www.malvuln.com Open in urlscan Pro
50.62.141.185  Public Scan

URL: https://www.malvuln.com/
Submission: On June 01 via manual from FR — Scanned from FR

Form analysis 0 forms found in the DOM

Text Content

 * Contact
 * About
 * PGP key
 * 29c02a6fe5c3d09ba32a9901a6824fb9

Malvuln Powered by malware TM
Finding and exploiting vulnerable Malware.

Download RansomLord v3 - Anti-Ransomware exploitation tool.
Download Adversary3 - Malware vulnerability Intel Tool for third-party attackers
By continuing to access this website you are agreeing to the full disclaimer
below.





TROJANSPY.WIN64.EMOTET.A

Arbitrary Code Execution
MD5: f917c77f60c3c1ac6dbbadbf366ddd30
MVID-2024-0684



BACKDOOR.WIN32.ASYNCRAT

Arbitrary Code Execution
MD5: 2337b9a12ecf50b94fc95e6ac34b3ecc
MVID-2024-0683



PANEL.SMOKELOADER

Cross Site Request Forgery (CSRF) - Persistent XSS
MD5: 4b5fc3a2489985f314b81d35eac3560f
MVID-2024-0682



PANEL.SMOKELOADER

Cross Site Scripting (XSS)
MD5: 4b5fc3a2489985f314b81d35eac3560f
MVID-2024-0681



PANEL.AMADEY.D.C

Cross Site Scripting (XSS)
MD5: 50467c891bf7de34d2d65fa93ab8b558
MVID-2024-0680



BACKDOOR.WIN32.DUMADOR.C

Remote Stack Buffer Overflow (SEH)
MD5: 6cc630843cabf23621375830df474bc5
MVID-2024-0679



TROJAN.WIN32.RAZY.ABC

Insecure Permissions (In memory IPC)
MD5: 0eb4a9089d3f7cf431d6547db3b9484d
MVID-2024-0678



BACKDOOR.WIN32.AGENT.JU

Authentication Bypass RCE
MD5: 0e6e40aad3e8d46e3c0c26ccc6ab94b3
MVID-2024-0677



RANSOM.WIN32.STOP (SMOKELOADER)

Remote Code Execution (MITM)
MD5: 3b9e9e130d52fe95c8be82aa4b8feb74
MVID-2024-0676



BACKDOOR.WIN32.EMEGRAB.B

Remote Stack Buffer Overflow (SEH)
MD5: 19a14d0414aec62ef38378de2e8b259d
MVID-2024-0675



BACKDOOR.WIN32.BEASTDOOR.OQ

Unauthenticated Remote Command Execution
MD5: 6268df4c9c805c90725dde4fe5ef6fea
MVID-2024-0674



BACKDOOR.WIN32.AGENT.AMT

Authentication Bypass
MD5: 2a442d3da88f721a786ff33179c664b7
MVID-2024-0673



BACKDOOR.WIN32.JEEMP.C

Cleartext Hardcoded Credentials
MD5: d6b192a4027c7d635499133ca6ce067f
MVID-2024-0672



BACKDOOR.WIN32.AUTOSPY.10

Unauthenticated Remote Command Execution
MD5: b012704cad2bae6edbd23135394b9127
MVID-2024-0671



BACKDOOR.WIN32.ARMAGEDDON.R

Hardcoded Cleartext Credentials
MD5: 68d135936512e88cc0704b90bb3839e0
MVID-2024-0670



TROJAN.WIN32 BANKSHOT

Remote Stack Buffer Overflow (SEH)
MD5: f2fd6a7b400782bb43499e722fb62cf4
MVID-2024-0669



TROJANSPY WIN32.NIVDORT

Insecure Permissions - EoP (SYSTEM)
MD5: 15bda00b57e2ed729a45f7cfa62165da
MVID-2024-0668



BACKDOOR.WIN32 CARBANAK (ANUNAK)

Named Pipe Null DACL
MD5: b8e1e5b832e5947f41fd6ae6ef6d09a1
MVID-2024-0667



RANSOM.WIN64.ATOMSILO

Crypto Logic Flaw
MD5: 5559e9f5e1645f8554ea020a29a5a3ee
MVID-2022-0666



BACKDOOR.WIN32.INCOMMANDER.17.B

Hardcoded Cleartext Credentials
MD5: dd76d8a5874bf8bf05279e35c68449ca
MVID-2022-0665



TROJAN-DROPPER.WIN32.DECAY.DXV (CYBERGATE V1.00.0)

Insecure Proprietary Password Encryption
MD5: 618f28253d1268132a9f10819a6947f2
MVID-2022-0664



BACKDOOR.WIN32.DELF.GJ

Information Disclosure
MD5: 8872c2ec49ff3382240762a029631684
MVID-2022-0663



WIN32.RANSOM.CONTI

Crypto Logic Flaw
MD5: 99e55ce93392068c970384ab24a0e13d
MVID-2022-0662



TROJAN.WIN32.DARKNEURON.GEN

Named Pipe Null DACL
MD5: d891c9374ccb2a4cae2274170e8644d8
MVID-2022-0661



BACKDOOR.WIN32.AUTOCRAT.B

Weak Hardcoded Credentials
MD5: 4262a8b52b902aa2e6bf02a156d1b8d4
MVID-2022-0660



BACKDOOR.WIN32.SERMAN.A

Unauthenticated Open Proxy
MD5: f312e3a436995b86b205a1a37b1bf10f
MVID-2022-0659



BACKDOOR.WIN32.OBLIVION.01.A

Insecure Transit Password Disclosure
MD5: aef85cf0d521eaa6aade11f95ea07ebe
MVID-2022-0658



TROJAN.WIN32.PLATINUM.GEN

Arbitrary Code Execution
MD5: 71a76adeadc7b51218d265771fc2b0d1
MVID-2022-0657



BACKDOOR.WIN32.QUUX

Weak Hardcoded Credentials
MD5: 13ce53de9ca4c4e6c58f990b442cb419
MVID-2022-0656



BACKDOOR.WIN32.REMSERV.D

Unauthenticated Remote Command Execution
MD5: 05a082d441d9cf365749c0e1eb904c85
MVID-2022-0655



HEUR:TROJAN.MSIL.AGENT.GEN

Information Disclosure
MD5: bc2ccf92bea475f828dcdcb1c8f6cc92
MVID-2022-0654



BACKDOOR.WIN32.APHEXDOOR.LITESOCK

Remote Stack Buffer Overflow (SEH)
MD5: 2047ac6183da4dfb61d2562721ba0720
MVID-2022-0653



EMAIL-WORM.WIN32.KIPIS.C

Remote File Write Code Execution
MD5: 8d0df60c96e4011c312d61ed3e6dc70e
MVID-2022-0652



BACKDOOR.WIN32.PSYCHWARD.10

Unauthenticated Remote Command Execution
MD5: 70c5f8d61f6ac67091c0c5860e456427
MVID-2022-0651



BACKDOOR.WIN32.DELF.ARH

Authentication Bypass
MD5: b3b19524967d22d6eb7517b03b660b00
MVID-2022-0650



BACKDOOR.WIN32.REDKOD.D

Weak Hardcoded Credentials
MD5: bb309bdd071d5733efefe940a89fcbe8
MVID-2022-0649



BACKDOOR.WIN32.DARKSKY.23

Remote Stack Buffer Overflow (SEH)
MD5: 1164ef21ef2af97e0339359c0dce5e7d
MVID-2022-0648



BACKDOOR.WIN32.DELF.EG

Unauthenticated Remote Command Execution
MD5: de6220a8e8fcbbee9763fb10e0ca23d7
MVID-2022-0647



BACKDOOR.WIN32.NTRC

Weak Hardcoded Credentials
MD5: 273fd3f33279cc9c0378a49cf63d7a06
MVID-2022-0646



BACKDOOR.WIN32.PSYCHWARD.B

Weak Hardcoded Credentials
MD5: 0b8cf90ab9820cb3fcb7f1d1b45e4e57
MVID-2022-0645



BACKDOOR.WIN32.AUGUDOR.B

Remote File Write Code Execution
MD5: 94ccd337cbdd4efbbcc0a6c888abb87d
MVID-2022-0644



BACKDOOR.WIN32.BINGLE.B

Weak Hardcoded Credentials
MD5: eacaa12336f50f1c395663fba92a4d32
MVID-2022-0643



BACKDOOR.WIN32.HELLZA.120

Authentication Bypass
MD5: 2cbd0fcf4d5fd5fb6c8014390efb0b21
MVID-2022-0642



BACKDOOR.WIN32.HELLZA.120

Unauthorized Remote Command Execution
MD5: 2cbd0fcf4d5fd5fb6c8014390efb0b21
MVID-2022-0641



TROJAN.RANSOM.RYUK.A

Arbitrary Code Execution
MD5: 5ac0f050f93f86e69026faea1fbb4450
MVID-2022-0640



TROJAN-DROPPER.WIN32.CORTY.10

Insecure Credential Storage
MD5: f72138e574743640bdcdb9f102dff0a5
MVID-2022-0639



TROJAN.WIN32.AUTOIT.FHJ

Named Pipe Null DACL
MD5: d871836f77076eeed87eb0078c1911c7
MVID-2022-0638



TROJAN.WIN32.AUTOIT.FHJ

Insecure Permissions
MD5: d871836f77076eeed87eb0078c1911c7
MVID-2022-0637



TROJAN-RANSOM.WIN32.HIVE.BV

Arbitrary Code Execution
MD5: 44aba241dd3f0d156c6ed82a0ab3a9e1
MVID-2022-0636



TROJAN-SPY.WIN32.POPHOT.BSL

Insecure Permissions
MD5: 8c0e6ec6b8ac9eb1169e63df71f24456
MVID-2022-0635



BACKDOOR.WIN32.HUPIGON.ASPG

Insecure Service Path
MD5: 121bf601275e2aed0c3a6fe7910f9826
MVID-2022-0634



BACKDOOR.WIN32.WINSHELL.5_0

Weak Hardcoded Credentials
MD5: 5bc5f72d19019a2fa3b75896e82ae1e5
MVID-2022-0633



WIN32.RANSOM.BLUESKY

Arbitrary Code Execution
MD5: 961fa85207cdc4ef86a076bbff07a409
MVID-2022-0632



BACKDOOR.WIN32.GUPTACHAR.20

Insecure Credential Storage
MD5: 857999d2306f257b80d1b8f6a51ae8b0
MVID-2022-0631



BACKDOOR.WIN32.BUSHTROMMEL.122

Unauthenticated Remote Command Execution
MD5: 76c09bc82984c7f7ef55eb13018e0d87
MVID-2022-0630



BACKDOOR.WIN32.BUSHTROMMEL.122

Authentication Bypass
MD5: 76c09bc82984c7f7ef55eb13018e0d87
MVID-2022-0629



BACKDOOR.WIN32.JOKERDOOR

Remote Stack Buffer Overflow
MD5: 783a191e7944e1af84ec0fa96d933f30
MVID-2022-0628



BACKDOOR.WIN32.DESTRUKOR.20

Unauthenticated Remote Command Execution
MD5: c790749f851d48e66e7d59cc2e451956
MVID-2022-0627



BACKDOOR.WIN32.DESTRUKOR.20

Authentication Bypass
MD5: c790749f851d48e66e7d59cc2e451956
MVID-2022-0626



BACKDOOR.WIN32.ECLIPSE.H

Weak Hardcoded Credentials
MD5: 8b470931114527b4dce42034a95ebf46
MVID-2022-0625



BUILDER XTREMERAT V3.7

Insecure Crypto Bypass
MD5: 7f314e798c150aedd9ce41ed39318f65
MVID-2022-0624



BUILDER XTREMERAT V3.7

Insecure Permissions
MD5: 7f314e798c150aedd9ce41ed39318f65
MVID-2022-0623



BACKDOOR.WIN32.HONEYPOT.A

Weak Hardcoded Password
MD5: e3bb503f9b02cf57341695f30e31128f
MVID-2022-0622



RANSOM LOCKBIT 3.0

Code Execution
MD5: 38745539b71cf201bb502437f891d799
MVID-2022-0621



RANSOM LOCKBIT 3.0

Local Unicode Buffer Overflow (SEH)
MD5: 38745539b71cf201bb502437f891d799
MVID-2022-0620



BACKDOOR.WIN32.EVILGOAT.B

Weak Hardcoded Credentials
MD5: 20daf01e941f966b21a7ae431faefc65
MVID-2022-0619



BACKDOOR.WIN32.COREDOOR.10.A

Authentication Bypass
MD5: 49da40a2ac819103da9dc5ed10d08ddb
MVID-2022-0618



BACKDOOR.WIN32.CAFEINI.B

Weak Hardcoded Credentials
MD5: a8fc1b3f7a605dc06a319bf0e14ca68b
MVID-2022-0617



TROJAN-MAILFINDER.WIN32.VB.P

Insecure Permissions
MD5: 20e438d84aa2828826d52540d80bf7f
MVID-2022-0616



BACKDOOR.WIN32.SHARK.BTU

Insecure Permissions
MD5: 5a83f8b8c8a8b7a85b3ff632aa60e793
MVID-2022-0615



BACKDOOR.WIN32.INFECDOOR.17.C

Insecure Permissions
MD5: 1fd70e41918c3a75c634b1c234ec36fb
MVID-2022-0614



YASHMA RANSOMWARE BUILDER V1.2

Insecure Permissions
MD5: 13e878ed7e547523cffc5728f6ba4190
MVID-2022-0613



BACKDOOR.WIN32.CABROTOR.10.D

Unauthenticated Remote Command Execution
MD5: 40acf109fa9621eae6930ef18f804909
MVID-2022-0612



