2f0b34d9c44ca3433e4d45f187e MVID-2021-0284 BACKDOOR.IRC.ATAKA.A Insecure Permissions MD5: 2da85579b259e6de86590e067003e064 MVID-2021-0283 HEUR.BACKDOOR.WIN32.AGENT.GEN Insecure Permissions MD5: db0b3f4aeccb8d26f14b915a9e2529b4 MVID-2021-0282 VIRUS.WIN32.SHODI.E Heap Corruption MD5: 37d4a5ba123dd32f1e2c4ba0be14e77c MVID-2021-0281 VIRUS.WIN32.SHODI.E Unauthenticated Remote Command Execution MD5: 37d4a5ba123dd32f1e2c4ba0be14e77c MVID-2021-0280 VIRUS.WIN32.SHODI.E Insecure Transit MD5: 37d4a5ba123dd32f1e2c4ba0be14e77c MVID-2021-0279 BACKDOOR.WIN32.WINSHELL.40 Authentication Bypass Command Execution MD5: 83fe2cc7aedc452d71c751053a2112c4 MVID-2021-0278 BACKDOOR.WIN32.ZOMBAM.L Unauthenticated URL Command Injection MD5: 9729e9fc004ea49d3c2ddee28736dae3 MVID-2021-0277 BACKDOOR.WIN32.ZOMBAM.L Remote Stack Buffer Overflow MD5: 9729e9fc004ea49d3c2ddee28736dae3 MVID-2021-0276 TROJAN.WIN32.INJECT.ADWAS Insecure Permissions MD5: acfce60da9031e00c22818f2616d6424 MVID-2021-0275 HEUR.TROJAN.WIN32.GENERIC Insecure Permissions MD5: fe3fb2e929f95ed03233e7a4d622a28d MVID-2021-0274 TROJAN-DROPPER.WIN32.AGENT.WXL Insecure Permissions MD5: 8b17a68d7b2291f217b63e0377ee2b3a MVID-2021-0273 TROJAN.WIN32.VB.BCNG Insecure Permissions MD5: 10550ca42c32c22bdd0515020cff38dd MVID-2021-0272 BACKDOOR.WIN32.HUPIGON.GSY Unauthenticated Open Proxy MD5: 7e99aa748b61fd0802fa19cf9e4cf1f8 MVID-2021-0271 BACKDOOR.WIN32.HUPIGON.AISS Unauthenticated Open Proxy MD5: 79affcb4051d36dde3d1543a4fd88368 MVID-2021-0270 TROJAN-PROXY.WIN32.RANKY.AG Unauthenticated Open Proxy MD5: af4868303124ee4f765a16328e8993a6 MVID-2021-0269 TROJAN-SPY.WIN32.XSPYOUT.A Unauthenticated Open Proxy MD5: d1791ca15c5df6f8f5d007518efd65b6 MVID-2021-0268 TROJAN-DROPPER.WIN32.SVB.CZ Port Bounce Scan (MITM) MD5: d57536189430fd75e45f53845e9b3f94 MVID-2021-0267 TROJAN-DROPPER.WIN32.SVB.CZ Authentication Bypass RCE MD5: d57536189430fd75e45f53845e9b3f94 MVID-2021-0266 BACKDOOR.WIN32.NERTE.781 Unauthenticated Remote Command Execution MD5: 776e8bb41adf8bd95865c0b03637d8d7 MVID-2021-0265 BACKDOOR.WIN32.NERTE.781 Authentication Bypass RCE MD5: 776e8bb41adf8bd95865c0b03637d8d7 MVID-2021-0264 CONSTRUCTOR.WIN32.BIFROSE.ASC Local Stack Buffer Overflow (Heap Corruption) MD5: 9e1ef166901534c276b5eeeee511fe22 MVID-2021-0263 TROJAN-DROPPER.WIN32.SCROP.DYI Insecure Permissions MD5: af207a19fbe313e3f7e123b6b2acffd4 MVID-2021-0262 EMAIL-WORM.WIN32.TRANCE.A Insecure Permissions MD5: ca18a07560efa0308827dc972351301f MVID-2021-0261 TROJAN-DROPPER.WIN32.KREPPER.A Unauthenticated Remote Command Execution MD5: ee699b4055c6199f9826681797d64f0b MVID-2021-0260 TROJAN-DROPPER.WIN32.JUNTADOR.A Weak Hardcoded Password MD5: f28e866ce2f99013a66b015f6a7f31a8 MVID-2021-0259 TROJAN.WIN32.BANPAK.KH Insecure Permissions MD5: 304fb160949dcaec3e718481464f9ce6 MVID-2021-0258 TROJAN.WIN32.SECONDTHOUGHT.AK Insecure Permissions MD5: 21cd8bab6b3569f7b375a69a37e36c50 MVID-2021-0257 BACKDOOR.WIN32.REVERSETROJAN.200 Authentication Bypass Empty Password MD5: 3fbec7c0623f5f80e4d9c096a50b0d59 MVID-2021-0256 BACKDOOR.WIN32.HUPIGON.AAIO Remote Stack Buffer Overflow MD5: c38cd09fd5ebd1f0cc378804b2da08c4 MVID-2021-0255 TROJAN-DROPPER.WIN32.GOOGITE.B Unauthenticated Remote Command Execution MD5: 4a8d6bc838c09c6701abfa8b283fd0de MVID-2021-0254 TROJAN.WIN32.ALIEN.ERF Directory Traversal MD5: 57ab194d8c60ee97914eda22e4d71b68 MVID-2021-0253 TROJAN.WIN32.ALIEN.ERF Remote Stack Buffer Overflow MD5: 57ab194d8c60ee97914eda22e4d71b68 MVID-2021-0252 TROJAN.WIN32.ALIEN.ERF Remote Denial of Service MD5: 57ab194d8c60ee97914eda22e4d71b68 MVID-2021-0251 EMAIL-WORM.WIN32.KIPIS.A Unauthenticated Remote Code Execution MD5: aa703bc17e3177d3b24a57c5d2a91a0c MVID-2021-0250 BACKDOOR.WIN32.ZOMBAM.GEN Information Disclosure MD5: ff6516c881dee555b0cd253408b64404 MVID-2021-0249 BACKDOOR.WIN32.VB.PLD Unauthenticated Remote Command Execution MD5: 6ff35087d789f7aca6c0e3396984894e MVID-2021-0248 BACKDOOR.WIN32.VB.PLD Insecure Transit MD5: 6ff35087d789f7aca6c0e3396984894e