Read Time:21 Second
Posted by malvuln on Oct 30
Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2022
Original source:
https://malvuln.com/advisory/8d0df60c96e4011c312d61ed3e6dc70e.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln
Threat: Email-Worm.Win32.Kipis.c
Vulnerability: Remote File Write Code Execution
Description: The malware listens on TCP port 8297. Third-party adversaries
who can reach the infected host can write executable code to a file named…