TROJAN-BANKER.WIN32.BANBRA.CYT

Insecure Permissions
MD5: e0f2bee25dd103d92e91e895e313ec34
MVID-2022-0611



TROJAN-PROXY.WIN32.SYMBAB.O

Heap Corruption
MD5: bffc519fbaf2d119bd307cd22368cdc7
MVID-2022-0610



RANSOM.HARON

Code Execution
MD5: dedad693898bba0e4964e6c9a749d380
MVID-2022-0609



TROJAN-BANKER.WIN32.BANKER.AGZG

Insecure Permissions
MD5: ef1e59148c9a902ae5454760aaab73fe
MVID-2022-0608



TROJAN-RANSOM.THANOS

Code Execution
MD5: be60e389a0108b2871dff12dfbb542ac
MVID-2022-0607



RANSOM.CONTI

Code Execution
MD5: eedd1cfc7acd012bbec464aebc679ee4
MVID-2022-0606



RANSOM.CONTI

Code Execution
MD5: 146ec3f6c262d0f287e67ddb3cc69892
MVID-2022-0605



RANSOM.CONTI

Code Execution
MD5: 0c4502d6655264a9aa420274a0ddeaeb
MVID-2022-0604



RANSOM.CONTI

Code Execution
MD5: 6748dfe8e64dea2fc4c14691f7e766c6
MVID-2022-0603



RANSOM.CONTI

Code Execution
MD5: 7ba20fce7ac259f6062f73290c2e28cf
MVID-2022-0602



RANSOM.CONTI

Code Execution
MD5: b485c36f28c5c967a50001c9e8d2c29c
MVID-2022-0601



RANSOM.REVIL

Code Execution
MD5: daab2c9d58acc367032f32bb8097e310
MVID-2022-0600



RANSOM.REVIL

Code Execution
MD5: ab1aaa8f96c61684736da00ece5a9c83
MVID-2022-0599



RANSOM.REVIL

Code Execution
MD5: c9bf7216cdc2673bf4ee2af8b19bcfc8
MVID-2022-0598



RANSOM.REVIL

Code Execution
MD5: 7ff073cc9e4e6750ba52135ba02ee531
MVID-2022-0597



RANSOM.REVIL

Code Execution
MD5: 8ca35b7867e23a1bbb0fea6d51fc1b61
MVID-2022-0596



RANSOM.REVIL

Code Execution
MD5: 7a96d7a1f28bfb6ae36a15263a8a7135
MVID-2022-0595



APT28 FANCYBEAR

Code Execution
MD5: d6751b148461e0f863548be84020b879
MVID-2022-0594



RANSOM.SATANA

Code Execution
MD5: 46bfd4f1d581d7c0121d2b19a005d3df
MVID-2022-0593



RANSOM.CONTI

Code Execution
MD5: 20f0c736a966142de88dee06a2e4a5b1
MVID-2022-0592



RANSOM.PETYA

Code Execution
MD5: 8ed9a60127aee45336102bf12059a850
MVID-2022-0591



RANSOM.CRYAKL

Code Execution
MD5: 2aea3b217e6a3d08ef684594192cafc8
MVID-2022-0590



TROJAN-RANSOM.RADAMANT

Code Execution
MD5: 6152709e741c4d5a5d793d35817b4c3d
MVID-2022-0589



TROJAN.CRYPTOLOCKER

Code Execution
MD5: 209a288c68207d57e0ce6e60ebf60729
MVID-2022-0588



TROJAN-RANSOM.LOCKERGOGA

Code Execution
MD5: 3b200c8173a92c94441cb062d38012f6
MVID-2022-0587



RANSOM.CTBLOCKER

Code Execution
MD5: de25f04dedaffde1be47ef26dc9a8176
MVID-2022-0586



TROJAN-RANSOM.CERBER

Code Execution
MD5: ae99e6a451bc53830be799379f5c1104
MVID-2022-0585



TROJAN.RANSOM.CRYPTOWALL

Code Execution
MD5: 0CFFEE266A8F14103158465E2ECDD2C1
MVID-2022-0584



REVIL.RANSOM

Code Execution
MD5: 4c5c1731481ea8d67ef6076810c49e00
MVID-2022-0583



RANSOM.WANNACRY

Code Execution
MD5: 84c82835a5d21bbcf75a61706d8ab549
MVID-2022-0582



REVIL.RANSOM

Code Execution
MD5: 979635229dfcfae1aae74ae296ec78c8
MVID-2022-0581



RANSOM.CONTI

Code Execution
MD5: 3c55ee6753408bff2e3e6a392ed9f2a0
MVID-2022-0580



CONTI.RANSOM

Code Execution
MD5: 710a77804637f65e22a2e230ff6444f9
MVID-2022-0579



REDLINE.STEALER

Code Execution
MD5: 0adb0e2ac8aa969fb088ee95c4a91536
MVID-2022-0578



REVIL RANSOM

Code Execution
MD5: 7d7ee58c2696794b3be958b165eb61a9
MVID-2022-0577



CONTI RANSOM

Code Execution
MD5: 9eb9197cd58f4417a27621c4e1b25a71
MVID-2022-0576



LOKILOCKER RANSOM

Code Execution
MD5: 2ffc2446a2a6cf04c06a85deb43b9fb8
MVID-2022-0575



BLACKBASTA RANSOM

Code Execution
MD5: 998022b70d83c6de68e5bdf94e0f8d71
MVID-2022-0574



RANSOM.AVOSLOCKER

Code Execution
MD5: 40f2238875fcbd2a92cfefc4846a15a8
MVID-2022-0573



RANSOM.LOCKBIT

DLL Hijacking
MD5: 96de05212b30ec85d4cf03386c1b84af
MVID-2022-0572



BACKDOOR.WIN32.AGENT.AEGG

Weak Hardcoded Credentials
MD5: 58be35e792476d1c015df7853112d200
MVID-2022-0571



TROJAN-DOWNLOADER.WIN32.AGENT

Insecure Permissions
MD5: fb3ac3c9d808de7f4b5ede68715f658f
MVID-2022-0570



BACKDOOR.WIN32.CAFEINI.B

Port Bounce Scan
MD5: 851f8945d1b5923990f4722d627156a0
MVID-2022-0569



BACKDOOR.WIN32.CAFEINI.B

Weak Hardcoded Credentials
MD5: 851f8945d1b5923990f4722d627156a0
MVID-2022-0568



TROJAN-DOWNLOADER.WIN32.SMALL.AHLQ

Insecure Permissions
MD5: d859ba54086fd0313dc34b73b5b1eccb
MVID-2022-0567



BACKDOOR.WIN32.GF.J

Unauthenticated Remote Command Execution
MD5: fa00524d7289cdba327d5c34ab3d9bd7
MVID-2022-0566



VIRUS.WIN32.QVOD.B

Insecure Permissions
MD5: c44a9580e17bad0aa27329e51b7d0ae0
MVID-2022-0565



EMAIL-WORM.WIN32.SIDEX

Unauthenticated Remote Command Execution
MD5: a98cdaa89da57bf269873db63e22a939
MVID-2022-0564



NET-WORM.WIN32.KIBUV.C

Authentication Bypass
MD5: 4243911d5ca5655d04de8895704fcae6
MVID-2022-0563



BACKDOOR.WIN32.JOKERDOOR

Remote Stack Buffer Overflow
MD5: 94d1b2510bf96fa6190cd65876bf4c38
MVID-2022-0562



TROJAN-BANKER.WIN32.BANKER.HEQ

Insecure Permissions
MD5: f15d05f74899324ecb61ee29ad162fad
MVID-2022-0561



BACKDOOR.WIN32.GATEHELL.21

Port Bounce Scan
MD5: 5aa81ddc996be64116754efac0e4f55d
MVID-2022-0560



BACKDOOR.WIN32.GATEHELL.21

Authentication Bypass
MD5: 5aa81ddc996be64116754efac0e4f55d
MVID-2022-0559



BACKDOOR.WIN32.PSYCHWARD.03.A

Weak Hardcoded Password
MD5: 4b9a42ca1e65cf0a7febbe18f397ef24
MVID-2022-0558



BACKDOOR.WIN32.HUPIGON.HAQJ

Insecure Service Path
MD5: d9542df20f8df457747451dd9e16d1c0
MVID-2022-0557



BACKDOOR.WIN32.DELF.ZN

Insecure Credential Storage
MD5: 9acdbfc9f7c1f6e589485b30aa91bfd2
MVID-2022-0556



TROJAN.WIN32.TSCASH.C

Insecure Permissions
MD5: 9d18d318e017b513b9c6cd193ccdc6ff
MVID-2022-0555



BACKDOOR.WIN32.LOSELOVE

Denial of Service
MD5: 9a8150938bff3a17fa0169c3dc6dae85
MVID-2022-0554



HACKTOOL.WIN32.DELF.VS

Insecure Credential Storage
MD5: 92f7f9495ffd56d05a5acf395c9e0097
MVID-2022-0553



BACKDOOR.WIN32.NINJASPY.C

Authentication Bypass
MD5: 9f39606d9e19771af5acc6811ccf557f
MVID-2022-0552



BACKDOOR.WIN32.NETSPY.10

Unauthenticated Remote Command Execution
MD5: 45d413b46f1d14a45e8fd36921813d62
MVID-2022-0551



BACKDOOR.WIN32.NETCAT32.10

Unauthenticated Remote Command Execution
MD5: dcf16aed5ad4e0058a6cfcc7593dd9e3
MVID-2022-0550



HACKTOOL.WIN32.IPCSCAN.C

Local Stack Buffer Overflow
MD5: 8f44374d587eb1657d25da9628cb2b87
MVID-2022-0549



BACKDOOR.WIN32.PSYCHWARD.03.A

Weak Hardcoded Password
MD5: d069738f18957117367b8a79195a6a96
MVID-2022-0548



EMAIL-WORM.WIN32.PLUTO.B

Insecure Permissions
MD5: 60a7d5e2d446110d84ef65f6a37af0eb
MVID-2022-0547



DENIAL OF SERVICE (UDP DATAGRAM)

Backdoor.Win32.Kilo.016
MD5: 9ede6951ea527f96a785c5e32b5079e6
MVID-2022-0546



BACKDOOR.WIN32.PRORAT.CWX

Insecure Permissions
MD5: 2d81bf2c55c81778533b55fb444d4dc6
MVID-2022-0545



BACKDOOR.WIN32.MOTIVFTP.12

Authentication Bypass
MD5: 91b2d216c5d26d9db4289acf68fa1743
MVID-2022-0544



BACKDOOR.WIN32.XLOG.21

Authentication Bypass Race Condition
MD5: 2906b5dc5132dd1319827415e837168f
MVID-2022-0543



BACKDOOR.WIN32.XINGDOOR

Denial of Service
MD5: 89000e259ffbd107b7cc9bac66dcdcf5
MVID-2022-0542



BACKDOOR.WIN32.WISELL

Stack Buffer Overflow (SEH)
MD5: 837ec70bfb305b5c862ff9b04e70a318
MVID-2022-0541



BACKDOOR.WIN32.FTP.LANA.01.D

Port Bounce Scan
MD5: ea9ab5983a6fa71e31907e74d4ddbab6
MVID-2022-0540



BACKDOOR.WIN32.FTP.LANA.01.D

Weak Hardcoded Credentials
MD5: ea9ab5983a6fa71e31907e74d4ddbab6
MVID-2022-0539



BACKDOOR.WIN32.VERIFY.H

Unauthenticated Remote Command Execution
MD5: 82641dabbb1f73dd775e200466a07ec1
MVID-2022-0538



BACKDOOR.WIN32.PTAKKS.XP.A

Insecure Credential Storage
MD5: e087725b01dded75d85a20db58335fa8
MVID-2022-0537



BACKDOOR.WIN32.WISELL

Unauthenticated Remote Command Execution
MD5: 837ec70bfb305b5c862ff9b04e70a318
MVID-2022-0536



BACKDOOR.WIN32.BIFROSE.UW

Insecure Permissions
MD5: 9e4f942c60044feef0fb48538ffac383
MVID-2022-0535



BACKDOOR.WIN32.EASYSERV.11.C

Insecure Transit
MD5: 3b5564e88a0b8a41e4fd730891e635cc
MVID-2022-0534



BACKDOOR.WIN32.TINY.A

Uauthenticated Remote Command Execution
MD5: 9fa664bc52e1aa46a09ac51aaa6c7384
MVID-2022-0533



BACKDOOR.WIN32.DELF.PS

Information Disclosure
MD5: cf3c08afa6c2d49ba36ed0f895893d71
MVID-2022-0532



BACKDOOR.WIN32.JOKERDOOR

Weak Hardcoded Credentials
MD5: a6437375fff871dff97dc91c8fd6259f
MVID-2022-0531



BACKDOOR.WIN32.WOLLF.H

Unauthenticated Remote Command Execution
MD5: 867c6b432ccd4aa51adc5e2722a4b144
MVID-2022-0530



BACKDOOR.WIN32.AVSTRAL.E

Unauthenticated Remote Command Execution
MD5: 35f0d754f161af35241cb081c73ea6dd
MVID-2022-0529



BACKDOOR.WIN32.CHUBO.C

Cross Site Scripting (XSS)
MD5: c16b04a9879896ef453a6deb13528087
MVID-2022-0528



BACKDOOR.WIN32.CHUBO.C

Unauthenticated Remote Command Execution
MD5: c16b04a9879896ef453a6deb13528087
MVID-2022-0527



BACKDOOR.WIN32.CAFEINI.B

Weak Hardcoded Credentials
MD5: b24c56abb4bde960c2d51d4e509d2c68
MVID-2022-0526



BACKDOOR.WIN32.CAFEINI.B

Denial of Service
MD5: b24c56abb4bde960c2d51d4e509d2c68
MVID-2022-0525



BACKDOOR.WIN32.CYN.20

Insecure Permissions
MD5: 3dd1da64e306cae0409e154e15dd1b80
MVID-2022-0524



BACKDOOR.WIN32.BIRDSPY.B

Weak Hardcoded Credentials
MD5: eba3dd81723ddf33621fd85ded577920
MVID-2022-0523



BACKDOOR.WIN32.AGENT.BXXN

Open Proxy
MD5: dcbc237f21839a6514c8321d5fa631a4
MVID-2022-0522



BUILDERREVENGERAT - (REVENGE-RAT V0.3)

XML External Entity Injection
MD5: 531d8b4ac8f7eb827d62424169321b2b
MVID-2022-0521



BUILDERTORCTPHPRAT.B

Remote Persistent XSS
MD5: 838f67d7a4b6824ec59892057aab3bb7
MVID-2022-0520



BUILDERTORCTPHPRAT.B

Arbitrary File Upload - RCE
MD5: 838f67d7a4b6824ec59892057aab3bb7
MVID-2022-0519



BUILDERTORCTPHPRAT.B

Insecure Credential Storage
MD5: 838f67d7a4b6824ec59892057aab3bb7
MVID-2022-0518



BUILDERPANDORARAT.B

Insecure Credential Storage
MD5: ae4a409d217bbd538009fbbb5457e754
MVID-2022-0517



BUILDERORCUS

Insecure Credential Storage
MD5: cc3670f1b3e60e00b43c86d787563a44
MVID-2022-0516



BUILDERORCUS

Insecure Permissions
MD5: cc3670f1b3e60e00b43c86d787563a44
MVID-2022-0515



HADES RAT - WEB PANEL

Remote Persistent XSS
MD5: c4cc1317aea42f7dd4a1b786c5278a24
MVID-2022-0514



HADES RAT - WEB PANEL

Information Disclosure
MD5: c4cc1317aea42f7dd4a1b786c5278a24
MVID-2022-0513



HADES RAT - WEB PANEL

Insecure Credential Storage
MD5: c4cc1317aea42f7dd4a1b786c5278a24
MVID-2022-0512



REDLINE.MAINPANEL - CRACKED.EXE

Insecure Permissions
MD5: baf102927947289e4d589028620ce291
MVID-2022-0511



LOKI RAT (RELAPSE) WEB PANEL

SQL Injection
MD5: aabb54951546132e70a8e9f02bf8b5ba
MVID-2022-0510



LOKI RAT (RELAPSE) WEB PANEL

Directory Traversal - Arbitrary File Deletion
MD5: aabb54951546132e70a8e9f02bf8b5ba
MVID-2022-0509



BACKDOOR.WIN32.DIRECTCONNECTION.103

Weak Hardcoded Password
MD5: 6a6ce3e7f24bf000d9a011a8f1905da8
MVID-2022-0508



BACKDOOR.WIN32.REMOTENC.BETA4

Unauthenticated Remote Command Execution
MD5: 2862de561d91eedb265df4ae9b0fc872
MVID-2022-0507