MVID-2021-0247 BACKDOOR.WIN32.PAZUS.18 Authentication Bypass RCE MD5: 5be13eb16018ab69157f8c8e96e7d6bf MVID-2021-0246 BACKDOOR.WIN32.ZOMBAM.GEN Remote Stack Buffer Overflow MD5: ff6516c881dee555b0cd253408b64404 MVID-2021-0245 BACKDOOR.WIN32.ZOMBAM.GEN Unauthenticated URL Command Injection MD5: ff6516c881dee555b0cd253408b64404 MVID-2021-0244 BACKDOOR.WIN32.ZOMBAM.GEN Cross Site Scripting (XSS) MD5: ff6516c881dee555b0cd253408b64404 MVID-2021-0243 BACKDOOR.WIN32.XRAT.D Unauthenticated Remote Command Execution MD5: dc77b126b205b0f671e505766c607ef1 MVID-2021-0242 BACKDOOR.WIN32.WUCA.NZ Insecure Permissions MD5: 378b225b07979e12062f86ab1fbaf2ed MVID-2021-0241 TROJAN-DROPPER.WIN32.GOOGITE.A Unauthenticated Open Proxy MD5: ff30fbee3724d80dcb9471c0b553c99a MVID-2021-0240 BACKDOOR.WIN32.WOLLF.12 Unauthenticated Remote Command Execution MD5: 911e63e28b1d177120cca16eacf3b602 MVID-2021-0239 BACKDOOR.WIN32.NEAKSE.BIT Insecure Permissions MD5: 20863ba09c31037b1b3220fc6da100e1 MVID-2021-0238 BACKDOOR.WIN32.ANDROM.DF Unauthenticated Remote Command Execution MD5: bf60f5b5c901bab08484838447f1b85e MVID-2021-0237 BACKDOOR.WIN32.DELF.ACZ Remote Stack Buffer Overflow (SEH) MD5: 065d89c63fa1057de98c727d4b044b98 MVID-2021-0236 BACKDOOR.WIN32.NETSPY.10 Heap Corruption MD5: e677149c35cbba118655d9b133da8827 MVID-2021-0235 BACKDOOR.WIN32.WISELL Unauthenticated Remote Command Execution MD5: eba4ce50a036a196484715f60c8a449b MVID-2021-0234 BACKDOOR.WIN32.WINSHELL.A Unauthenticated Remote Command Execution MD5: 911a97737bd26e2a478f52e74b4fa01d MVID-2021-0233 BACKDOOR.WIN32.WHIRLPOOL.A Remote Buffer Overflow - UDP Datagram MD5: 90171763d1cc62102b08482bac54ea8b MVID-2021-0232 BACKDOOR.WIN32.NETCONTROL2.293 Unauthenticated Remote Command Execution MD5: 15ca804e4634d9586f85b1d15ebe91a0 MVID-2021-0231 BACKDOOR.WIN32.NETBUS.12 Unauthenticated Information Disclosure MD5: d9822984ed546cbf3ccffd149d1d2af5 MVID-2021-0230 BACKDOOR.WIN32.NERTE.772 Unauthenticated Remote Command Execution MD5: 464d7073f884b586b17950eef2908a6e MVID-2021-0229 BACKDOOR.WIN32.NERTE.772 Authentication Bypass RCE MD5: 464d7073f884b586b17950eef2908a6e MVID-2021-0228 TROJAN.WIN32.SCAR.DULK Insecure Permissions MD5: 317cd84b5c0d11a9c3aacdfe2bb6031c MVID-2021-0227 BACKDOOR.WIN32.TONEROK.D Unauthenticated Remote Command Execution MD5: b297c565899ace88f40e5da833f41561 MVID-2021-0226 BACKDOOR.WIN32.SPION4 Insecure Transit MD5: cb02d2f323db18d7415dca47bceab9db MVID-2021-0225 BACKDOOR.WIN32.UPLOAD.A Remote Denial of Service MD5: 70711c4f594fe97ff6ab17039c133458 MVID-2021-0224 BACKDOOR.WIN32.SPIRIT.12.B Insecure Permissions MD5: 2bcd471d9dd0a8d6194f4112c2ee520f MVID-2021-0223 BACKDOOR.WIN32.SKYDANCE.216 Remote Stack Buffer Overflow MD5: 694ecf256c97ef6e206e2073d37e5944 MVID-2021-0222 BACKDOOR.WIN32.SINGU.A Remote Stack Buffer Overflow (UDP Datagram) MD5: c7aabf5d248c6974b4cea6c070d6d441 MVID-2021-0221 BACKDOOR.WIN32.RMFDOOR.C Authentication Bypass RCE MD5: 5e2e6ca532c20ee6a59861d936df7076 MVID-2021-0220 BACKDOOR.WIN32.PSYCHWARD.DS Weak Hardcoded Password MD5: 9e22514c9b0e74c7fcb07b7c091f6123 MVID-2021-0219 BACKDOOR.WIN32.PSYCHWARD.C Unauthenticated Remote Command Execution MD5: f60a8d71a822e0e485f22ada8f26c31e MVID-2021-0218 BACKDOOR.WIN32.DELF.AEZ Unauthenticated Remote Command Execution MD5: be4a6274679ca966a1d99140db54c25a MVID-2021-0217 BACKDOOR.WIN32.DARKMOON.A Insecure Transit MD5: 7361fe3620fb6e18467c8e15e224b0b8 MVID-2021-0216 BACKDOOR.WIN32.DARKMOON.A Weak Hardcoded Password MD5: 7361fe3620fb6e18467c8e15e224b0b8 MVID-2021-0215 BACKDOOR.WIN32.ANTILAM.14.D Unauthenticated Remote Command Execution MD5: a53351e8fa0cb4f7db3d0250387a0e4f MVID-2021-0214 BACKDOOR.WIN32.AGENT.ODA Remote Stack Buffer Overflow (UDP) MD5: 380ff48c4a28ac25f5efb630883eeb17 MVID-2021-0213 BACKDOOR.WIN32.DANTON.43 MITM Port Bounce Scan MD5: 85f7ef2b6b8da9adb7723a13b91ac1c7 MVID-2021-0212 BACKDOOR.WIN32.DANTON.43 Weak Hardcoded Credentials RCE MD5: 85f7ef2b6b8da9adb7723a13b91ac1c7 