Port 13013 Details
known port assignments and vulnerabilities
threat/application/port search:
Port(s) |
Protocol |
Service |
Details |
Source |
13013 |
tcp |
trojan |
Backdoor.Psychward [Symantec-2001-052208-1840-99]
Trojan-Dropper.Win32.Juntador.a / Weak Hardcoded Password - the malware listens on TCP ports 7826 and 13013 and drops executables under the Windows dir. Authentication is required for remote user access. However, the password "sexjerx sexjerx" is weak and hardcoded in plaintext within the executable.
References: [MVID-2021-0259]
Backdoor.Win32.IRCBot.gen / Weak Hardcoded Password - the malware listens on TCP port 13013. Authentication is required for remote user access. However, the password "slimanus" is weak and hardcoded in plaintext within the executable.
References: [MVID-2021-0295] |
SG
|
13013 |
tcp |
trojan |
[trojan] PsychWard |
Trojans
|
13013 |
tcp |
PsychWard |
[trojan] PsychWard |
SANS
|
13000-13050 |
udp |
|
Linden Lab viewer to sim (unofficial) |
Wikipedia
|
12866-13159 |
tcp,udp |
|
Unassigned |
IANA
|
|
5 records found
Related ports: 6777 7826 13014
|