BACKDOOR.WIN32.BLUANWEB

Unauthenticated Remote Command Execution
MD5: 30903ccbc6747c0da5a2775884b78def
MVID-2022-0506



BACKDOOR.WIN32.BLUANWEB

Information Disclosure
MD5: 0903ccbc6747c0da5a2775884b78def
MVID-2022-0505



BACKDOOR.WIN32.BLUANWEB

Unauthenticated Remote Code Execution
MD5: 30903ccbc6747c0da5a2775884b78def
MVID-2022-0504



BACKDOOR.WIN32.FTP.NUCLEAR.10

Hardcoded Credentials
MD5: 9c23dad9ba11305fecf38bed46b0cec2
MVID-2022-0503



BACKDOOR.WIN32.BNLITE

Remote Stack Buffer Overflow
MD5: 0d1f873f6816debd244e1e77509f6ba7
MVID-2022-0502



BACKDOOR.WIN32.AUGUDOR.A

Unauthenticated Remote File Write - RCE
MD5: bf1b1a2f4be78d6b62ed7c316c77a9a1
MVID-2022-0501



BACKDOOR.WIN32.FTP.ICS

Port Bounce Scan (MITM)
MD5: 584bc06128469423f9e50e8a359d18ac
MVID-2022-0500



BACKDOOR.WIN32.FTP.ICS

Unauthenticated Remote Command Execution
MD5: 584bc06128469423f9e50e8a359d18ac
MVID-2022-0499



BACKDOOR.WIN32.FTP.ICS

Authentication Bypass
MD5: 584bc06128469423f9e50e8a359d18ac
MVID-2022-0498



BACKDOOR.WIN32.ACROPOLIS.10

Insecure Permissions
MD5: c3e2bbe5dca96687422f2b4e8c80f4ce
MVID-2022-0497



BACKDOOR.WIN32.DSOCKS.10

Hardcoded Cleartext Password
MD5: 3a505e7ea1beee556860488e34db8da6
MVID-2022-0496



BACKDOOR.WIN32.AGENT.BAOL

Insecure Permissions
MD5: 1f84a5305b65d7f6aa3afa7e2f2bda0e
MVID-2022-0495



TROJAN.WIN32.COSMU.ABIX

Insecure Permissions
MD5: b4638a10f7cfdbf39b9fef7539c63852
MVID-2022-0494



TROJAN-SPY.WIN32.ZBOT.AAWO.ZEUS-BUILDER

Insecure Permissions
MD5: fe0dacbc953d4301232b386fcb3afc23
MVID-2022-0493



BACKDOOR.WIN32.PROSTI.B

Insecure Permissions
MD5: 8201ba6b542fc91c004110b2fc5395aa
MVID-2022-0492



EMAIL-WORM.WIN32.LAMA

Insecure Permissions
MD5: 1c255ef6fd44877700867f94a59875d2
MVID-2022-0491



BACKDOOR.WIN32.PRORAT.LKT

Weak Hardcoded Password
MD5: 65a53a37843db2b86a67a9e23277c1bf
MVID-2022-0490



BACKDOOR.WIN32.ZOMBAM.B

Cross Site Scripting (XSS)
MD5: 1e3665a67201209609ae493a2a590bee
MVID-2022-0489



BACKDOOR.WIN32.ZOMBAM.B

Unauthenticated Information Disclosure
MD5: 1e3665a67201209609ae493a2a590bee
MVID-2022-0488



BACKDOOR.WIN32.ZOMBAM.B

Remote Stack Buffer Overflow
MD5: 1e3665a67201209609ae493a2a590bee
MVID-2022-0487



BACKDOOR.WIN32.FREDDY.2001

Authentication Bypass Command Execution
MD5: 434923afc32a7bc7355ed9a5224b9273
MVID-2022-0486



BACKDOOR.WIN32.PREXOT.A

Port Bounce Scan (MITM)
MD5: 29bc048d58ab8038c7001ef0d5e69c9b
MVID-2022-0485



BACKDOOR.WIN32.PREXOT.A

Authentication Bypass
MD5: 29bc048d58ab8038c7001ef0d5e69c9b
MVID-2022-0484



BACKDOOR.WIN32.WDOOR.11

Unauthenticated Remote Command Execution
MD5: 55822613e0d0f437f3ebe5c7f4155452
MVID-2022-0483



BACKDOOR.WIN32.XRAT.K

Unauthenticated Remote Command Execution
MD5: 3d4350282ae043177063de2ad4827b97
MVID-2022-0482



BACKDOOR.WIN32.FRAUDER.JT

Insecure Permissions
MD5: 16fab35b51f9e6447f2a8c04db4ebe93
MVID-2022-0481



BACKDOOR.WIN32.SMALL.ER

Unauthenticated Remote Command Execution
MD5: 9f11868c3beaa8e2c1f5c193f5888b85
MVID-2022-0480



BACKDOOR.WIN32.SMALL.BU (KGB- RAT SERVER V0.1)

Unauthenticated Remote Command Execution
MD5: 36ca28db068b6f6634d633fe61d34a7d
MVID-2022-0479



BACKDOOR.WIN32.ZXMAN

Unauthenticated Remote Code Execution
MD5: e369bbd8acbe8322834e3adbad30ff5c
MVID-2022-0478



BACKDOOR.WIN32.WOLLF.M

Weak Hardcoded Password
MD5: f375f6569e146e432e23589b8f112165
MVID-2022-0477



BACKDOOR.WIN32.TINY.C

Unauthenticated Remote Command Execution
MD5: c61733c6bcbbb11cee634e0a3fd672e9
MVID-2022-0476



HACKTOOL.WIN32.MUZZER.A

Heap Based Buffer Overflow
MD5: c9291c93fce757a665352567ca13ec3f
MVID-2022-0475



BACKDOOR.WIN32.WINSHELL.50

Weak Hardcoded Password
MD5: 1fd45364073a81ddd707d74ba5d4c121
MVID-2022-0474



COSANOSTRA BUILDER WEBPANEL

Cross Site Request Forgery (CSRF)
MD5: 61285c988de52b7c067fb2e703f2ab83
MVID-2022-0473



COSANOSTRA BUILDER WEBPANEL

Insecure Crypto
MD5: 61285c988de52b7c067fb2e703f2ab83
MVID-2022-0472



COSANOSTRA BUILDER

Insecure Permissions
MD5: 61285c988de52b7c067fb2e703f2ab83
MVID-2022-0471



BACKDOOR.WIN32.DRA.C

Weak Hardcoded Password
MD5: 5ff832ce6af4b03a709eaf380672cf34
MVID-2022-0470



BACKDOOR.WIN32.FTP.LANA.01.D

Port Bounce Scan (MITM)
MD5: fc100ff65f676a26293915407adc211c
MVID-2022-0469



BACKDOOR.WIN32.FTP.LANA.01.D

Weak Hardcoded Password
MD5: fc100ff65f676a26293915407adc211c
MVID-2022-0468



BACKDOOR.WIN32.HANUMAN.B

Unauthenticated Remote Command Execution
MD5: 4087cffab90fa22c2882e2f97a467e8e
MVID-2022-0467



BACKDOOR.WIN32.FTP99

Port Bounce Scan (MITM)
MD5: 09dd14d3988e08a56798b1480c55a5b0
MVID-2022-0466



BACKDOOR.WIN32.FTP99

Authentication Bypass Race Condition
MD5: 09dd14d3988e08a56798b1480c55a5b0
MVID-2022-0465



BACKDOOR.WIN32.AGENT.UQ

Insecure Permissions
MD5: b83836d7e6b0893e08d88a7850ca84ee
MVID-2022-0464



BACKDOOR.WIN32.WOLLF.16

Weak Hardcoded Credentials
MD5: 204613443e555f73237ea43a2faecaa5
MVID-2022-0463



BACKDOOR.WIN32.WOLLF.16

Authentication Bypass
MD5: 204613443e555f73237ea43a2faecaa5
MVID-2022-0462



RANSOMWARE BUILDER BABUK

Insecure Permissions
MD5: 5dfa998f62612e10d5d28d26948dd50f
MVID-2022-0461



BACKDOOR.WIN32.WISELL

Unauthenticated Remote Command Execution
MD5: 57bda78cc5fd6a06017148bae28e8e39
MVID-2022-0460



COLLECTORSTEALERBUILDER V2.0.0 PANEL

Man-in-the-Middle (MITM)
MD5: 54530f88c8e4f4371c9418f00c256b1d
MVID-2022-0459



COLLECTORSTEALERBUILDER V2.0.0 PANEL

Insecure Credential Storage
MD5: 54530f88c8e4f4371c9418f00c256b1d
MVID-2022-0458



VULTURIBUILDER

Insecure Permissions
MD5: ca294b2f778abc14fef6313b3cea7155
MVID-2022-0457



CHAOS RANSOMEWARE BUILDER V4

Insecure Permissions
MD5: 8b855e56e41a6e10d28522a20c1e0341
MVID-2022-0456



AGENTTESLA BUILDER WEB PANEL

SQL Injection
MD5: db9629508fda139f71f625d764c7eff7
MVID-2022-0455



AGENTTESLA BUILDER WEB PANEL

Cross Site Scripting (XSS)
MD5: db9629508fda139f71f625d764c7eff7
MVID-2022-0454



WIN32.MARSSTEALER WEB PANEL

Unauthenticated Remote Data Deletion
MD5: 8abb41f6e7010d70c90f65fd9a740faa
MVID-2022-0453



WIN32.MARSSTEALER WEB PANEL

Unauthenticated Remote Persistent XSS
MD5: 8abb41f6e7010d70c90f65fd9a740faa
MVID-2022-0452



WIN32.MARSSTEALER WEB PANEL

Unauthenticated Remote Information Disclosure
MD5: 8abb41f6e7010d70c90f65fd9a740faa
MVID-2022-0451



AB STEALER WEB PANEL

Unauthenticated Remote Persistent XSS
MD5: 9e44c10307aa8194753896ecf8102167
MVID-2022-0450



BACKDOOR.WIN32.CONTROLIT.10

Unauthenticated Remote Command Execution
MD5: 859aab793a42868343346163bd42f485
MVID-2022-0449



BACKDOOR.WIN32.SUBSEVEN.C

Remote Stack Buffer Overflow
MD5: bc7f4c4689f1b8ad395404d1e75c776f
MVID-2022-0448



BACKDOOR.WIN32.SVC

Directory Traversal
MD5: 011961a42700e7385a106d362eb661c7
MVID-2022-0447



BACKDOOR.WIN32.SVC

Remote Stack Buffer Overflow
MD5: 011961a42700e7385a106d362eb661c7
MVID-2022-0446



BACKDOOR.WIN32.DSKLITE.A

Insecure Transit
MD5: 6c9665de78ae60a8e057d2c9cdb91596
MVID-2022-0445



BACKDOOR.WIN32.DSKLITE.A

Remote Denial of Service
MD5: 6c9665de78ae60a8e057d2c9cdb91596
MVID-2022-0444



BACKDOOR.WIN32.JTRAM.A

Port Bounce Scan
MD5: 596882dfba543b23ad3225d24ee5e800
MVID-2022-0443



BACKDOOR.WIN32.JTRAM.A

Insecure Credential Storage
MD5: 596882dfba543b23ad3225d24ee5e800
MVID-2022-0442



BACKDOOR.WIN32.SILENTSPY.10

Authentication Race Condition
MD5: a7ce38e60cf08f2b234f34043b87e701
MVID-2021-0441



BACKDOOR.WIN32.SILENTSPY.10

Authentication Bypass Command Execution
MD5: a7ce38e60cf08f2b234f34043b87e701
MVID-2021-0440



BACKDOOR.WIN32.FANTADOR

Insecure Password Storage
MD5: a1d045151c809535a308311931588fd0
MVID-2021-0439



BACKDOOR.WIN32.FANTADOR

Divide by Zero DoS
MD5: a1d045151c809535a308311931588fd0
MVID-2021-0438



BACKDOOR.WIN32.SKRAT

Cleartext Hardcoded Password
MD5: d724feed69ec7b624e4e178ad6579cfb
MVID-2021-0437



BACKDOOR.WIN32.WOLLF.M

Authentication Bypass
MD5: b125a9a083447ad7d437e3e7f3ed5325
MVID-2021-0436



BACKDOOR.WIN32.WOLLF.M

Weak Hardcoded Password
MD5: b125a9a083447ad7d437e3e7f3ed5325
MVID-2021-0435



BACKDOOR.WIN32.JOKERDOOR

Remote Stack Buffer Overflow
MD5: 0fca0250fa3fe8ee7e1cf0cc45a6b2d8
MVID-2021-0434



BACKDOOR.WIN32.FTP.SIMPEL.12

Insecure Crypto
MD5: 1d12f9b921b38d7b521f12442bdd52d8
MVID-2021-0433



BACKDOOR.WIN32.FTP.SIMPEL.12

Port Bounce Scan
MD5: 1d12f9b921b38d7b521f12442bdd52d8
MVID-2021-0432



BACKDOOR.WIN32.VISIOTROL.10

Insecure Password Storage
MD5: f9dc0a462ada737f36efafac56f22b97
MVID-2021-0431



BACKDOOR.WIN32.MELLPON.B

Remote Unauthenticated Information Disclosure
MD5: e499a4c359a8cc46e641f39c0ed548f9
MVID-2021-0430



BACKDOOR.WIN32.BNLITE

Remote Heap Based Buffer Overflow
MD5: 9cec5a23887f0c73148ab3ea147a6fa4
MVID-2021-0429



BACKDOOR.WIN32.PHASE.11

Unauthenticated Remote Command Execution
MD5: fb4fb710f031304d788d9cd1c4201552
MVID-2021-0428



BACKDOOR.WIN32.RAMUS

Unauthenticated Remote Code Execution
MD5: 20cfe4912b280ad141d51f1f7370bfa5
MVID-2021-0427



BACKDOOR.WIN32.JOKERDOOR

Remote Stack Buffer Overflow
MD5: 8f18703c433b5703a7131c1afeacfd74
MVID-2021-0426



BACKDOOR.WIN32.FTP.MATITEMAN

Weak Hardcoded Password
MD5: fc8eaa2a5752b509dbd02989d8d9f2e2
MVID-2021-0425



BACKDOOR.WIN32.BACKATTACK.20

Authentication Bypass RCE
MD5: 8b484576f928c256277016104cc364c2
MVID-2021-0424



BACKDOOR.WIN32.BACKATTACK.20

Unauthenticated Remote Command Execution
MD5: 8b484576f928c256277016104cc364c2
MVID-2021-0423



BACKDOOR.WIN32.NCX.B

Remote Stack Buffer Overflow
MD5: 991c1f02c809cee860cb712896a45338
MVID-2021-0422



BACKDOOR.WIN32.NCX.B

Unauthenticated Remote Command Execution
MD5: 991c1f02c809cee860cb712896a45338
MVID-2021-0421