MVID-2021-0211 BACKDOOR.WIN32.AGENT.LYW Remote Stack Buffer Overflow (UDP) MD5: 4de6f4104a5fc2185164747a6fcf20ce MVID-2021-0210 BACKDOOR.WIN32.AGENT.CY Denial of Service MD5: e85a1028a52fcc723353a236ada54fee MVID-2021-0209 BACKDOOR.WIN32.AGENT.CY Insecure Transit MD5: e85a1028a52fcc723353a236ada54fee MVID-2021-0208 BACKDOOR.WIN32.AGENT.CY Weak Hardcoded Credentials MD5: e85a1028a52fcc723353a236ada54fee MVID-2021-0207 BACKDOOR.WIN32.DELF.ABB Insecure Transit MD5: 2910c3bea6732d5ed81a7c44d4354136 MVID-2021-0206 BACKDOOR.WIN32.DELF.ZHO Authentication Bypass RCE MD5: 6b9f5a0512af3ab33c26eaa4bdf94f1f MVID-2021-0205 BACKDOOR.WIN32.ANTILAM.13.A Unauthenticated Remote Command Execution MD5: 1ef711b34cc278449f1997e4ed06334a MVID-2021-0204 BACKDOOR.WIN32.MOTIVFTP.12 Authentication Bypass RCE MD5: 88785a093b8fa00893214dd220ac255d MVID-2021-0203 BACKDOOR.WIN32.NINJASPY.C Remote Command Execution MD5: 6eece319bc108576bd1f4a8364616264 MVID-2021-0202 PACKED.WIN32.BLACK.D Unauthenticated Open Proxy MD5: 3a36d7ab34b3241aa2a9072700e0cb7c MVID-2021-0201 BACKDOOR.WIN32.FLODER.GQE Insecure Permissions MD5: 0629e3b2ab8a973a3e37e4e97cb9cfea MVID-2021-0200 TROJAN.WIN32.SISCOS.BQE Insecure Permissions MD5: b4a35ae6dcceea6390769829b4e1506f MVID-2021-0199 TROJAN.WIN32.AGENT.XDTV Insecure Permissions MD5: ffa9b76f9549a2c46415c855a0911e8a MVID-2021-0198 BACKDOOR.WIN32.AGENT.OJ Unauthenticated Remote Command Execution MD5: c1e92e04cdb432d83ea2610ef226d4cd MVID-2021-0197 BACKDOOR.WIN32.AGENT.OJ Remote Stack Buffer Overflow MD5: c1e92e04cdb432d83ea2610ef226d4cd MVID-2021-0196 BACKDOOR.WIN32.AGENT.KTE Remote Stack Buffer Overflow (UDP Datagram) MD5: 7c92e59e776355734781bbf05571d0f0 MVID-2021-0195 BACKDOOR.WIN32.AGENT.GMUG Heap Corruption MD5: c7763bae3376a9f2865a1a18e84c259e MVID-2021-0194 BACKDOOR.WIN32.AGENT.GGW Authentication Bypass MD5: 509e3d4839688c6173980dfba22ebd55 MVID-2021-0193 WORM.WIN32.DELF.HU Insecure Permissions MD5: 46e27d7bfdbda7a71dfa12a79026a88b MVID-2021-0192 HEUR.TROJAN.WIN32.BAYROB.GEN Insecure Permissions MD5: 765698ccfb033c86eea6d293235d7ed0 MVID-2021-0191 BACKDOOR.WIN32.AGENT.AFQ Remote Heap Corruption MD5: 853754de6b8ffbe1321a8c91aab5c232 MVID-2021-0190 BACKDOOR.WIN32.AGENT.AFQ Directory Traversal MD5: 853754de6b8ffbe1321a8c91aab5c232 MVID-2021-0189 BACKDOOR.WIN32.AGENT.AFQ Missing Authentication MD5: 853754de6b8ffbe1321a8c91aab5c232 MVID-2021-0188 TROJAN-DROPPER.WIN32.INJECTOR.AOBL Insecure Permissions MD5: 842f6f21a2a83792e98900df90c9340b MVID-2021-0187 TROJAN-DROPPER.WIN32.DYCLER.VRP Insecure Permissions MD5: 1d6d6d3c077250b7b3ad053e71054ecc MVID-2021-0186 WORM.WIN32.BUSAN.K Insecure Communication Protocol MD5: bcad7aa6cb6cb9d94377cd88acbca1c9 MVID-2021-0185 VIRUS.WIN32.BANKA.A Insecure Permissions MD5: 6a3329d12323f4920dbf13afe1be6acd MVID-2021-0184 PACKED.WIN32.BLACK.D Unauthenticated Open Proxy MD5: 17e3836682ffb0913459ece7c3f0786d MVID-2021-0183 BACKDOOR.WIN32.DARKKOMET.ARTR Insecure Permissions MD5: d2ee6046fd47de321d1310dccacca92b MVID-2021-0182 IM-WORM.WIN32.BROPIA.AA Insecure Permissions MD5: ea6dfec6c3900ab422875119972d9c62 MVID-2021-0181 TROJAN-DROPPER.WIN32.AGENT.XTP Insecure Permissions MD5: 360bbc9e0926488f085029948ff6c759 MVID-2021-0180 HEUR.TROJAN.WIN32.GENERIC Insecure Permissions MD5: 1a98a0a769e7351ba16e1b91e9f26692 MVID-2021-0179 TROJAN.WIN32.AGENT.HSM Insecure Permissions MD5: c58d5aecd223ac95ae5fab6dcd69e953 MVID-2021-0178 CONSTRUCTOR.WIN32.BIFROSE.AG Local Stack Buffer Overflow MD5: db45a906a0a3747398b2b8a5faff5e44 MVID-2021-0177 HEUR.BACKDOOR.WIN32.GENERIC Unauthenticated Open Proxy MD5: d7648b676dd139d1b7ba781816726510 MVID-2021-0176 TROJAN.WIN32.BAYROB.DTRG Insecure Permissions MD5: 2f3f0e9be7edb73e545fc49b5a78b4f0 MVID-2021-0175 TROJAN-DROPPER.WIN32.AGENT.BJTZCP Insecure Permissions MD5: 2992b86d03c3922ed45fa09ef105f018 MVID-2021-0174 TROJAN.WIN32.NANOBOT.ONH Insecure Permissions MD5: 9fff4c02274c0162880844f27ff91407 MVID-2021-0173 TROJAN.WIN32.AGENTB.IOFV Insecure