Port 1015 Details
known port assignments and vulnerabilities
threat/application/port search:
Port(s) |
Protocol |
Service |
Details |
Source |
1015 |
tcp |
trojans |
Doly trojan v1.6 (different versions use TCP ports 1010, 1011, 1012, 1015, 1016)
Backdoor.Win32.Wollf.16 / Authentication Bypass - the malware listens on TCP port 1015 and has an FTPD feature that when enabled listens on TCP port 21. Third-party attackers who can reach an infected system can logon using any username/password combination.
References: [MVID-2022-0462]
Backdoor.Win32.Wollf.16 / Weak Hardcoded Credentials - the malware runs with SYSTEM integrity, listens on TCP port 1015 and is protected by Armadillo(3.00a-3.70a) & UPX(1.07)NRV,brute. However, the password "ddr_bkdoor" is weak and can be found at offset 0019F58C.
References: [MVID-2022-0463] |
SG
|
1015 |
tcp |
trojan |
Doly Trojan |
Trojans
|
1015 |
tcp |
DolyTrojan |
[trojan] Doly Trojan |
Neophasis
|
1015 |
tcp |
threat |
Doly Trojan |
Bekkoame
|
1011-1020 |
tcp,udp |
|
Reserved |
IANA
|
|
5 records found
Related ports: 21 1010 1011 1012 1016
|