BACKDOOR.WIN32.NUCLEROOT.MF

Stack Buffer Overflow
MD5: 8de56eef118187a89eeab972288ce94d
MVID-2021-0420



BACKDOOR.WIN32.ASYLUM.014

Cleartext Password Storage
MD5: a83989d36f3b443a757eef1c99f1a373
MVID-2021-0419



BACKDOOR.IRC.SUBHUMAN

Unauthenticated Open Proxy
MD5: f93e64ac9c3383d0df23662a78a76c07
MVID-2021-0418



BACKDOOR.WIN32.MECHBOT.A

Insecure Permissions
MD5: 8c9e7906d0ad5d0f2267be0057f2a8e3
MVID-2021-0417



BACKDOOR.WIN32.WINSHELL.50

Weak Hardcoded Password
MD5: 8170928cd3e0f1a79b9d40ae19a4d217
MVID-2021-0416



BACKDOOR.WIN32.WINSHELL.50

Weak Hardcoded Password
MD5: 0faecbdfccf3144d487971ed47f3665c
MVID-2021-0415



BACKDOOR.WIN32.BIONET.10

Authentication Bypass RCE
MD5: 99b4428521fa9d9da18e0ccd79e5b985
MVID-2021-0414



BACKDOOR.WIN32.VERNET.AXT

Insecure Permissions
MD5: f529d60abbdafccce3dc5e5ffd6cdfa6
MVID-2021-0413



TROJAN.WIN32.MUCC.IVK

Insecure Service Path
MD5: 1d622f8c72b010b8d7213c032db122e4
MVID-2021-0412



BACKDOOR.WIN32.COREDOOR.10.A

Port Bounce Scan
MD5: 4d10cd3fa86239ade05d2b741892b1e5
MVID-2021-0411



BACKDOOR.WIN32.COREDOOR.10.A

Authentication Bypass RCE
MD5: 4d10cd3fa86239ade05d2b741892b1e5
MVID-2021-0410



EMAIL-WORM.WIN32.DELTAD

Insecure Permissions
MD5: 33f1dc8cf5987751ac0f063601f1c324
MVID-2021-0409



BACKDOOR.WIN32.BLUEADEPT.02.A

Remote Buffer Overflow
MD5: 694d21679cc212c59515584d1b65dc84
MVID-2021-0408



BACKDOOR.WIN32.BNLITE

Remote Heap Based Buffer Overflow
MD5: a8818da39c7d36d9b5497d1a875798b8
MVID-2021-0407



BACKDOOR.WIN32.AGENT.AD

Insecure Password Storage
MD5: d2b933ebadd5c808ca4c68ae173e2d62
MVID-2021-0406



BACKDOOR.WIN32.WOLLF.H

Hardcoded Cleartext Password
MD5: 5494b78dcfaf16aa43b5dbd563dc5582
MVID-2021-0405



BACKDOOR.WIN32.WOLLF.A

Weak Hardcoded Password
MD5: 52d1341f73c34ba2638581469120b68a
MVID-2021-0404



BACKDOOR.WIN32.ANTILAM.11

Unauthenticated Remote Command Execution
MD5: 290477c9707f64a316888493ae67b1ef
MVID-2021-0403



BACKDOOR.WIN32.CURIOSO.ZP

Insecure Permissions
MD5: 1ae08493913b2a0c8cbcb0541da5a8bc
MVID-2021-0402



BACKDOOR.WIN32.ACROPOLIS.10

Insecure Permissions
MD5: e865fc7225c84165d7aa0c7d8a1bcb77
MVID-2021-0401



EMAIL-WORM.WIN32.PLEXUS.B

Unauthenticated Remote Code Execution
MD5: ee8990b5d076a7ed601a30eb677cc9be
MVID-2021-0400



TROJAN.WIN32.SKYNETREF.Y

Unauthenticated Open Proxy
MD5: e2d249f86890d290bb8af599ea0367f3
MVID-2021-0399



TROJAN.WIN32.SKYNETREF.X

Unauthenticated Open Proxy
MD5: 339ec4617eababfd46006f2219e68cb8
MVID-2021-0398



TROJAN.WIN32.SERVSTAR.POA

Insecure Service Path
MD5: 7588da376f496aa678cdfca4e404f38a
MVID-2021-0397



BACKDOOR.WIN32.HUPIGON.BNBB

Insecure Service Path
MD5: 0857f2c8541dba287d648eec17163d3f
MVID-2021-0396



HEUR.BACKDOOR.WIN32.DENIS.GEN

Remote Denial of Service (UDP Datagram)
MD5: 1a4d58e281103fea2a4ccbfab93f74d2
MVID-2021-0395



BACKDOOR.WIN32.HUPIGON.NQR

Unauthenticated Open Proxy
MD5: 9603420a004d9559e610ddeb9d94e20a
MVID-2021-0394



BACKDOOR.WIN32.PAHADOR.AJ

Authentication Bypass RCE
MD5: f393943eb6a80c8321f31c4543ba0bcf
MVID-2021-0393



BACKDOOR.WIN32.VB.AFU

Insecure Transit Password Disclosure
MD5: c6ba7fcb9eb9bdd7e081e2e84e784dcb
MVID-2021-0392



BACKDOOR.WIN32.VB.AFU

Insecure Permissions
MD5: c6ba7fcb9eb9bdd7e081e2e84e784dcb
MVID-2021-0391



BACKDOOR.WIN32.JOKERDOOR

Remote Stack Buffer Overflow
MD5: 6ec85a641656f63f4de853468509d3e3
MVID-2021-0390



BACKDOOR.WIN32.NCX.B

Unauthenticated Remote Command Execution
MD5: 885e74a43b4f7caec3cfb4dba0787de4
MVID-2021-0389



BACKDOOR.WIN32.NCX.B

Remote Stack Buffer Overflow
MD5: 885e74a43b4f7caec3cfb4dba0787de4
MVID-2021-0388



BACKDOOR.WIN32.OPTIX.03.B

Unauthenticated Remote Command Execution
MD5: 4cf1f1d740d7acea4d3836228980ebcb
MVID-2021-0387



BACKDOOR.WIN32.AGENT.SAH

Heap Corruption
MD5: 3ee7a90b5fc3f2b7ba68911e8220df17
MVID-2021-0386



TROJAN.WIN32.DELF.BNA

Information Disclosure
MD5: 6bf08611410e3ef7df67d781a2e8efed
MVID-2021-0385



TROJAN.WIN32.PHIRES.ZM

Insecure Permissions
MD5: 34fb086a88f3a2506b61a17cced3b476
MVID-2021-0384



TROJAN.WIN32.PASTA.MCA

Insecure Permissions
MD5: 4692b129b0034fd53cd76867d9869e49
MVID-2021-0383



BACKDOOR.WIN32.PRORAT.NTZ

Weak Hardcoded Password
MD5: ab96d7f9e008a0774239be6be0c8e7bb
MVID-2021-0382



BACKDOOR.WIN32.PRORAT.NTZ

Port Bounce Scan
MD5: ab96d7f9e008a0774239be6be0c8e7bb
MVID-2021-0381



VIRUS.WIN32.IPAMOR.C

Unauthenticated Remote System Reboot
MD5: b6bfdfe91c3e37865b6a269dc9ff9302
MVID-2021-0380



BACKDOOR.WIN32.ANTILAM.14.O

Unauthenticated Remote Command Execution
MD5: 2914f01e65d848655d4f1aac51ff04d1
MVID-2021-0379



HEUR.BACKDOOR.WIN32.GENERIC

Unauthenticated Open Proxy
MD5: 6a96fc226fbe9f0efbcc8a7b2e34b807
MVID-2021-0378



BACKDOOR.WIN32.MAZBEN.ES

Unauthenticated Open Proxy
MD5: fcd611ccbc756fab43761f4b18372b81
MVID-2021-0377



BACKDOOR.WIN32.HUPIGON.AFJK

Authentication Bypass RCE
MD5: 80b0fc8c0657c0ae7971f09af45c706b
MVID-2021-0376



BACKDOOR.WIN32.HUPIGON.AFJK

Port Bounce Scan
MD5: 80b0fc8c0657c0ae7971f09af45c706b
MVID-2021-0375



BACKDOOR.WIN32.HUPIGON.AFJK

Directory Traversal
MD5: 80b0fc8c0657c0ae7971f09af45c706b
MVID-2021-0374



BACKDOOR.WIN32.HUPIGON.ACIO

Unauthenticated Open Proxy
MD5: 21f324a6a62d8125bc83b8d1865e17f9
MVID-2021-0373



BACKDOOR.WIN32.HUPIGON.ACIO

Insecure Service Path
MD5: 21f324a6a62d8125bc83b8d1865e17f9
MVID-2021-0372



BACKDOOR.WIN32.DELF.ARJO

Insecure Service Path
MD5: 05177f77f075293ff7d58a7f2915c64f
MVID-2021-0371



TROJAN.WIN32.AKL.BC

Insecure Permissions
MD5: 0b2a0f61a209e24a7d7b2c2d5efb4d68
MVID-2021-0370



BACKDOOR.WIN32.LANAFTP.K

Heap Corruption
MD5: e2660742a80433e027ee9bdedc40e190
MVID-2021-0369



BACKDOOR.WIN32.LANFILTRATOR.11.B

Unauthenticated Remote Command Execution
MD5: 9f87546e667e5af59a8580ddf7fd43c7
MVID-2021-0368



VIRUS.WIN32.IPAMOR.C

Unauthenticated Remote System Reboot
MD5: bbf032a3aa288f02403295f0472d1f05
MVID-2021-0367



TROJAN-PROXY.WIN32.RANKY.Z

Unauthenticated Open Proxy
MD5: e312385f64e6b8fd667b4f9b5ea1ff70
MVID-2021-0366



WORM.WIN32.RUNFER.BPO

Insecure Service Path
MD5: ae4c226ad974c990391217f31db2a209
MVID-2021-0365



TROJAN-PROXY.WIN32.RANKY.DH

Unauthenticated Open Proxy
MD5: dcc58648868f1d5c0d7c53250f1bd5c9
MVID-2021-0364



WORM.WIN32.FASONG.C

Insecure Service Path
MD5: bc6f4a283b6b8308c60bb70cc81edfd8
MVID-2021-0363



TROJAN-SPY.WIN32.ARDAMAX.OCX

Insecure Permissions
MD5: 78a39875a0adb110cf3c7de3a0d1384c
MVID-2021-0362



BACKDOOR.WIN32.PRORAT.LKT

Port Bounce Scan (MITM)
MD5: dec8f9042986d64e29d62effb482290b
MVID-2021-0361



BACKDOOR.WIN32.PRORAT.LKT

Weak Hardcoded Password
MD5: dec8f9042986d64e29d62effb482290b
MVID-2021-0360



HACKTOOL.WIN32.AGENT.GI

Local Stack Buffer Overflow (SEH)
MD5: e60606d19a36789662ba97b4bb5c4ccf
MVID-2021-0359



TROJAN-PSW.WIN32.PDPINCH.GEN

Remote Denial of Service
MD5: 0e4fbfeb6f7a98e437a497013b285ffc
MVID-2021-0358



BACKDOOR.WIN32.HUPIGON.GY

Unauthenticated Open Proxy
MD5: be74cbb86c007309d8004d910f5270f7
MVID-2021-0357



BACKDOOR.WIN32.BIFROSE.AHYG

Insecure Permissions
MD5: d6aff119c03ff378d386b30b36b07a69
MVID-2021-0356



HEUR.TROJAN.WIN32.GENERIC

Insecure Service Path
MD5: 2e4b6c5bd907995f6fd40c5eeab5c6e9
MVID-2021-0355



BACKDOOR.WIN32.YODDOS.AN

Insecure Service Path
MD5: bf2417bf23a3b7ae2e44676882b4b9dd
MVID-2021-0354



BACKDOOR.WIN32.LOLBOT.GEN

Insecure Permissions
MD5: 56a93a2a0a4c6a09e2761f2e0351b020
MVID-2021-0353



VIRUS.WIN32.RENAMER.A

Insecure Permissions
MD5: 001fc372acc853aa1cf92588a43a7deb
MVID-2021-0352



BACKDOOR.WIN32.HUPIGON.AFJK

Directory Traversal
MD5: 8dc8abc99c1e7908fe9d048a4e360960
MVID-2021-0351



BACKDOOR.WIN32.HUPIGON.AFJK

Authentication Bypass RCE
MD5: 8dc8abc99c1e7908fe9d048a4e360960
MVID-2021-0350



BACKDOOR.WIN32.HUPIGON.FJCD

Unauthenticated Open Proxy
MD5: 284f36e35db6a0aa9a493f39d834367e
MVID-2021-0349



BACKDOOR.WIN32.RMTSVC.L

Remote Denial of Service
MD5: 38f9ee3ce51ead0ce6bf2edcaa462611
MVID-2021-0348



BACKDOOR.WIN32.AGENT.AER

Insecure Transit Password Disclosure
MD5: 9576a6a59715a69be499fa41d6383a64
MVID-2021-0347



BACKDOOR.WIN32.AGENT.AER

Remote Denial of Service
MD5: 9576a6a59715a69be499fa41d6383a64
MVID-2021-0346



TROJAN-DOWNLOADER.WIN32.VB.ABB

Insecure Permissions
MD5: 8f81373b0f0e6f60206a1a707de2ed77
MVID-2021-0345



BACKDOOR.WIN32.MINILASH.10.B

Remote Denial of Service (UDP Datagram)
MD5: 3c407448a00b2d53b2418f53b66d5b6b
MVID-2021-0344



BACKDOOR.WIN32.HUPIGON.ASQX

Unauthenticated Open Proxy
MD5: a344b767d58b6c83b92bb868727e021c
MVID-2021-0343



TROJAN.WIN32.AGENT.XAAMKD

Insecure Permissions
MD5: 095651e1704b501123b41ea2e9736820
MVID-2021-0342



BACKDOOR.WIN32.WINTERLOVE.I

Hardcoded Weak Password
MD5: c6c81e8ba0a7b9da6216a78dfeccec8d
MVID-2021-0341



BACKDOOR.WIN32.WOLLF.H

Unauthenticated Remote Command Execution
MD5: d0fd60516d53b2ad602c460351dbaa85
MVID-2021-0340



BACKDOOR.WIN32.VB.AWM

Authentication Bypass - Information Leakage
MD5: 2271d942a23a89d7adea524d4ac3c13f
MVID-2021-0339



HEUR.TROJAN.WIN32.GENERIC

Insecure Permissions
MD5: a6916fb9b824e3d2edfe46be69ca2501
MVID-2021-0338



BACKDOOR.WIN32.SMALL.VJT

Unauthenticated Remote Command Execution
MD5: 92ea873a2bbdaf0799d572bc4f30dc79
MVID-2021-0337



BACKDOOR.WIN32.SMALL.GS

Unauthenticated Remote Command Execution
MD5: 551674fec6add7117c4be7f6b357e7cb
MVID-2021-0336



BACKDOOR.WIN32.NYARA.AQ

Insecure Permissions
MD5: dec17541412bbc744b9f458862349e34
MVID-2021-0335



BACKDOOR.WIN32.MOONPIE.40

Unauthenticated Remote Command Execution
MD5: 9dbb6d56bc9a7813305883acd0f9a355
MVID-2021-0334