Permissions MD5: d4ac133a9df0c627f899bb6039d04215 MVID-2021-0172 BACKDOOR.WIN32.ZOMBAM.H Remote Stack Buffer Overflow MD5: 55feab480a43727c8a08feb7344afb4a MVID-2021-0171 HEUR.HOAX.WIN32.FRAUDROP.GEN Insecure Permissions MD5: 1d40e72fb8cf300298df4b828b48ec29 MVID-2021-0170 TROJAN.WIN32.AGENT.ZFGH Insecure Permissions MD5: a2017b547da2f06c6d7c02398cc481f6 MVID-2021-0169 TROJAN.WIN32.JORIK.QJE Insecure Permissions MD5: 982479ad10ff048d566516254051e17e MVID-2021-0168 BACKDOOR.WIN32.SMALL.N Unauthenticated Remote Command Execution (SYSTEM) MD5: fb24c3509180f463c9deaf2ee6705062 MVID-2021-0167 BACKDOOR.WIN32.HUPIGON.DAS Unauthenticated Open Proxy MD5: 7afe56286039faf56d4184c476683340 MVID-2021-0166 TROJAN-DOWNLOADER.WIN32.GENOME.OMHT Insecure Permissions MD5: 01055838361f534ab596b56a19c70fef MVID-2021-0165 TROJAN-DOWNLOADER.WIN32.GENOME.QIW Insecure Permissions MD5: 5cddc4647fb1c59f5dc7f414ada7fad4 MVID-2021-0164 TROJAN.WIN32.HOTKEYCHICK.D Insecure Permissions MD5: aff493ed1f98ed05c360b462192d2853 MVID-2021-0163 TROJAN.WIN32.HOSTS2.YQF Insecure Permissions MD5: 274a6e846c5a4a2b3281198556e5568b MVID-2021-0162 TROJAN-DOWNLOADER.WIN32.FRAUDLOAD.XEVN Insecure Permissions MD5: 17da6737cb94c11fa2363772d8eac0b1 MVID-2021-0161 TROJAN.WIN32.SHARER.H Known Vulnerable Component - Heap Corruption MD5: 9f80c3b1e7f5f6f7d0c8aea25fe83551 MVID-2021-0160 TROJAN.WIN32.SHARER.H Port Bounce Scan MD5: 9f80c3b1e7f5f6f7d0c8aea25fe83551 MVID-2021-0159 TROJAN.WIN32.SHARER.H Anonymous Logon RCE MD5: 9f80c3b1e7f5f6f7d0c8aea25fe83551 MVID-2021-0158 TROJAN-DOWNLOADER.WIN32.DELF.NZG Insecure Permissions MD5: 3c5c6f0f6f78af12d6b76119696a4074 MVID-2021-0157 TROJAN-DOWNLOADER.WIN32.DELF.OXZ Insecure Permissions MD5: 373b1d95ccdbbc6531dff43bbbe43534 MVID-2021-0156 TROJAN-DOWNLOADER.WIN32.DELF.UR Insecure Permissions MD5: 5b63a6e730f094d182c9030e3a57bcb8 MVID-2021-0155 BACKDOOR.WIN32.BURBUL.B Port Bounce Scan MD5: 3ee4cb2e06eb1f7fe54c89db903f3e7a MVID-2021-0154 IRC-WORM.WIN32.SILENTIUM.A Insecure Permissions MD5: 7a3c4ec00ba952207f25d1189c86ce22 MVID-2021-0153 IRC-WORM.WIN32.JANE.A Port Bounce Scan MD5: 2d1d6b0fd55eca12f58b8b6d80f8153f MVID-2021-0152 IRC-WORM.WIN32.JANE.A Authentication Bypass RCE MD5: 2d1d6b0fd55eca12f58b8b6d80f8153f MVID-2021-0151 BACKDOOR.WIN32.DELF.ZS Unauthenticated Remote Command Execution MD5: 911e96073cfe807289366343aa8d97ac MVID-2021-0150 BACKDOOR.WIN32.KWAK.12 Remote Command Execution MD5: c25393545e5ead3a35996ef9a887bd34 MVID-2021-0149 BACKDOOR.WIN32.KWAK.12 Port Bounce Scan MD5: c25393545e5ead3a35996ef9a887bd34 MVID-2021-0148 BACKDOOR.WIN32.KWAK.12 Authentication Bypass MD5: c25393545e5ead3a35996ef9a887bd34 MVID-2021-0147 BACKDOOR.WIN32.KWAK.12 Remote Denial of Service MD5: c25393545e5ead3a35996ef9a887bd34 MVID-2021-0146 BACKDOOR.WIN32.DARKKOMET.GOZU Insecure Permissions MD5: 00199eb3fd1a0aa6771b7f12fad895a0 MVID-2021-0145 WORM.WIN32.NGRBOT.ACNO Insecure Permissions MD5: 0b3c2053a7c09aa25ba81f2bdebbb873 MVID-2021-0144 WORM.WIN32.RECYL.DP Insecure Permissions MD5: e4737fb6c231bfb84d1a55ec2fb61641 MVID-2021-0143 WORM.WIN32.NGRBOT.ABPR Insecure Permissions MD5: ed1e47f62fa93f2fd2f4fbcfdd0f1c10 MVID-2021-0142 VIRUS.WIN32.SALITY.GEN Insecure Permissions MD5: 423a5a63bed721e479c156b309bb58fd MVID-2021-0141 TROJAN-DROPPER.WIN32.DYCLER.YHB Insecure Permissions MD5: 04a5a52f12d2a130bb88f98c3bc14aa8 MVID-2021-0140 WORM.WIN32.DETNAT.C Insecure Permissions MD5: 8df7527bd3446b89298c9c750394e0b6 MVID-2021-0139 TROJAN-DROPPER.WIN32.DEMP.RFT Insecure Permissions MD5: db01783710e0c5aff92156a0e76deade MVID-2021-0138 TROJAN-DROPPER.WIN32.DELF.DA Remote Stack Buffer Overflow (UDP Datagram) MD5: a2f1adfd7a35fd0e0207a24be169b4c1 MVID-2021-0137 HEUR.TROJAN.WIN32.GENERIC Insecure Permissions MD5: c60f00700bd73ca369195bd32a3f16a3 MVID-2021-0136 TROJAN-DROPPER.WIN32.DYCLER.VRP Insecure Permissions MD5: 06cbbff745c60c46e0996928c00ef28f MVID-2021-0135 BACKDOOR.WIN32.AGENT.MZN Remote SEH Buffer Overflow MD5: f589ae5fb7879eb0b98fb8096d7152a5 