Discovery / credits: Malvuln - malvuln.com (c) 2021 Original source: https://malvuln.com/advisory/bcad7aa6cb6cb9d94377cd88acbca1c9.txt Contact: malvuln13@gmail.com Media: twitter.com/malvuln Threat: Worm.Win32.Busan.k Vulnerability: Insecure Communication Protocol Description: Busan.k launches a windows cmd console on the infected host so that it can send and receive messages back and forth over TCP port 2121. The worm uses unencrypted plaintext socket communication allowing anyone who can sniff network traffic to read any communications sent or retrieved. This can disclose sensitive information to third-party well positioned attackers. Type: PE32 MD5: bcad7aa6cb6cb9d94377cd88acbca1c9 Vuln ID: MVID-2021-0185 Dropped files: Disclosure: 04/23/2021 Exploit/PoC: E.g. Wireshark to sniff communications. 18 24.610339 192.168.88.130 192.168.88.128 TCP 68 56103 → 2121 [PSH, ACK] Seq=1 Ack=1 Win=8212 Len=14 0000 00 XX XX XX XX XX 00 XX XX XX XX XX 08 00 45 00 ..).....)R....E. 0010 00 36 cc 00 40 00 80 06 00 00 c0 a8 58 82 c0 a8 .6..@.......X... 0020 58 80 db 27 08 49 3c 1a 3c 74 fc c1 08 dd 50 18 X..'.I<.