BACKDOOR.WIN32.MOONPIE.40

Port Bounce Scan
MD5: 9dbb6d56bc9a7813305883acd0f9a355
MVID-2021-0333



BACKDOOR.WIN32.MOONPIE.40

Authentication Bypass RCE
MD5: 9dbb6d56bc9a7813305883acd0f9a355
MVID-2021-0332



BACKDOOR.WIN32.HUPIGON.AEJQ

Directory Traversal
MD5: 2a366cea300b84b4e6f8204a8c229266
MVID-2021-0331



BACKDOOR.WIN32.HUPIGON.AEJQ

Port Bounce Scan
MD5: 2a366cea300b84b4e6f8204a8c229266
MVID-2021-0330



BACKDOOR.WIN32.HUPIGON.AEJQ

Authentication Bypass RCE
MD5: 2a366cea300b84b4e6f8204a8c229266
MVID-2021-0329



BACKDOOR.WIN32.BO2K.11.D (BACK ORIFICE)

Local Stack Buffer Overflow
MD5: abc6a590d237b8ee180638007f67089e
MVID-2021-0328



BACKDOOR.WIN32.DELF.WR

Port Bounce Scan
MD5: fc74e80ff2f49380972904d77df1c0f1
MVID-2021-0327



BACKDOOR.WIN32.DELF.WR

Authentication Bypass RCE
MD5: fc74e80ff2f49380972904d77df1c0f1
MVID-2021-0326



BACKDOOR.WIN32.DELF.UM

Authentication Bypass RCE
MD5: d5256768a01a0e7c2ad5ba1264777f71
MVID-2021-0325



BACKDOOR.WIN32.ANTILAM.11

Unauthenticated Remote Code Execution
MD5: 9adffcc98cd658a7f9c5419480013f72
MVID-2021-0324



HEUR.TROJAN.WIN32.DELF.GEN

Insecure Permissions
MD5: 058ef1acc6456a924737d940f3cf81aa
MVID-2021-0323



BACKDOOR.WIN32.HUPIGON.ABE

Unauthenticated Open Proxy
MD5: 5d7908e7e95d0eb4a7351d24605e62a6
MVID-2021-0322



TROJAN-PROXY.WIN32.RAZNEW.GEN

Unauthenticated Open Proxy
MD5: 033ccd3a926441c49d3898dab97aefed
MVID-2021-0321



BACKDOOR.WIN32.DARKKOMET.ASPL

Insecure Permissions
MD5: 5c644104f96ccad7a8cf324c2e523530
MVID-2021-0320



HACKTOOL.WIN32.HKIT

Unauthenticated Remote Command Execution
MD5: 6209db6e8cfd7c7a315ca858129bd226
MVID-2021-0319



HACKTOOL.WIN32.HIDD.B

Remote Stack Buffer Overflow (UDP Datagram)
MD5: 665a408981294ca49be23096363eec2f
MVID-2021-0318



BACKDOOR.WIN32.IRCBOT.GEN

Hardcoded Weak Password
MD5: bcfc89ca07bd0ad7b9396a0815c9fc39
MVID-2021-0317



TROJAN-PROXY.WIN32.RAZNEW.GEN

Unauthenticated Open Proxy
MD5: 55ce4b6c2ec10838c54dca54d96801d6
MVID-2021-0316



BACKDOOR.WIN32.ZARATUSTRA

Unauthenticated Remote File Write (Remote Code Exec)
MD5: f240c16af2189ea9c94f317281ce7e59
MVID-2021-0315



BACKDOOR.WIN32.ZDEMON.126

Unauthenticated Remote Command Execution
MD5: cedc886b593f013133df39bb6b43a762
MVID-2021-0314



BACKDOOR.WIN32.ZDEMON.10

Unauthenticated Remote Command Execution
MD5: d12f38e959d70af76fd263aa1933033c
MVID-2021-0313



TROJAN-DROPPER.WIN32.SMALL.FP

Unauthenticated Open Proxy
MD5: 07122dd3b069bbbb445e060c1249d5a2
MVID-2021-0312



CONSTRUCTOR.WIN32.SS.11.C

Unauthenticated Open Proxy
MD5: da60b92742abff72930879fa8560b3c3
MVID-2021-0311



BACKDOOR.WIN32.WINSHELL.40

Unauthenticated Remote Command Execution
MD5: c98e23742807f3cb5a095f34e0eb0e52
MVID-2021-0310



BACKDOOR.WIN32.NBDD.BGZ

Remote Stack Buffer Overflow
MD5: 6fab73bf104c6a9211b94f9559faa134
MVID-2021-0309



BACKDOOR.WIN32.BIFROSE.ACCI

Local Stack Buffer Overflow
MD5: 611dbff0d68df777c6d6881e00440143
MVID-2021-0308



BACKDOOR.WIN32.PSYRAT.B

Remote Denial of Service
MD5: 5817183894cb513239f6aef28895130c
MVID-2021-0307



BACKDOOR.WIN32.PSYRAT.B

Unauthenticated Remote Command Execution
MD5: 5817183894cb513239f6aef28895130c
MVID-2021-0306



BACKDOOR.WIN32.AGENT.CU

Unauthenticated Remote Command Execution
MD5: ce1963d3fd6a8e1383aac40a1f1c4107
MVID-2021-0305



BACKDOOR.WIN32.AGENT.CU

Port Bounce Scan (MITM)
MD5: ce1963d3fd6a8e1383aac40a1f1c4107
MVID-2021-0304



BACKDOOR.WIN32.AGENT.CU

Authentication Bypass RCE
MD5: ce1963d3fd6a8e1383aac40a1f1c4107
MVID-2021-0303



BACKDOOR.WIN32.MAZBEN.ME

Unauthenticated Open Proxy
MD5: 6681d5e4b68abd21a14c704edf9e2ff5
MVID-2021-0302



BACKDOOR.WIN32.HUPIGON.AAUR

Unauthenticated Open Proxy
MD5: 16d598c01f7b391986c8c19eded005b1
MVID-2021-0301



BACKDOOR.WIN32.IRCBOT.GEN

Unauthenticated Remote Command Execution
MD5: 96f5cdfa5b3416c819d76060f11dc88d
MVID-2021-0300



TROJAN-SPY.WIN32.SPYEYES.HQD

Insecure Permissions
MD5: 6f484fea8f6bb3974185fc856f37541b
MVID-2021-0299



TROJAN-SPY.WIN32.SPYEYES.ABDB

Insecure Permissions
MD5: 9185538b01ad700603f38fb0eb8b6e3b
MVID-2021-0298



BACKDOOR.WIN32.AGENT.BJEV

Insecure Permissions
MD5: ca40998b5d62ee7f936537ff3de7993d
MVID-2021-0297



HEUR.BACKDOOR.WIN32.WINNTI.GEN

Insecure Permissions
MD5: eb272fe923ccf3e66fde1bf309cbc464
MVID-2021-0296



BACKDOOR.WIN32.IRCBOT.GEN

Weak Hardcoded Password
MD5: 9b12ff6b8b025e7fb0a171abad41c79c
MVID-2021-0295



HEUR.BACKDOOR.WIN32.GENERIC

Unauthenticated Open Proxy
MD5: f2b5429feaa7d229418cf499ce5f5822
MVID-2021-0294



HEUR.BACKDOOR.WIN32.GENERIC

Unauthenticated Open Proxy
MD5: bcf45d515f2a0c6ead1e44ea6371276b
MVID-2021-0293



VIRTOOL.WIN32.AFIX

Local Stack Buffer Overflow
MD5: c971e978198331bb0b56dc8b47f0b4b0
MVID-2021-0292



VIRTOOL.WIN32.AFIX

Local Stack Buffer Overflow
MD5: 35100db8750364871fe70ef6de4833f7
MVID-2021-0291



BACKDOOR.WIN32.SURILA.J

Remote Denial of Service
MD5: b1cec4b806c71c82bbd9002bdaf21d1f
MVID-2021-0290



BACKDOOR.WIN32.SURILA.J

Authentication Bypass
MD5: b1cec4b806c71c82bbd9002bdaf21d1f
MVID-2021-0289



BACKDOOR.WIN32.SURILA.J

Port Bounce Scan
MD5: b1cec4b806c71c82bbd9002bdaf21d1f
MVID-2021-0288



TROJAN.WIN32.RASFLOODER.B

Hardcoded Plaintext Password
MD5: 6baf47d953de7e4e07aef9b1af0c0d72
MVID-2021-0287



BACKDOOR.WIN32.NERTE.A

Unauthenticated Remote Command Execution
MD5: 125364b0cdae80c10f00b75c8e2cfa47
MVID-2021-0286



BACKDOOR.WIN32.NERTE.A

Authentication Bypass RCE
MD5: 125364b0cdae80c10f00b75c8e2cfa47
MVID-2021-0285



TROJAN-PROXY.WIN32.RANKY.GEN

Unauthenticated Open Proxy
MD5: c0d6a2f0b34d9c44ca3433e4d45f187e
MVID-2021-0284



BACKDOOR.IRC.ATAKA.A

Insecure Permissions
MD5: 2da85579b259e6de86590e067003e064
MVID-2021-0283



HEUR.BACKDOOR.WIN32.AGENT.GEN

Insecure Permissions
MD5: db0b3f4aeccb8d26f14b915a9e2529b4
MVID-2021-0282



VIRUS.WIN32.SHODI.E

Heap Corruption
MD5: 37d4a5ba123dd32f1e2c4ba0be14e77c
MVID-2021-0281



VIRUS.WIN32.SHODI.E

Unauthenticated Remote Command Execution
MD5: 37d4a5ba123dd32f1e2c4ba0be14e77c
MVID-2021-0280



VIRUS.WIN32.SHODI.E

Insecure Transit
MD5: 37d4a5ba123dd32f1e2c4ba0be14e77c
MVID-2021-0279



BACKDOOR.WIN32.WINSHELL.40

Authentication Bypass Command Execution
MD5: 83fe2cc7aedc452d71c751053a2112c4
MVID-2021-0278



BACKDOOR.WIN32.ZOMBAM.L

Unauthenticated URL Command Injection
MD5: 9729e9fc004ea49d3c2ddee28736dae3
MVID-2021-0277



BACKDOOR.WIN32.ZOMBAM.L

Remote Stack Buffer Overflow
MD5: 9729e9fc004ea49d3c2ddee28736dae3
MVID-2021-0276



TROJAN.WIN32.INJECT.ADWAS

Insecure Permissions
MD5: acfce60da9031e00c22818f2616d6424
MVID-2021-0275



HEUR.TROJAN.WIN32.GENERIC

Insecure Permissions
MD5: fe3fb2e929f95ed03233e7a4d622a28d
MVID-2021-0274



TROJAN-DROPPER.WIN32.AGENT.WXL

Insecure Permissions
MD5: 8b17a68d7b2291f217b63e0377ee2b3a
MVID-2021-0273



TROJAN.WIN32.VB.BCNG

Insecure Permissions
MD5: 10550ca42c32c22bdd0515020cff38dd
MVID-2021-0272



BACKDOOR.WIN32.HUPIGON.GSY

Unauthenticated Open Proxy
MD5: 7e99aa748b61fd0802fa19cf9e4cf1f8
MVID-2021-0271



BACKDOOR.WIN32.HUPIGON.AISS

Unauthenticated Open Proxy
MD5: 79affcb4051d36dde3d1543a4fd88368
MVID-2021-0270



TROJAN-PROXY.WIN32.RANKY.AG

Unauthenticated Open Proxy
MD5: af4868303124ee4f765a16328e8993a6
MVID-2021-0269



TROJAN-SPY.WIN32.XSPYOUT.A

Unauthenticated Open Proxy
MD5: d1791ca15c5df6f8f5d007518efd65b6
MVID-2021-0268



TROJAN-DROPPER.WIN32.SVB.CZ

Port Bounce Scan (MITM)
MD5: d57536189430fd75e45f53845e9b3f94
MVID-2021-0267



TROJAN-DROPPER.WIN32.SVB.CZ

Authentication Bypass RCE
MD5: d57536189430fd75e45f53845e9b3f94
MVID-2021-0266



BACKDOOR.WIN32.NERTE.781

Unauthenticated Remote Command Execution
MD5: 776e8bb41adf8bd95865c0b03637d8d7
MVID-2021-0265



BACKDOOR.WIN32.NERTE.781

Authentication Bypass RCE
MD5: 776e8bb41adf8bd95865c0b03637d8d7
MVID-2021-0264



CONSTRUCTOR.WIN32.BIFROSE.ASC

Local Stack Buffer Overflow (Heap Corruption)
MD5: 9e1ef166901534c276b5eeeee511fe22
MVID-2021-0263



TROJAN-DROPPER.WIN32.SCROP.DYI

Insecure Permissions
MD5: af207a19fbe313e3f7e123b6b2acffd4
MVID-2021-0262



EMAIL-WORM.WIN32.TRANCE.A

Insecure Permissions
MD5: ca18a07560efa0308827dc972351301f
MVID-2021-0261



TROJAN-DROPPER.WIN32.KREPPER.A

Unauthenticated Remote Command Execution
MD5: ee699b4055c6199f9826681797d64f0b
MVID-2021-0260



TROJAN-DROPPER.WIN32.JUNTADOR.A

Weak Hardcoded Password
MD5: f28e866ce2f99013a66b015f6a7f31a8
MVID-2021-0259



TROJAN.WIN32.BANPAK.KH

Insecure Permissions
MD5: 304fb160949dcaec3e718481464f9ce6
MVID-2021-0258



TROJAN.WIN32.SECONDTHOUGHT.AK

Insecure Permissions
MD5: 21cd8bab6b3569f7b375a69a37e36c50
MVID-2021-0257



BACKDOOR.WIN32.REVERSETROJAN.200

Authentication Bypass Empty Password
MD5: 3fbec7c0623f5f80e4d9c096a50b0d59
MVID-2021-0256



BACKDOOR.WIN32.HUPIGON.AAIO

Remote Stack Buffer Overflow
MD5: c38cd09fd5ebd1f0cc378804b2da08c4
MVID-2021-0255



TROJAN-DROPPER.WIN32.GOOGITE.B

Unauthenticated Remote Command Execution
MD5: 4a8d6bc838c09c6701abfa8b283fd0de
MVID-2021-0254



TROJAN.WIN32.ALIEN.ERF

Directory Traversal
MD5: 57ab194d8c60ee97914eda22e4d71b68
MVID-2021-0253



TROJAN.WIN32.ALIEN.ERF

Remote Stack Buffer Overflow
MD5: 57ab194d8c60ee97914eda22e4d71b68
MVID-2021-0252



TROJAN.WIN32.ALIEN.ERF

Remote Denial of Service
MD5: 57ab194d8c60ee97914eda22e4d71b68
MVID-2021-0251



EMAIL-WORM.WIN32.KIPIS.A

Unauthenticated Remote Code Execution
MD5: aa703bc17e3177d3b24a57c5d2a91a0c
MVID-2021-0250