MVID-2021-0134 TROJAN-DROPPER.WIN32.DELF.P Remote Buffer Overflow MD5: b02cc578d2e7f24fb67ec0afc42a9e13 MVID-2021-0133 TROJAN-DROPPER.WIN32.DELF.P Missing Authentication MD5: b02cc578d2e7f24fb67ec0afc42a9e13 MVID-2021-0132 TROJAN-PROXY.WIN32.WIMAIN Remote Stack Buffer Overflow MD5: 8936c97e99799809812fa740076a2d7f MVID-2021-0131 TROJAN-DROPPER.WIN32.DELF.XK Remote Invalid Pointer Write DOS MD5: 869c813722be90cf1b3708051103ce14 MVID-2021-0130 BACKDOOR.WIN32.ZOMBAM.L Remote Stack Buffer Overflow MD5: 56d356c5b1ae3a91caac511179159034 MVID-2021-0129 TROJAN.WIN32.SCAR.DXIR Insecure Permissions MD5: 68ed9d6e4f3e917ab4b91689e2890754 MVID-2021-0128 TROJAN.WIN32.SISCOS.BQE Insecure Permissions MD5: a41431099989b44359273216072f8295 MVID-2021-0127 TROJAN-BANKER.WIN32.DELF.AC Insecure Permissions MD5: 81301fecc7d9ff6b28ac779d2f819673 MVID-2021-0126 TROJAN-DROPPER.WIN32.HAMER.10 Remote Floating-point Exception DoS MD5: afe4e5219829a286e0b84025b073c259 MVID-2021-0125 TROJAN-SPY.WIN32.KEYLOGGER.QT Insecure Permissions MD5: de613b96174056ef22b42e112d0e61a5 MVID-2021-0124 BACKDOOR.WIN32.AGENT.BJEV Insecure Permissions MD5: 35cf54a19efcdeaa41899647075c7ef9 MVID-2021-0123 BACKDOOR.WIN32.GTBOT.C Insecure Permissions MD5: 8c2acfcc60dda52db9bd9a934284b673 MVID-2021-0122 BACKDOOR.WIN32.ANTILAM.14.O Unauthenticated Remote Command Execution MD5: 3f3ee9dce39e816b4001bd6ae66e8f1a MVID-2021-0121 BACKDOOR.WIN32.BO2K.09.B Unauthenticated Remote Command Execution MD5: 90894ac48059687ea80e565f7529e53f MVID-2021-0120 BACKDOOR.WIN32.BO2K.AB Local File Buffer Overflow MD5: ca4e5a6ff033b62fa59de5a5dd24c7f9 MVID-2021-0119 BACKDOOR.WIN32.DARKKOMET.IRV Insecure Permissions MD5: 341b2c3222122bd25c8509fc09534dec MVID-2021-0118 TROJAN-SPY.WIN32.STEALER.OSH Insecure Permissions MD5: d58b1c2f540268bd9dd920455568d45f MVID-2021-0117 BACKDOOR.WIN32.REMOTEMANIPULATOR.FDO Insecure Permissions MD5: 66ef21e8d1cf30dce6e084a9e306c18f MVID-2021-0116 TROJAN-PROXY.WIN32.DELF.AI Remote SEH Buffer Overflow MD5: 1dd6eb39a388f4c8a3eaf248d86aaabc MVID-2021-0115 TROJAN.WIN32.HOTKEYCHICK.AM Insecure Permissions MD5: 5ea9840970e78188f73eb1763363eeac MVID-2021-0114 BACKDOOR.WIN32.AZBREG.AMW Insecure Permissions MD5: 5eb58198721d4ded363e41e243e685cc MVID-2021-0113 TROJAN-SPY.WIN32.SPYEYES.ELR Insecure Permissions MD5: 025d07f4610605031e501e6745d663aa MVID-2021-0112 TROJAN-DROPPER.WIN32.DAWS.ETLM Remote Unauthenticated System Reboot MD5: a0479e18283ed46e8908767dd0b40f8f MVID-2021-0111 TROJAN.WIN32.GOFOT.HTX Local File Buffer Overflow MD5: ae062bfe4abd59ac1b9be693fbc45f60 MVID-2021-0110 BACKDOOR.WIN32.WOLLF.H Missing Authentication MD5: 4932471df98b0e94db076f2b1c0339bd MVID-2021-0109 BACKDOOR.WIN32.DELF.ADAG Weak Hardcoded Credentials MD5: 0e997ab441cd8c35010dd8db98aae2c2 MVID-2021-0108 BACKDOOR.WIN32.AGENT.XW Remote Null Ptr Dereference - Denial of Service MD5: ed4242ad0274d3b311d8722f10b3abea MVID-2021-0107 BACKDOOR.WIN32.AGENT.XS Insecure Permissions MD5: 6c51a5ba17ffd317ad08541e20131ef3 MVID-2021-0106 BACKDOOR.WIN32.DARKKOMET.IRV Insecure Permissions MD5: a229acff4e0605ad24eaf3d9c44fdb1b MVID-2021-0105 TROJAN.WIN32.PINCAV.CMFL Insecure Permissions MD5: 9d296ebd6b4f79457fcc61e38dcce61e MVID-2021-0104 TROJAN.WIN32.PLUDER.O Insecure Permissions MD5: ee22eea131c0e00162e4ba370f396a00 MVID-2021-0103 TROJAN-PROXY.WIN32.DAEMONIZE.I Remote Denial of Service MD5: 61bec9f22a5955e076e0d5ddf6232f3f MVID-2021-0102 BACKDOOR.WIN32.KETCH.H Remote Stack Buffer Overflow (SEH) MD5: 63c55ad21e0771c7f9ca71ec3bfcea0f MVID-2021-0101 BACKDOOR.WIN32.INJECT.TYQ Insecure Permissions MD5: 833868d3092bea833839a6b8ec196046 MVID-2021-0100 BACKDOOR.WIN32.BIONET.10 Anonymous Logon MD5: be559307f5cd055f123a637b1135c8d3 MVID-2021-0099 BACKDOOR.WIN32.DARKKOMET.APCC Insecure Permissions MD5: 8c82de32ab2b407451b9fc054c09f717 MVID-2021-0098 BACKDOOR.WIN32.DARKKOMET.BHFH Insecure Permissions MD5: 2e507b75c0df0fcb2f9a85f4a0c1bc04 MVID-2021-0097 BACKDOOR.WIN32.AGENT.AAK Remote Buffer Overflow