Full Disclosure: HEUR.Backdoor.Win32.Poison.gen / Arbitrary Code Execution / MVID-2025-0701
seclists.org·5d
🎫Kerberos Exploitation
Preview
Report Post

Full Disclosure mailing list archives


From: malvuln <malvuln13 () gmail com> Date: Sat, 20 Dec 2025 23:16:48 -0500


Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2025
Original source:
https://malvuln.com/advisory/b2e50fa38510a5ea8e11f614b1c1d0d5.txt
Malvuln Intelligence Feed: https://intel.malvuln.com/
Contact: malvuln13 () gmail com
Media: x.com/malvuln

Threat: HEUR.Backdoor.Win32.Poison.gen
Vulnerability: Arbitrary Code Execution
Description: The malware looks for and executes a x32-bit
"WININET.dll" PE file in its current directory. Therefore, we can
hijack the DLL and execute our own code to intercept and terminate the
malware. Leverage RansomLordNG v1.0 for DLL generation, while written
as a proof-of-conc...

Similar Posts

Loading similar posts...