BACKDOOR.WIN32.ZOMBAM.GEN

Information Disclosure
MD5: ff6516c881dee555b0cd253408b64404
MVID-2021-0249



BACKDOOR.WIN32.VB.PLD

Unauthenticated Remote Command Execution
MD5: 6ff35087d789f7aca6c0e3396984894e
MVID-2021-0248



BACKDOOR.WIN32.VB.PLD

Insecure Transit
MD5: 6ff35087d789f7aca6c0e3396984894e
MVID-2021-0247



BACKDOOR.WIN32.PAZUS.18

Authentication Bypass RCE
MD5: 5be13eb16018ab69157f8c8e96e7d6bf
MVID-2021-0246



BACKDOOR.WIN32.ZOMBAM.GEN

Remote Stack Buffer Overflow
MD5: ff6516c881dee555b0cd253408b64404
MVID-2021-0245



BACKDOOR.WIN32.ZOMBAM.GEN

Unauthenticated URL Command Injection
MD5: ff6516c881dee555b0cd253408b64404
MVID-2021-0244



BACKDOOR.WIN32.ZOMBAM.GEN

Cross Site Scripting (XSS)
MD5: ff6516c881dee555b0cd253408b64404
MVID-2021-0243



BACKDOOR.WIN32.XRAT.D

Unauthenticated Remote Command Execution
MD5: dc77b126b205b0f671e505766c607ef1
MVID-2021-0242



BACKDOOR.WIN32.WUCA.NZ

Insecure Permissions
MD5: 378b225b07979e12062f86ab1fbaf2ed
MVID-2021-0241



TROJAN-DROPPER.WIN32.GOOGITE.A

Unauthenticated Open Proxy
MD5: ff30fbee3724d80dcb9471c0b553c99a
MVID-2021-0240



BACKDOOR.WIN32.WOLLF.12

Unauthenticated Remote Command Execution
MD5: 911e63e28b1d177120cca16eacf3b602
MVID-2021-0239



BACKDOOR.WIN32.NEAKSE.BIT

Insecure Permissions
MD5: 20863ba09c31037b1b3220fc6da100e1
MVID-2021-0238



BACKDOOR.WIN32.ANDROM.DF

Unauthenticated Remote Command Execution
MD5: bf60f5b5c901bab08484838447f1b85e
MVID-2021-0237



BACKDOOR.WIN32.DELF.ACZ

Remote Stack Buffer Overflow (SEH)
MD5: 065d89c63fa1057de98c727d4b044b98
MVID-2021-0236



BACKDOOR.WIN32.NETSPY.10

Heap Corruption
MD5: e677149c35cbba118655d9b133da8827
MVID-2021-0235



BACKDOOR.WIN32.WISELL

Unauthenticated Remote Command Execution
MD5: eba4ce50a036a196484715f60c8a449b
MVID-2021-0234



BACKDOOR.WIN32.WINSHELL.A

Unauthenticated Remote Command Execution
MD5: 911a97737bd26e2a478f52e74b4fa01d
MVID-2021-0233



BACKDOOR.WIN32.WHIRLPOOL.A

Remote Buffer Overflow - UDP Datagram
MD5: 90171763d1cc62102b08482bac54ea8b
MVID-2021-0232



BACKDOOR.WIN32.NETCONTROL2.293

Unauthenticated Remote Command Execution
MD5: 15ca804e4634d9586f85b1d15ebe91a0
MVID-2021-0231



BACKDOOR.WIN32.NETBUS.12

Unauthenticated Information Disclosure
MD5: d9822984ed546cbf3ccffd149d1d2af5
MVID-2021-0230



BACKDOOR.WIN32.NERTE.772

Unauthenticated Remote Command Execution
MD5: 464d7073f884b586b17950eef2908a6e
MVID-2021-0229



BACKDOOR.WIN32.NERTE.772

Authentication Bypass RCE
MD5: 464d7073f884b586b17950eef2908a6e
MVID-2021-0228



TROJAN.WIN32.SCAR.DULK

Insecure Permissions
MD5: 317cd84b5c0d11a9c3aacdfe2bb6031c
MVID-2021-0227



BACKDOOR.WIN32.TONEROK.D

Unauthenticated Remote Command Execution
MD5: b297c565899ace88f40e5da833f41561
MVID-2021-0226



BACKDOOR.WIN32.SPION4

Insecure Transit
MD5: cb02d2f323db18d7415dca47bceab9db
MVID-2021-0225



BACKDOOR.WIN32.UPLOAD.A

Remote Denial of Service
MD5: 70711c4f594fe97ff6ab17039c133458
MVID-2021-0224



BACKDOOR.WIN32.SPIRIT.12.B

Insecure Permissions
MD5: 2bcd471d9dd0a8d6194f4112c2ee520f
MVID-2021-0223



BACKDOOR.WIN32.SKYDANCE.216

Remote Stack Buffer Overflow
MD5: 694ecf256c97ef6e206e2073d37e5944
MVID-2021-0222



BACKDOOR.WIN32.SINGU.A

Remote Stack Buffer Overflow (UDP Datagram)
MD5: c7aabf5d248c6974b4cea6c070d6d441
MVID-2021-0221



BACKDOOR.WIN32.RMFDOOR.C

Authentication Bypass RCE
MD5: 5e2e6ca532c20ee6a59861d936df7076
MVID-2021-0220



BACKDOOR.WIN32.PSYCHWARD.DS

Weak Hardcoded Password
MD5: 9e22514c9b0e74c7fcb07b7c091f6123
MVID-2021-0219



BACKDOOR.WIN32.PSYCHWARD.C

Unauthenticated Remote Command Execution
MD5: f60a8d71a822e0e485f22ada8f26c31e
MVID-2021-0218



BACKDOOR.WIN32.DELF.AEZ

Unauthenticated Remote Command Execution
MD5: be4a6274679ca966a1d99140db54c25a
MVID-2021-0217



BACKDOOR.WIN32.DARKMOON.A

Insecure Transit
MD5: 7361fe3620fb6e18467c8e15e224b0b8
MVID-2021-0216



BACKDOOR.WIN32.DARKMOON.A

Weak Hardcoded Password
MD5: 7361fe3620fb6e18467c8e15e224b0b8
MVID-2021-0215



BACKDOOR.WIN32.ANTILAM.14.D

Unauthenticated Remote Command Execution
MD5: a53351e8fa0cb4f7db3d0250387a0e4f
MVID-2021-0214



BACKDOOR.WIN32.AGENT.ODA

Remote Stack Buffer Overflow (UDP)
MD5: 380ff48c4a28ac25f5efb630883eeb17
MVID-2021-0213



BACKDOOR.WIN32.DANTON.43

MITM Port Bounce Scan
MD5: 85f7ef2b6b8da9adb7723a13b91ac1c7
MVID-2021-0212



BACKDOOR.WIN32.DANTON.43

Weak Hardcoded Credentials RCE
MD5: 85f7ef2b6b8da9adb7723a13b91ac1c7
MVID-2021-0211



BACKDOOR.WIN32.AGENT.LYW

Remote Stack Buffer Overflow (UDP)
MD5: 4de6f4104a5fc2185164747a6fcf20ce
MVID-2021-0210



BACKDOOR.WIN32.AGENT.CY

Denial of Service
MD5: e85a1028a52fcc723353a236ada54fee
MVID-2021-0209



BACKDOOR.WIN32.AGENT.CY

Insecure Transit
MD5: e85a1028a52fcc723353a236ada54fee
MVID-2021-0208



BACKDOOR.WIN32.AGENT.CY

Weak Hardcoded Credentials
MD5: e85a1028a52fcc723353a236ada54fee
MVID-2021-0207



BACKDOOR.WIN32.DELF.ABB

Insecure Transit
MD5: 2910c3bea6732d5ed81a7c44d4354136
MVID-2021-0206



BACKDOOR.WIN32.DELF.ZHO

Authentication Bypass RCE
MD5: 6b9f5a0512af3ab33c26eaa4bdf94f1f
MVID-2021-0205



BACKDOOR.WIN32.ANTILAM.13.A

Unauthenticated Remote Command Execution
MD5: 1ef711b34cc278449f1997e4ed06334a
MVID-2021-0204



BACKDOOR.WIN32.MOTIVFTP.12

Authentication Bypass RCE
MD5: 88785a093b8fa00893214dd220ac255d
MVID-2021-0203



BACKDOOR.WIN32.NINJASPY.C

Remote Command Execution
MD5: 6eece319bc108576bd1f4a8364616264
MVID-2021-0202



PACKED.WIN32.BLACK.D

Unauthenticated Open Proxy
MD5: 3a36d7ab34b3241aa2a9072700e0cb7c
MVID-2021-0201



BACKDOOR.WIN32.FLODER.GQE

Insecure Permissions
MD5: 0629e3b2ab8a973a3e37e4e97cb9cfea
MVID-2021-0200



TROJAN.WIN32.SISCOS.BQE

Insecure Permissions
MD5: b4a35ae6dcceea6390769829b4e1506f
MVID-2021-0199



TROJAN.WIN32.AGENT.XDTV

Insecure Permissions
MD5: ffa9b76f9549a2c46415c855a0911e8a
MVID-2021-0198



BACKDOOR.WIN32.AGENT.OJ

Unauthenticated Remote Command Execution
MD5: c1e92e04cdb432d83ea2610ef226d4cd
MVID-2021-0197



BACKDOOR.WIN32.AGENT.OJ

Remote Stack Buffer Overflow
MD5: c1e92e04cdb432d83ea2610ef226d4cd
MVID-2021-0196



BACKDOOR.WIN32.AGENT.KTE

Remote Stack Buffer Overflow (UDP Datagram)
MD5: 7c92e59e776355734781bbf05571d0f0
MVID-2021-0195



BACKDOOR.WIN32.AGENT.GMUG

Heap Corruption
MD5: c7763bae3376a9f2865a1a18e84c259e
MVID-2021-0194



BACKDOOR.WIN32.AGENT.GGW

Authentication Bypass
MD5: 509e3d4839688c6173980dfba22ebd55
MVID-2021-0193



WORM.WIN32.DELF.HU

Insecure Permissions
MD5: 46e27d7bfdbda7a71dfa12a79026a88b
MVID-2021-0192



HEUR.TROJAN.WIN32.BAYROB.GEN

Insecure Permissions
MD5: 765698ccfb033c86eea6d293235d7ed0
MVID-2021-0191



BACKDOOR.WIN32.AGENT.AFQ

Remote Heap Corruption
MD5: 853754de6b8ffbe1321a8c91aab5c232
MVID-2021-0190



BACKDOOR.WIN32.AGENT.AFQ

Directory Traversal
MD5: 853754de6b8ffbe1321a8c91aab5c232
MVID-2021-0189



BACKDOOR.WIN32.AGENT.AFQ

Missing Authentication
MD5: 853754de6b8ffbe1321a8c91aab5c232
MVID-2021-0188



TROJAN-DROPPER.WIN32.INJECTOR.AOBL

Insecure Permissions
MD5: 842f6f21a2a83792e98900df90c9340b
MVID-2021-0187



TROJAN-DROPPER.WIN32.DYCLER.VRP

Insecure Permissions
MD5: 1d6d6d3c077250b7b3ad053e71054ecc
MVID-2021-0186



WORM.WIN32.BUSAN.K

Insecure Communication Protocol
MD5: bcad7aa6cb6cb9d94377cd88acbca1c9
MVID-2021-0185



VIRUS.WIN32.BANKA.A

Insecure Permissions
MD5: 6a3329d12323f4920dbf13afe1be6acd
MVID-2021-0184



PACKED.WIN32.BLACK.D

Unauthenticated Open Proxy
MD5: 17e3836682ffb0913459ece7c3f0786d
MVID-2021-0183



BACKDOOR.WIN32.DARKKOMET.ARTR

Insecure Permissions
MD5: d2ee6046fd47de321d1310dccacca92b
MVID-2021-0182



IM-WORM.WIN32.BROPIA.AA

Insecure Permissions
MD5: ea6dfec6c3900ab422875119972d9c62
MVID-2021-0181



TROJAN-DROPPER.WIN32.AGENT.XTP

Insecure Permissions
MD5: 360bbc9e0926488f085029948ff6c759
MVID-2021-0180



HEUR.TROJAN.WIN32.GENERIC

Insecure Permissions
MD5: 1a98a0a769e7351ba16e1b91e9f26692
MVID-2021-0179



TROJAN.WIN32.AGENT.HSM

Insecure Permissions
MD5: c58d5aecd223ac95ae5fab6dcd69e953
MVID-2021-0178



CONSTRUCTOR.WIN32.BIFROSE.AG

Local Stack Buffer Overflow
MD5: db45a906a0a3747398b2b8a5faff5e44
MVID-2021-0177



HEUR.BACKDOOR.WIN32.GENERIC

Unauthenticated Open Proxy
MD5: d7648b676dd139d1b7ba781816726510
MVID-2021-0176



TROJAN.WIN32.BAYROB.DTRG

Insecure Permissions
MD5: 2f3f0e9be7edb73e545fc49b5a78b4f0
MVID-2021-0175



TROJAN-DROPPER.WIN32.AGENT.BJTZCP

Insecure Permissions
MD5: 2992b86d03c3922ed45fa09ef105f018
MVID-2021-0174



TROJAN.WIN32.NANOBOT.ONH

Insecure Permissions
MD5: 9fff4c02274c0162880844f27ff91407
MVID-2021-0173



TROJAN.WIN32.AGENTB.IOFV

Insecure Permissions
MD5: d4ac133a9df0c627f899bb6039d04215
MVID-2021-0172



BACKDOOR.WIN32.ZOMBAM.H

Remote Stack Buffer Overflow
MD5: 55feab480a43727c8a08feb7344afb4a
MVID-2021-0171



HEUR.HOAX.WIN32.FRAUDROP.GEN

Insecure Permissions
MD5: 1d40e72fb8cf300298df4b828b48ec29
MVID-2021-0170



TROJAN.WIN32.AGENT.ZFGH

Insecure Permissions
MD5: a2017b547da2f06c6d7c02398cc481f6
MVID-2021-0169



TROJAN.WIN32.JORIK.QJE

Insecure Permissions
MD5: 982479ad10ff048d566516254051e17e
MVID-2021-0168



BACKDOOR.WIN32.SMALL.N

Unauthenticated Remote Command Execution (SYSTEM)
MD5: fb24c3509180f463c9deaf2ee6705062
MVID-2021-0167



BACKDOOR.WIN32.HUPIGON.DAS

Unauthenticated Open Proxy
MD5: 7afe56286039faf56d4184c476683340
MVID-2021-0166



TROJAN-DOWNLOADER.WIN32.GENOME.OMHT

Insecure Permissions
MD5: 01055838361f534ab596b56a19c70fef
MVID-2021-0165



TROJAN-DOWNLOADER.WIN32.GENOME.QIW

Insecure Permissions
MD5: 5cddc4647fb1c59f5dc7f414ada7fad4
MVID-2021-0164



TROJAN.WIN32.HOTKEYCHICK.D

Insecure Permissions
MD5: aff493ed1f98ed05c360b462192d2853
MVID-2021-0163



TROJAN.WIN32.HOSTS2.YQF

Insecure Permissions
MD5: 274a6e846c5a4a2b3281198556e5568b
MVID-2021-0162



TROJAN-DOWNLOADER.WIN32.FRAUDLOAD.XEVN

Insecure Permissions
MD5: 17da6737cb94c11fa2363772d8eac0b1
MVID-2021-0161



TROJAN.WIN32.SHARER.H

Known Vulnerable Component - Heap Corruption
MD5: 9f80c3b1e7f5f6f7d0c8aea25fe83551
MVID-2021-0160