MD5: 64f2fd4dbd9039e5bc054f475eaa582a MVID-2021-0096 BACKDOOR.WIN32.AGENT.AAK Cross Site Request Forgery (CSRF) - Code Execution MD5: 64f2fd4dbd9039e5bc054f475eaa582a MVID-2021-0095 BACKDOOR.WIN32.AGENT.AAK Weak Hardcoded Credentials MD5: 64f2fd4dbd9039e5bc054f475eaa582a MVID-2021-0094 BACKDOOR.WIN32.BURBUL.B Anonymous Logon MD5: 3ee4cb2e06eb1f7fe54c89db903f3e7a MVID-2021-0093 BACKDOOR.WIN32.INDEXER.A Remote Denial Of Service MD5: 2b576e7551afe1c7575dc680396f1b5b MVID-2021-0092 BACKDOOR.WIN32.INDEXER.A Hardcoded Weak Credentials MD5: 2b576e7551afe1c7575dc680396f1b5b MVID-2021-0091 BACKDOOR.WIN32.BIFROSE.AHVB Insecure Permissions MD5: 39e22b8b19f6aed59d2def00c4228d56 MVID-2021-0090 BACKDOOR.WIN32.AZBREG.AANT Insecure Permissions MD5: dcc1855744f2d740745f096e4f031143 MVID-2021-0089 BACKDOOR.WIN32.CABROTOR.21 Insecure Permissions MD5: af7001c2d6284a1295638576bc138cb2 MVID-2021-0088 TROJAN-SPY.WIN32.WINSPY.WLT Insecure Permissions MD5: 00e1c4a654756dd6c9c81437c01ee3dd MVID-2021-0087 BACKDOOR.WIN32.CAFEINI.08.B Missing Authentication MD5: 8225bb6b430d5cdf523c4d0cabbe5793 MVID-2021-0086 BACKDOOR.WIN32.BACKLASH.101 Missing Authentication MD5: 4ba3c08d8ad964328f2b6f618f714df2 MVID-2021-0085 BACKDOOR.WIN32.BACKATTACK.18 Multiple Vulnerabilities MD5: c806d23f4343ab40cf897e9c38b5c1c3 MVID-2021-0084 BACKDOOR.WIN32.AUGUDOR.A Unauthenticated Remote File Write Code Execution MD5: 1b557d4f923b0de75e397686053a9022 MVID-2021-0083 BACKDOOR.WIN32.APHEXDOOR.LITESOCK Remote Stack Buffer Overflow MD5: a8bb1744bedf43849ed808b7dfa32da4 MVID-2021-0082 BACKDOOR.WIN32.NETTERRORIST Unauthorized Remote Command Execution MD5: 5131a9b441c9f9b20228f171c327a4f5 MVID-2021-0081 TROJAN.WIN32.CAFELOM.BU Heap Corruption MD5: 146ce177ab03b8f62a9fc6e7bbf40dc1 MVID-2021-0080 BACKDOOR.WIN32.WOLLF.15 Missing Authentication MD5: ffa917e74406b8b77252be2c4f71f6d3 MVID-2021-0079 TROJAN-SPY.WIN32.WINSPY.VWL Insecure Permissions EoP MD5: 0187e62ca40cb3d556a2c5825620bd8f MVID-2021-0078 TROJAN-SPY.WIN32.WEBCENTER.A Information Disclosure MD5: e3cf225a94c6be5a26fc21a1ec83f418 MVID-2021-0077 TROJAN-SPY.WIN32.SPYEYES.AWOW Insecure Permissions EoP MD5: e61a6755db1c59eb1d219b761de925f4 MVID-2021-0076 TROJAN-SPY.WIN32.SPYEYES.AUWL Insecure Permissions EoP MD5: 0115ba22a0d009a13d0748027dd62e2a MVID-2021-0075 TROJAN-SPY.WIN32.SPYEYES.AUQJ Insecure Permissions EoP MD5: ea6ed38ab5264cd92f0d42eb020e87d8 MVID-2021-0074 TROJAN.WIN32.GENTEE.H Insecure Permissions EoP MD5: 2bd5672432a545db03db0e09c120d42e MVID-2021-0073 TROJAN.WIN32.GENTEE.B Insecure Permissions EoP MD5: 86e63bb63f3baf48ad3bf24c3f5b7e40 MVID-2021-0072 TROJAN.WIN32.DELF.UQ Insecure Permissions EoP MD5: a4ea99b54e171274795f14a4ac7f17ba MVID-2021-0071 EMAIL-WORM.WIN32.SIRCAM.EB Insecure Permissions EoP MD5: cd88a9b686acd9ccf23dba8d248129b4 MVID-2021-0070 TROJAN.WIN32.COSPET.ABG Insecure Permissions EoP MD5: 5f5b308853b9aa9243390c135ff6ba1b MVID-2021-0069 TROJAN.WIN32.COMEI.PGO Insecure Permissions EoP MD5: 7cb253cf47b6de8adfea559e51950c17 MVID-2021-0068 BACKDOOR.WIN32.REMOTEMANIPULATOR.BRR Insecure Permissions EoP MD5: 717f316391b6a7b97fa160b0a627a413 MVID-2021-0067 BACKDOOR.WIN32.NETBULL.11.B Remote Buffer Overflow MD5: 0e0fc966862971c29edd4dcaa0ba8e86 MVID-2021-0066 BACKDOOR.WIN32.XYLIGAN.BLP Insecure Permissions EoP MD5: 6b9afcad282516173c0ab8a6eb91e8b4 MVID-2021-0065 BACKDOOR.WIN32.CELINE Missing Authentication MD5: 3a634db497c417679d7a20587d689d1f MVID-2021-0064 BACKDOOR.WIN32.BUTERAT.CXQ Insecure Permissions EoP MD5: 8bfac1f52a94f36b711e20bce30161cc MVID-2021-0063 BACKDOOR.WIN32.ANAPTIX.BD Insecure Permissions EoP MD5: 9f178de7f9918288d93ac0f065f0aa2f MVID-2021-0062 PACKED.WIN32.KATUSHA.O (RANSOMEWARE) Insecure Permissions EoP MD5: e184abe44bec183a522d2c66bc3f90e0 MVID-2021-0061 BACKDOOR.WIN32.MINIBLACKLASH Remote DoS MD5: 57dee3430d4531a2699f6520819a2ece MVID-2021-0060 BACKDOOR.WIN32.MHTSERV.B Missing Authentication MD5: 0ba104d752eb63194c356c309196c710 MVID-2021-0059 BACKDOOR.WIN32.ZHANGPO