Port 31745 Details
known port assignments and vulnerabilities
threat/application/port search:
Port(s) |
Protocol |
Service |
Details |
Source |
31745 |
tcp |
trojan |
BuschTrommel trojan
Backdoor.Win32.Bushtrommel.122 / Authentication Bypass - the malware listens on TCP port 31745 runs an ftp server on port 1030. Attackers who can reach infected systems can logon using any username/password combination. Intruders may then upload executables using ftp PASV, STOR commands.
References: [MVID-2022-0629]
Backdoor.Win32.Bushtrommel.122 / Unauthenticated Remote Command Execution - the malware listens on TCP port 31745 and 1030. Adversaries who can reach infected hosts can run commands made available by the backdoor. The "*RUN" command calls CreateProcess() based on CL input, errors will result in a pop up dialog on the infected host:
"CreateProcess() in function () GetConsoleOuput() failed!". Correct syntax is as follows *RUN"calc.exe", successful code execution results in the response "*EVA*" from the backdoored host.
References: [MVID-2022-0630] |
SG
|
31745 |
tcp |
trojan |
[trojan] BuschTrommel |
Trojans
|
31745 |
tcp |
BuschTrommel |
[trojan] BuschTrommel |
SANS
|
31686-31764 |
tcp,udp |
|
Unassigned |
IANA
|
|
4 records found
Related ports: 1030
|