Backdoor.Win32.Ncx.bt malware suffers from a remote stack buffer overflow vulnerability.
Threat: Backdoor.Win32.Ncx.bt Vulnerability: Remote Stack Buffer Overflow Description: The malware listens on TCP port 42, sending a single HTTP GET request with a packet size of 10140 bytes, will trigger the buffer overflow overwriting both EIP and structured exception handler (SEH). Type: PE32 MD5: ad5c01b3e6d0254adfe0898c6d16f927 Vuln ID: MVID-2021-0026 Dropped files: ASLR: False DEP: False Safe SEH: True Disclosure: 01/15/2021
This dump file has an exception of interest stored in it. The stored exception information can be accessed via .ecxr. (1ef8.1d94): Access violation - code c0000005 (first/second chance not available) eax=00000000 ebx=00000000 ecx=41414141 edx=773e9d70 esi=00000000 edi=00000000 eip=41414141 esp=030b1660 ebp=030b1680 iopl=0 nv up ei pl zr na pe nc cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010246 41414141 ?? ???
*** WARNING: Unable to verify checksum for Backdoor.Win32.Ncx.bt.ad5c01b3e6d0254adfe0898c6d16f927.exe *** ERROR: Module load completed but symbols could not be loaded for Backdoor.Win32.Ncx.bt.ad5c01b3e6d0254adfe0898c6d16f927.exe
IP_ON_HEAP: 02870d50 The fault address in not in any loaded module, please check your build's rebase log at <releasedir>\bin\build_logs\timebuild\ntrebase.log for module which may contain the address if it were loaded.