Remote DoS MD5: 052d18e119f9a2910ed18a137231a041 MVID-2021-0058 BACKDOOR.WIN32.ZETRONIC Remote DoS MD5: caf26a74ca39662e2c3d37e55a242daf MVID-2021-0057 CONSTRUCTOR.WIN32.SPYNET.A Remote Password Leak MD5: 1717731c32830a31e84b74641a4fdec7 MVID-2021-0056 BACKDOOR.WIN32.WOLLF.14 Missing Authentication MD5: ccd3e54eb76b3349db57481a0fe68b35 MVID-2021-0055 BACKDOOR.WIN32.DARKKOMET.APBB Insecure Permissions EoP MD5: d6c930e0ac1df934151d1890f6441fe2 MVID-2021-0054 BACKDOOR.WIN32.WOLLF.C Hardcoded Backdoor Password MD5: 91c02a95839a76a5d2e335cded7112a9 MVID-2021-0053 BACKDOOR.WIN32.DARKKOMET.BHFH Insecure Permissions MD5: 66fa06a4e3e799b059910dc17de295ae MVID-2021-0052 BACKDOOR.WIN32.WOLLF.16 Weak Hardcoded Password MD5: 5f79b779acd4c9c75211835a2783bccb MVID-2021-0051 TROJAN.WIN32.XOCRY.FF Insecure Permissions MD5: 8f13116d46a7097e14ef971d48d6a203 MVID-2021-0050 BACKDOOR.WIN32.NOKNOK.60 Insecure Permissions MD5: ecaf6a123fdf1f5660692dfc4c67a933 MVID-2021-0049 BACKDOOR.WIN32.JOKERDOOR (TDC MAIL SPY 1.0) Insecure Permissions MD5: 6c7b364dafe0560dfb15c9b03f1b44bd MVID-2021-0048 BACKDOOR.WIN32.NOKNOK.50 Insecure Permissions MD5: ca80897ee064ab9af5907344b316a247 MVID-2021-0047 BACKDOOR.WIN32.KRAIMER.11 Missing Authentication MD5: 2a4fda4a6687981d32c2da7bdc1efcf1 MVID-2021-0046 BACKDOOR.WIN32.HUPIGON.ADEF Remote Stack Buffer Overflow MD5: c8f55ce7bbec784a97d7bfc6d7b1931f MVID-2021-0045 BACKDOOR.WIN32.XEL Remote Buffer Overflow MD5: 3648c68bfe395fb9980ae547d881572c MVID-2021-0044 BACKDOOR.WIN32.VERIFY.F Missing Authentication MD5: 119cd00c48678d63ec07762a7ff08ac7 MVID-2021-0043 BACKDOOR.WIN32.ONALF Missing Authentication MD5: ba815d409cd714c0eac010b5970f6408 MVID-2021-0042 BACKDOOR.WIN32.ZXMAN Missing Authentication MD5: 6b2a9304d1c7a63365db0f9fd12d39b0 MVID-2021-0041 BACKDOOR.WIN32.WINSHELL.30 Remote Stack Buffer Overflow MD5: 56a2b135c8d35561ea5b04694155eb77 MVID-2021-0040 BACKDOOR.WIN32.WHISPER.B Remote Stack Corruption MD5: a0edb91f62c8c083ec35b32a922168d1 MVID-2021-0039 BACKDOOR.WIN32.WHIRLPOOL.10 Remote Buffer Overflow - (UDP Datagram) MD5: bf0682b674ef23cf8ba0deeaf546f422 MVID-2021-0038 BACKDOOR.WIN32.ZOMBAM.GEQ Remote Buffer Overflow MD5: fd14cc7f025f49a3e08b4169d44a774e MVID-2021-0037 EMAIL-WORM.WIN32.AGENT.GI Remote Stack Buffer Overflow - (UDP Datagram) MD5: 74e65773735f977185f6a09f1472ea46 MVID-2021-0036 BACKDOOR.WIN32.NETBULL.11.A Remote Buffer Overflow MD5: 80e98fdf726a3e727f3414bdbf2e86bb MVID-2021-0035 CONSTRUCTOR.WIN32.SMWG.C Insecure Permissions MD5: 47e819a6ce3d5e93819f4842cfbe23d6 MVID-2021-0034 CONSTRUCTOR.WIN32.SMWG.A Insecure Permissions MD5: 07cd532823d6ab05d6e5e3a56f7afbfd MVID-2021-0033 NEWFUTURE TROJAN V.1.0 BETA 1 Insecure Permissions MD5: 4f9376824718ff23a6238c877f73ff73 MVID-2021-0032 BACKDOOR.WIN32.MNETS Remote Stack Buffer Overflow - (UDP Datagram Proto) MD5: 1e42493dcef54a62bc28e0a1338c1142 MVID-2021-0031 BACKDOOR.WIN32.WHGRX Remote Host Header Stack Buffer Overflow - (UDP Datagram Protocol) MD5: eb6fd418cd3b52132ffb029b52839edf MVID-2021-0030 BACKDOOR.WIN32.LATINUS.B Remote Buffer Overflow MD5: 9adffcc98cd658a7f9c5419480013f72 MVID-2021-0029 BACKDOOR.WIN32.NUCLEROOT.T - MASKPE 1.6 File Based Buffer Overflow MD5: 170d3ccf9f036c552aef6690bf419b2e MVID-2021-0028 BACKDOOR.WIN32.NUCLEROOT.BI - MASKPE 2.0 File Based Buffer Overflow MD5: 25e0570cc803cd77abc2268b41237937 MVID-2021-0027 BACKDOOR.WIN32.NCX.BT Remote Stack Buffer Overflow MD5: ad5c01b3e6d0254adfe0898c6d16f927 MVID-2021-0026 BACKDOOR.WIN32.KETCH.A Remote SEH Stack Buffer Overflow MD5: 1149c42fd8cf3ca7d00ef55a6337befe MVID-2021-0025 BACKDOOR.WIN32.KETCH.I Remote SEH Stack Buffer Overflow MD5: ee314e1b913a09ec86c63d7186d8f0b8 MVID-2021-0024 BACKDOOR.WIN32.KURBADUR.A Remote Stack Buffer Overflow MD5: 821d3d5a9b15dc3388fe17f233cce296 MVID-2021-0023 BACKDOOR.WIN32.ZOMBAM.A Remote Stack Buffer Overflow MD5: 6c5081e9b65a52963b0b1ae612ef7eb4 MVID-2021-0022 BACKDOOR.WIN32.LEVELONE.B Remote Stack Buffer Overflow MD5: 