TROJAN.WIN32.SHARER.H

Port Bounce Scan
MD5: 9f80c3b1e7f5f6f7d0c8aea25fe83551
MVID-2021-0159



TROJAN.WIN32.SHARER.H

Anonymous Logon RCE
MD5: 9f80c3b1e7f5f6f7d0c8aea25fe83551
MVID-2021-0158



TROJAN-DOWNLOADER.WIN32.DELF.NZG

Insecure Permissions
MD5: 3c5c6f0f6f78af12d6b76119696a4074
MVID-2021-0157



TROJAN-DOWNLOADER.WIN32.DELF.OXZ

Insecure Permissions
MD5: 373b1d95ccdbbc6531dff43bbbe43534
MVID-2021-0156



TROJAN-DOWNLOADER.WIN32.DELF.UR

Insecure Permissions
MD5: 5b63a6e730f094d182c9030e3a57bcb8
MVID-2021-0155



BACKDOOR.WIN32.BURBUL.B

Port Bounce Scan
MD5: 3ee4cb2e06eb1f7fe54c89db903f3e7a
MVID-2021-0154



IRC-WORM.WIN32.SILENTIUM.A

Insecure Permissions
MD5: 7a3c4ec00ba952207f25d1189c86ce22
MVID-2021-0153



IRC-WORM.WIN32.JANE.A

Port Bounce Scan
MD5: 2d1d6b0fd55eca12f58b8b6d80f8153f
MVID-2021-0152



IRC-WORM.WIN32.JANE.A

Authentication Bypass RCE
MD5: 2d1d6b0fd55eca12f58b8b6d80f8153f
MVID-2021-0151



BACKDOOR.WIN32.DELF.ZS

Unauthenticated Remote Command Execution
MD5: 911e96073cfe807289366343aa8d97ac
MVID-2021-0150



BACKDOOR.WIN32.KWAK.12

Remote Command Execution
MD5: c25393545e5ead3a35996ef9a887bd34
MVID-2021-0149



BACKDOOR.WIN32.KWAK.12

Port Bounce Scan
MD5: c25393545e5ead3a35996ef9a887bd34
MVID-2021-0148



BACKDOOR.WIN32.KWAK.12

Authentication Bypass
MD5: c25393545e5ead3a35996ef9a887bd34
MVID-2021-0147



BACKDOOR.WIN32.KWAK.12

Remote Denial of Service
MD5: c25393545e5ead3a35996ef9a887bd34
MVID-2021-0146



BACKDOOR.WIN32.DARKKOMET.GOZU

Insecure Permissions
MD5: 00199eb3fd1a0aa6771b7f12fad895a0
MVID-2021-0145



WORM.WIN32.NGRBOT.ACNO

Insecure Permissions
MD5: 0b3c2053a7c09aa25ba81f2bdebbb873
MVID-2021-0144



WORM.WIN32.RECYL.DP

Insecure Permissions
MD5: e4737fb6c231bfb84d1a55ec2fb61641
MVID-2021-0143



WORM.WIN32.NGRBOT.ABPR

Insecure Permissions
MD5: ed1e47f62fa93f2fd2f4fbcfdd0f1c10
MVID-2021-0142



VIRUS.WIN32.SALITY.GEN

Insecure Permissions
MD5: 423a5a63bed721e479c156b309bb58fd
MVID-2021-0141



TROJAN-DROPPER.WIN32.DYCLER.YHB

Insecure Permissions
MD5: 04a5a52f12d2a130bb88f98c3bc14aa8
MVID-2021-0140



WORM.WIN32.DETNAT.C

Insecure Permissions
MD5: 8df7527bd3446b89298c9c750394e0b6
MVID-2021-0139



TROJAN-DROPPER.WIN32.DEMP.RFT

Insecure Permissions
MD5: db01783710e0c5aff92156a0e76deade
MVID-2021-0138



TROJAN-DROPPER.WIN32.DELF.DA

Remote Stack Buffer Overflow (UDP Datagram)
MD5: a2f1adfd7a35fd0e0207a24be169b4c1
MVID-2021-0137



HEUR.TROJAN.WIN32.GENERIC

Insecure Permissions
MD5: c60f00700bd73ca369195bd32a3f16a3
MVID-2021-0136



TROJAN-DROPPER.WIN32.DYCLER.VRP

Insecure Permissions
MD5: 06cbbff745c60c46e0996928c00ef28f
MVID-2021-0135



BACKDOOR.WIN32.AGENT.MZN

Remote SEH Buffer Overflow
MD5: f589ae5fb7879eb0b98fb8096d7152a5
MVID-2021-0134



TROJAN-DROPPER.WIN32.DELF.P

Remote Buffer Overflow
MD5: b02cc578d2e7f24fb67ec0afc42a9e13
MVID-2021-0133



TROJAN-DROPPER.WIN32.DELF.P

Missing Authentication
MD5: b02cc578d2e7f24fb67ec0afc42a9e13
MVID-2021-0132



TROJAN-PROXY.WIN32.WIMAIN

Remote Stack Buffer Overflow
MD5: 8936c97e99799809812fa740076a2d7f
MVID-2021-0131



TROJAN-DROPPER.WIN32.DELF.XK

Remote Invalid Pointer Write DOS
MD5: 869c813722be90cf1b3708051103ce14
MVID-2021-0130



BACKDOOR.WIN32.ZOMBAM.L

Remote Stack Buffer Overflow
MD5: 56d356c5b1ae3a91caac511179159034
MVID-2021-0129



TROJAN.WIN32.SCAR.DXIR

Insecure Permissions
MD5: 68ed9d6e4f3e917ab4b91689e2890754
MVID-2021-0128



TROJAN.WIN32.SISCOS.BQE

Insecure Permissions
MD5: a41431099989b44359273216072f8295
MVID-2021-0127



TROJAN-BANKER.WIN32.DELF.AC

Insecure Permissions
MD5: 81301fecc7d9ff6b28ac779d2f819673
MVID-2021-0126



TROJAN-DROPPER.WIN32.HAMER.10

Remote Floating-point Exception DoS
MD5: afe4e5219829a286e0b84025b073c259
MVID-2021-0125



TROJAN-SPY.WIN32.KEYLOGGER.QT

Insecure Permissions
MD5: de613b96174056ef22b42e112d0e61a5
MVID-2021-0124



BACKDOOR.WIN32.AGENT.BJEV

Insecure Permissions
MD5: 35cf54a19efcdeaa41899647075c7ef9
MVID-2021-0123



BACKDOOR.WIN32.GTBOT.C

Insecure Permissions
MD5: 8c2acfcc60dda52db9bd9a934284b673
MVID-2021-0122



BACKDOOR.WIN32.ANTILAM.14.O

Unauthenticated Remote Command Execution
MD5: 3f3ee9dce39e816b4001bd6ae66e8f1a
MVID-2021-0121



BACKDOOR.WIN32.BO2K.09.B

Unauthenticated Remote Command Execution
MD5: 90894ac48059687ea80e565f7529e53f
MVID-2021-0120



BACKDOOR.WIN32.BO2K.AB

Local File Buffer Overflow
MD5: ca4e5a6ff033b62fa59de5a5dd24c7f9
MVID-2021-0119



BACKDOOR.WIN32.DARKKOMET.IRV

Insecure Permissions
MD5: 341b2c3222122bd25c8509fc09534dec
MVID-2021-0118



TROJAN-SPY.WIN32.STEALER.OSH

Insecure Permissions
MD5: d58b1c2f540268bd9dd920455568d45f
MVID-2021-0117



BACKDOOR.WIN32.REMOTEMANIPULATOR.FDO

Insecure Permissions
MD5: 66ef21e8d1cf30dce6e084a9e306c18f
MVID-2021-0116



TROJAN-PROXY.WIN32.DELF.AI

Remote SEH Buffer Overflow
MD5: 1dd6eb39a388f4c8a3eaf248d86aaabc
MVID-2021-0115



TROJAN.WIN32.HOTKEYCHICK.AM

Insecure Permissions
MD5: 5ea9840970e78188f73eb1763363eeac
MVID-2021-0114



BACKDOOR.WIN32.AZBREG.AMW

Insecure Permissions
MD5: 5eb58198721d4ded363e41e243e685cc
MVID-2021-0113



TROJAN-SPY.WIN32.SPYEYES.ELR

Insecure Permissions
MD5: 025d07f4610605031e501e6745d663aa
MVID-2021-0112



TROJAN-DROPPER.WIN32.DAWS.ETLM

Remote Unauthenticated System Reboot
MD5: a0479e18283ed46e8908767dd0b40f8f
MVID-2021-0111



TROJAN.WIN32.GOFOT.HTX

Local File Buffer Overflow
MD5: ae062bfe4abd59ac1b9be693fbc45f60
MVID-2021-0110



BACKDOOR.WIN32.WOLLF.H

Missing Authentication
MD5: 4932471df98b0e94db076f2b1c0339bd
MVID-2021-0109



BACKDOOR.WIN32.DELF.ADAG

Weak Hardcoded Credentials
MD5: 0e997ab441cd8c35010dd8db98aae2c2
MVID-2021-0108



BACKDOOR.WIN32.AGENT.XW

Remote Null Ptr Dereference - Denial of Service
MD5: ed4242ad0274d3b311d8722f10b3abea
MVID-2021-0107



BACKDOOR.WIN32.AGENT.XS

Insecure Permissions
MD5: 6c51a5ba17ffd317ad08541e20131ef3
MVID-2021-0106



BACKDOOR.WIN32.DARKKOMET.IRV

Insecure Permissions
MD5: a229acff4e0605ad24eaf3d9c44fdb1b
MVID-2021-0105



TROJAN.WIN32.PINCAV.CMFL

Insecure Permissions
MD5: 9d296ebd6b4f79457fcc61e38dcce61e
MVID-2021-0104



TROJAN.WIN32.PLUDER.O

Insecure Permissions
MD5: ee22eea131c0e00162e4ba370f396a00
MVID-2021-0103



TROJAN-PROXY.WIN32.DAEMONIZE.I

Remote Denial of Service
MD5: 61bec9f22a5955e076e0d5ddf6232f3f
MVID-2021-0102



BACKDOOR.WIN32.KETCH.H

Remote Stack Buffer Overflow (SEH)
MD5: 63c55ad21e0771c7f9ca71ec3bfcea0f
MVID-2021-0101



BACKDOOR.WIN32.INJECT.TYQ

Insecure Permissions
MD5: 833868d3092bea833839a6b8ec196046
MVID-2021-0100



BACKDOOR.WIN32.BIONET.10

Anonymous Logon
MD5: be559307f5cd055f123a637b1135c8d3
MVID-2021-0099



BACKDOOR.WIN32.DARKKOMET.APCC

Insecure Permissions
MD5: 8c82de32ab2b407451b9fc054c09f717
MVID-2021-0098



BACKDOOR.WIN32.DARKKOMET.BHFH

Insecure Permissions
MD5: 2e507b75c0df0fcb2f9a85f4a0c1bc04
MVID-2021-0097



BACKDOOR.WIN32.AGENT.AAK

Remote Buffer Overflow
MD5: 64f2fd4dbd9039e5bc054f475eaa582a
MVID-2021-0096



BACKDOOR.WIN32.AGENT.AAK

Cross Site Request Forgery (CSRF) - Code Execution
MD5: 64f2fd4dbd9039e5bc054f475eaa582a
MVID-2021-0095



BACKDOOR.WIN32.AGENT.AAK

Weak Hardcoded Credentials
MD5: 64f2fd4dbd9039e5bc054f475eaa582a
MVID-2021-0094



BACKDOOR.WIN32.BURBUL.B

Anonymous Logon
MD5: 3ee4cb2e06eb1f7fe54c89db903f3e7a
MVID-2021-0093



BACKDOOR.WIN32.INDEXER.A

Remote Denial Of Service
MD5: 2b576e7551afe1c7575dc680396f1b5b
MVID-2021-0092



BACKDOOR.WIN32.INDEXER.A

Hardcoded Weak Credentials
MD5: 2b576e7551afe1c7575dc680396f1b5b
MVID-2021-0091



BACKDOOR.WIN32.BIFROSE.AHVB

Insecure Permissions
MD5: 39e22b8b19f6aed59d2def00c4228d56
MVID-2021-0090



BACKDOOR.WIN32.AZBREG.AANT

Insecure Permissions
MD5: dcc1855744f2d740745f096e4f031143
MVID-2021-0089



BACKDOOR.WIN32.CABROTOR.21

Insecure Permissions
MD5: af7001c2d6284a1295638576bc138cb2
MVID-2021-0088



TROJAN-SPY.WIN32.WINSPY.WLT

Insecure Permissions
MD5: 00e1c4a654756dd6c9c81437c01ee3dd
MVID-2021-0087



BACKDOOR.WIN32.CAFEINI.08.B

Missing Authentication
MD5: 8225bb6b430d5cdf523c4d0cabbe5793
MVID-2021-0086



BACKDOOR.WIN32.BACKLASH.101

Missing Authentication
MD5: 4ba3c08d8ad964328f2b6f618f714df2
MVID-2021-0085



BACKDOOR.WIN32.BACKATTACK.18

Multiple Vulnerabilities
MD5: c806d23f4343ab40cf897e9c38b5c1c3
MVID-2021-0084



BACKDOOR.WIN32.AUGUDOR.A

Unauthenticated Remote File Write Code Execution
MD5: 1b557d4f923b0de75e397686053a9022
MVID-2021-0083



BACKDOOR.WIN32.APHEXDOOR.LITESOCK

Remote Stack Buffer Overflow
MD5: a8bb1744bedf43849ed808b7dfa32da4
MVID-2021-0082



BACKDOOR.WIN32.NETTERRORIST

Unauthorized Remote Command Execution
MD5: 5131a9b441c9f9b20228f171c327a4f5
MVID-2021-0081



TROJAN.WIN32.CAFELOM.BU

Heap Corruption
MD5: 146ce177ab03b8f62a9fc6e7bbf40dc1
MVID-2021-0080



BACKDOOR.WIN32.WOLLF.15

Missing Authentication
MD5: ffa917e74406b8b77252be2c4f71f6d3
MVID-2021-0079



TROJAN-SPY.WIN32.WINSPY.VWL

Insecure Permissions EoP
MD5: 0187e62ca40cb3d556a2c5825620bd8f
MVID-2021-0078



TROJAN-SPY.WIN32.WEBCENTER.A

Information Disclosure
MD5: e3cf225a94c6be5a26fc21a1ec83f418
MVID-2021-0077



TROJAN-SPY.WIN32.SPYEYES.AWOW

Insecure Permissions EoP
MD5: e61a6755db1c59eb1d219b761de925f4
MVID-2021-0076



TROJAN-SPY.WIN32.SPYEYES.AUWL

Insecure Permissions EoP
MD5: 0115ba22a0d009a13d0748027dd62e2a
MVID-2021-0075



TROJAN-SPY.WIN32.SPYEYES.AUQJ

Insecure Permissions EoP
MD5: ea6ed38ab5264cd92f0d42eb020e87d8
MVID-2021-0074



TROJAN.WIN32.GENTEE.H

Insecure Permissions EoP
MD5: 2bd5672432a545db03db0e09c120d42e
MVID-2021-0073



TROJAN.WIN32.GENTEE.B

Insecure Permissions EoP
MD5: 86e63bb63f3baf48ad3bf24c3f5b7e40
MVID-2021-0072



TROJAN.WIN32.DELF.UQ

Insecure Permissions EoP
MD5: a4ea99b54e171274795f14a4ac7f17ba
MVID-2021-0071



EMAIL-WORM.WIN32.SIRCAM.EB

Insecure Permissions EoP
MD5: cd88a9b686acd9ccf23dba8d248129b4
MVID-2021-0070



TROJAN.WIN32.COSPET.ABG

Insecure Permissions EoP
MD5: 5f5b308853b9aa9243390c135ff6ba1b
MVID-2021-0069



TROJAN.WIN32.COMEI.PGO

Insecure Permissions EoP
MD5: 7cb253cf47b6de8adfea559e51950c17
MVID-2021-0068



BACKDOOR.WIN32.REMOTEMANIPULATOR.BRR

Insecure Permissions EoP
MD5: 717f316391b6a7b97fa160b0a627a413
MVID-2021-0067



BACKDOOR.WIN32.NETBULL.11.B

Remote Buffer Overflow
MD5: 0e0fc966862971c29edd4dcaa0ba8e86
MVID-2021-0066



BACKDOOR.WIN32.XYLIGAN.BLP

Insecure Permissions EoP
MD5: 6b9afcad282516173c0ab8a6eb91e8b4
MVID-2021-0065



BACKDOOR.WIN32.CELINE

Missing Authentication
MD5: 3a634db497c417679d7a20587d689d1f
MVID-2021-0064



BACKDOOR.WIN32.BUTERAT.CXQ

Insecure Permissions EoP
MD5: 8bfac1f52a94f36b711e20bce30161cc
MVID-2021-0063



BACKDOOR.WIN32.ANAPTIX.BD

Insecure Permissions EoP
MD5: 9f178de7f9918288d93ac0f065f0aa2f
MVID-2021-0062



PACKED.WIN32.KATUSHA.O (RANSOMEWARE)

Insecure Permissions EoP
MD5: e184abe44bec183a522d2c66bc3f90e0
MVID-2021-0061



BACKDOOR.WIN32.MINIBLACKLASH

Remote DoS
MD5: 57dee3430d4531a2699f6520819a2ece
MVID-2021-0060



BACKDOOR.WIN32.MHTSERV.B

Missing Authentication
MD5: 0ba104d752eb63194c356c309196c710
MVID-2021-0059



BACKDOOR.WIN32.ZHANGPO

Remote DoS
MD5: 052d18e119f9a2910ed18a137231a041
MVID-2021-0058



BACKDOOR.WIN32.ZETRONIC

Remote DoS
MD5: caf26a74ca39662e2c3d37e55a242daf
MVID-2021-0057



CONSTRUCTOR.WIN32.SPYNET.A

Remote Password Leak
MD5: 1717731c32830a31e84b74641a4fdec7
MVID-2021-0056



BACKDOOR.WIN32.WOLLF.14

Missing Authentication
MD5: ccd3e54eb76b3349db57481a0fe68b35
MVID-2021-0055



BACKDOOR.WIN32.DARKKOMET.APBB

Insecure Permissions EoP
MD5: d6c930e0ac1df934151d1890f6441fe2
MVID-2021-0054



BACKDOOR.WIN32.WOLLF.C

Hardcoded Backdoor Password
MD5: 91c02a95839a76a5d2e335cded7112a9
MVID-2021-0053



BACKDOOR.WIN32.DARKKOMET.BHFH

Insecure Permissions
MD5: 66fa06a4e3e799b059910dc17de295ae
MVID-2021-0052



BACKDOOR.WIN32.WOLLF.16

Weak Hardcoded Password
MD5: 5f79b779acd4c9c75211835a2783bccb
MVID-2021-0051



TROJAN.WIN32.XOCRY.FF

Insecure Permissions
MD5: 8f13116d46a7097e14ef971d48d6a203
MVID-2021-0050



BACKDOOR.WIN32.NOKNOK.60

Insecure Permissions
MD5: ecaf6a123fdf1f5660692dfc4c67a933
MVID-2021-0049



BACKDOOR.WIN32.JOKERDOOR (TDC MAIL SPY 1.0)

Insecure Permissions
MD5: 6c7b364dafe0560dfb15c9b03f1b44bd
MVID-2021-0048



BACKDOOR.WIN32.NOKNOK.50

Insecure Permissions
MD5: ca80897ee064ab9af5907344b316a247
MVID-2021-0047



BACKDOOR.WIN32.KRAIMER.11

Missing Authentication
MD5: 2a4fda4a6687981d32c2da7bdc1efcf1
MVID-2021-0046



BACKDOOR.WIN32.HUPIGON.ADEF

Remote Stack Buffer Overflow
MD5: c8f55ce7bbec784a97d7bfc6d7b1931f
MVID-2021-0045



BACKDOOR.WIN32.XEL

Remote Buffer Overflow
MD5: 3648c68bfe395fb9980ae547d881572c
MVID-2021-0044



BACKDOOR.WIN32.VERIFY.F

Missing Authentication
MD5: 119cd00c48678d63ec07762a7ff08ac7
MVID-2021-0043



BACKDOOR.WIN32.ONALF

Missing Authentication
MD5: ba815d409cd714c0eac010b5970f6408
MVID-2021-0042



BACKDOOR.WIN32.ZXMAN

Missing Authentication
MD5: 6b2a9304d1c7a63365db0f9fd12d39b0
MVID-2021-0041



BACKDOOR.WIN32.WINSHELL.30

Remote Stack Buffer Overflow
MD5: 56a2b135c8d35561ea5b04694155eb77
MVID-2021-0040



BACKDOOR.WIN32.WHISPER.B

Remote Stack Corruption
MD5: a0edb91f62c8c083ec35b32a922168d1
MVID-2021-0039



BACKDOOR.WIN32.WHIRLPOOL.10

Remote Buffer Overflow - (UDP Datagram)
MD5: bf0682b674ef23cf8ba0deeaf546f422
MVID-2021-0038



BACKDOOR.WIN32.ZOMBAM.GEQ

Remote Buffer Overflow
MD5: fd14cc7f025f49a3e08b4169d44a774e
MVID-2021-0037



EMAIL-WORM.WIN32.AGENT.GI

Remote Stack Buffer Overflow - (UDP Datagram)
MD5: 74e65773735f977185f6a09f1472ea46
MVID-2021-0036



BACKDOOR.WIN32.NETBULL.11.A

Remote Buffer Overflow
MD5: 80e98fdf726a3e727f3414bdbf2e86bb
MVID-2021-0035



CONSTRUCTOR.WIN32.SMWG.C

Insecure Permissions
MD5: 47e819a6ce3d5e93819f4842cfbe23d6
MVID-2021-0034



CONSTRUCTOR.WIN32.SMWG.A

Insecure Permissions
MD5: 07cd532823d6ab05d6e5e3a56f7afbfd
MVID-2021-0033



NEWFUTURE TROJAN V.1.0 BETA 1

Insecure Permissions
MD5: 4f9376824718ff23a6238c877f73ff73
MVID-2021-0032



BACKDOOR.WIN32.MNETS

Remote Stack Buffer Overflow - (UDP Datagram Proto)
MD5: 1e42493dcef54a62bc28e0a1338c1142
MVID-2021-0031



BACKDOOR.WIN32.WHGRX

Remote Host Header Stack Buffer Overflow - (UDP Datagram Protocol)
MD5: eb6fd418cd3b52132ffb029b52839edf
MVID-2021-0030



BACKDOOR.WIN32.LATINUS.B

Remote Buffer Overflow
MD5: 9adffcc98cd658a7f9c5419480013f72
MVID-2021-0029



BACKDOOR.WIN32.NUCLEROOT.T - MASKPE 1.6

File Based Buffer Overflow
MD5: 170d3ccf9f036c552aef6690bf419b2e
MVID-2021-0028



BACKDOOR.WIN32.NUCLEROOT.BI - MASKPE 2.0

File Based Buffer Overflow
MD5: 25e0570cc803cd77abc2268b41237937
MVID-2021-0027



BACKDOOR.WIN32.NCX.BT

Remote Stack Buffer Overflow
MD5: ad5c01b3e6d0254adfe0898c6d16f927
MVID-2021-0026



BACKDOOR.WIN32.KETCH.A

Remote SEH Stack Buffer Overflow
MD5: 1149c42fd8cf3ca7d00ef55a6337befe
MVID-2021-0025



BACKDOOR.WIN32.KETCH.I

Remote SEH Stack Buffer Overflow
MD5: ee314e1b913a09ec86c63d7186d8f0b8
MVID-2021-0024



BACKDOOR.WIN32.KURBADUR.A

Remote Stack Buffer Overflow
MD5: 821d3d5a9b15dc3388fe17f233cce296
MVID-2021-0023



BACKDOOR.WIN32.ZOMBAM.A

Remote Stack Buffer Overflow
MD5: 6c5081e9b65a52963b0b1ae612ef7eb4
MVID-2021-0022



BACKDOOR.WIN32.LEVELONE.B

Remote Stack Buffer Overflow
MD5: 3f82e6ddc9f5242f5af200d2fbae4ce4
MVID-2021-0021



BACKDOOR.WIN32.LEVELONE.A

Remote Stack Buffer Overflow
MD5: 6a2d09c4527cf222e4e2571b074fcc0c
MVID-2021-0020



BACKDOOR.WIN32.KETCH.B

Remote Stack Buffer Overflow
MD5: 9d7be3799594a82bf7056905f501af03
MVID-2021-0019



BACKDOOR.WIN32.NINJASPY.C

Remote Stack Buffer Overflow
MD5: 6eece319bc108576bd1f4a8364616264
MVID-2021-0018



BACKDOOR.WIN32.XTREME.YVP

Insecure Permissions EoP
MD5: 7bd93c10c9373cfc2bcc8eff712631f1
MVID-2021-0017



BACKDOOR.WIN32.AGENT.DCBH

Insecure Permissions EoP
MD5: bba63df41adcf2cf80c74e4a62539d44
MVID-2021-0016



BACKDOOR.WIN32.ZOMBAM.K

Remote String Dereference Stack Buffer Overflow
MD5: 79d9908b6769e64f922e74a090f5ceeb
MVID-2021-0015



EMAIL-WORM.WIN32.ZHELATIN.AGO

Remote Stack Buffer Overflow
MD5: 0418e7f95a8b94c035e10749234f8378
MVID-2021-0014



WIN32 BACKDOOR - 2019-02-ARTRADOWNLOADER

Remote SEH Buffer Overflow - Insecure Permissions
MD5: 8d42c01180be7588a2a68ad96dd0cf85
MVID-2021-0013



BACKDOOR.WIN32.BNLITE

Remote Heap Corruption
MD5: f78cef7588f9c32609a4932d10c67f95
MVID-2021-0012



TROJAN.WIN32.BARJAC

Remote String Dereference Stack Buffer Overflow
MD5: 62ad686f97faaa68f580d32d25333f51
MVID-2021-0011



BACKDOOR.WIN32.INFEXOR.B

Remote SEH Stack Buffer Overflow
MD5: 34c09f7fd6668c89a59ebdc8f12d1e7b
MVID-2021-0010



HEUR.RISKTOOL.WIN32.BITMINER.GEN

Remote Memory Corruption
MD5: b85ae73dbbfff1d3b90cb7c78356f2a3
MVID-2021-0009



TROJAN.WIN32.JORIK.DMSPAMMER.SZ

Remote Memory Corruption
MD5: bdcaed5042eba30f91b093f0bcb3caf3
MVID-2021-0008



MAL100.TROJ.EVAD.WINEXE - PHORPIEX

Insecure Permissions
MD5: f4d7d721f68bc9a80aaf53bc184a3c58
MVID-2021-0007



BACKDOOR.WIN32.ZOMBAM.J

Remote Stack Buffer Overflow
MD5: a4212f23e1cc3bb34b0dfe15b2ad323e
MVID-2021-0006



BACKDOOR.WIN32.REMOTEMANIPULATOR

Insecure Permissions EoP
MD5: 82183b3d85311a39fb80ae07357594e5
MVID-2021-0005



TROJAN:WIN32/ALYAK.B

Remote Stack Corruption
MD5: 6547f34243104ba6e21154ad96b799a5
MVID-2021-0004



BACKDOOR.WIN32.ADVERBOT

Remote Stack Corruption
MD5: 9919c1e86a750dd6d4f0d2a851af29ea
MVID-2021-0003



TROJAN.WIN32.BAYROB.CGAU

Insecure Permissions SYSTEM EoP
MD5: 099a169f81089dc493ea300ef0309f70
MVID-2021-0002



TROJAN.WIN32.ANTAVKA.BZ

Insecure Permissions EoP
MD5: 2e4573d8925be404a9a1ff49ee2f5bc3
MVID-2021-0001

Download reports:

wget http://malvuln.com/advisory/[ MD5.txt ]
Download Adversary3 - Malware vulnerability Intel Tool for third-party attackers

About:

 * malvuln.com is the first website exclusively dedicated to the research of
   security vulnerabilities within Malware itself.
 * There are many websites already offering information about Malware like
   Hashes, IOC, Reversing etc.
   However, none dedicated to research and analysis of vulnerabilities within
   Malware samples... until now. Long Live
   MALVULN
 * I do my own thing...
 * a6385a3bfd19b7ef5b384828a6b221ae
 * 23c348804eea02f17ea9da6911b512bd

Viruscreds:
Database of backdoor passwords used by Malware, uncovered by the Malvuln
project.

Contact:
twitter.com/malvuln
malvuln13[at]gmail.com
Disclaimer: This site is for educational and research purposes only. The author
of this site is not responsible for any damages or harm you may suffer by
accessing this website or using any information contained herein. The author of
this site doesn’t hold any responsibility over the misuse of the software,
malware, exploits or security findings contained herein and does not condone
them whatsoever. Moreover, the author of the site prohibits any malicious misuse
of security informations contained and found here or elsewhere. By continuing to
access this website you are agreeing to the full disclaimer presented here and
you accept full liability and responsibility. Do not attempt to download Malware
samples. The author of this website takes no responsibility for any kind of
damages occurring from improper Malware handling or the downloading of ANY
Malware mentioned on this website or elsewhere. malvuln.com and all of its
content is Copyright (c) malvuln.com (TM) / Circa 2021.