3f82e6ddc9f5242f5af200d2fbae4ce4 MVID-2021-0021 BACKDOOR.WIN32.LEVELONE.A Remote Stack Buffer Overflow MD5: 6a2d09c4527cf222e4e2571b074fcc0c MVID-2021-0020 BACKDOOR.WIN32.KETCH.B Remote Stack Buffer Overflow MD5: 9d7be3799594a82bf7056905f501af03 MVID-2021-0019 BACKDOOR.WIN32.NINJASPY.C Remote Stack Buffer Overflow MD5: 6eece319bc108576bd1f4a8364616264 MVID-2021-0018 BACKDOOR.WIN32.XTREME.YVP Insecure Permissions EoP MD5: 7bd93c10c9373cfc2bcc8eff712631f1 MVID-2021-0017 BACKDOOR.WIN32.AGENT.DCBH Insecure Permissions EoP MD5: bba63df41adcf2cf80c74e4a62539d44 MVID-2021-0016 BACKDOOR.WIN32.ZOMBAM.K Remote String Dereference Stack Buffer Overflow MD5: 79d9908b6769e64f922e74a090f5ceeb MVID-2021-0015 EMAIL-WORM.WIN32.ZHELATIN.AGO Remote Stack Buffer Overflow MD5: 0418e7f95a8b94c035e10749234f8378 MVID-2021-0014 WIN32 BACKDOOR - 2019-02-ARTRADOWNLOADER Remote SEH Buffer Overflow - Insecure Permissions MD5: 8d42c01180be7588a2a68ad96dd0cf85 MVID-2021-0013 BACKDOOR.WIN32.BNLITE Remote Heap Corruption MD5: f78cef7588f9c32609a4932d10c67f95 MVID-2021-0012 TROJAN.WIN32.BARJAC Remote String Dereference Stack Buffer Overflow MD5: 62ad686f97faaa68f580d32d25333f51 MVID-2021-0011 BACKDOOR.WIN32.INFEXOR.B Remote SEH Stack Buffer Overflow MD5: 34c09f7fd6668c89a59ebdc8f12d1e7b MVID-2021-0010 HEUR.RISKTOOL.WIN32.BITMINER.GEN Remote Memory Corruption MD5: b85ae73dbbfff1d3b90cb7c78356f2a3 MVID-2021-0009 TROJAN.WIN32.JORIK.DMSPAMMER.SZ Remote Memory Corruption MD5: bdcaed5042eba30f91b093f0bcb3caf3 MVID-2021-0008 MAL100.TROJ.EVAD.WINEXE - PHORPIEX Insecure Permissions MD5: f4d7d721f68bc9a80aaf53bc184a3c58 MVID-2021-0007 BACKDOOR.WIN32.ZOMBAM.J Remote Stack Buffer Overflow MD5: a4212f23e1cc3bb34b0dfe15b2ad323e MVID-2021-0006 BACKDOOR.WIN32.REMOTEMANIPULATOR Insecure Permissions EoP MD5: 82183b3d85311a39fb80ae07357594e5 MVID-2021-0005 TROJAN:WIN32/ALYAK.B Remote Stack Corruption MD5: 6547f34243104ba6e21154ad96b799a5 MVID-2021-0004 BACKDOOR.WIN32.ADVERBOT Remote Stack Corruption MD5: 9919c1e86a750dd6d4f0d2a851af29ea MVID-2021-0003 TROJAN.WIN32.BAYROB.CGAU Insecure Permissions SYSTEM EoP MD5: 099a169f81089dc493ea300ef0309f70 MVID-2021-0002 TROJAN.WIN32.ANTAVKA.BZ Insecure Permissions EoP MD5: 2e4573d8925be404a9a1ff49ee2f5bc3 MVID-2021-0001 Download reports: wget http://malvuln.com/advisory/[ MD5.txt ] Download Adversary3 - Malware vulnerability Intel Tool for third-party attackers About: * malvuln.com is the first website exclusively dedicated to the research of security vulnerabilities within Malware itself. * There are many websites already offering information about Malware like Hashes, IOC, Reversing etc. However, none dedicated to research and analysis of vulnerabilities within Malware samples... until now. Long Live MALVULN * I do my own thing... * a6385a3bfd19b7ef5b384828a6b221ae * 23c348804eea02f17ea9da6911b512bd Viruscreds: Database of backdoor passwords used by Malware, uncovered by the Malvuln project. Contact: twitter.com/malvuln malvuln13[at]gmail.com Disclaimer: This site is for educational and research purposes only. The author of this site is not responsible for any damages or harm you may suffer by accessing this website or using any information contained herein. The author of this site doesn’t hold any responsibility over the misuse of the software, malware, exploits or security findings contained herein and does not condone them whatsoever. Moreover, the author of the site prohibits any malicious misuse of security informations contained and found here or elsewhere. By continuing to access this website you are agreeing to the full disclaimer presented here and you accept full liability and responsibility. Do not attempt to download Malware samples. The author of this website takes no responsibility for any kind of damages occurring from improper Malware handling or the downloading of ANY Malware mentioned on this website or elsewhere. malvuln.com and all of its content is Copyright (c) malvuln.com (TM) / Circa 2021.