Port 5277 Details
known port assignments and vulnerabilities
threat/application/port search:
Port(s) |
Protocol |
Service |
Details |
Source |
5277 |
tcp |
trojan |
WinJank [Symantec-2003-071117-5539-99] (2003.07.11) - a backdoor trojan horse that allows unauthorized access to your computer, listens to port 5277 TCP by default.
WinShell trojan also uses this port.
Backdoor.Win32.WinShell.30 / Remote Stack Buffer Overflow / Missing Authentication - WinShell.30 listens on TCP port 5277 for commands. Attackers or responders who can reach the infected host can trigger a buffer overflow by sending a large string of junk characters in place of an expected command. This will overwrite EIP and potentially allow control of the malwares execution flow. Moreover, WinShell.30 also lacks any type of authentication for inbound connections, which can allow anyone to take over the infected system.
References: [MVID-2021-0040]
Backdoor.Win32.Wisell / Unauthenticated Remote Command Execution - the malware listens on TCP port 5277, third-party attackers who can reach the system can execute OS commands further compromising the already infected system. Sending the exclaimation point character "!" will not only quit the shell, but also effectively terminate the backdoor.
References: [MVID-2021-0234]
Backdoor.Win32.Winshell.5_0 / Weak Hardcoded Credentials - the malware is UPX packed, listens on TCP port 5277 and requires authentication for remote access. However, the password "123456789" is weak and hardcoded within the PE file. Unpacking the executable, easily reveals the cleartext password.
References: [MVID-2022-0633] |
SG
|
5277 |
tcp |
threat |
WinJank |
Bekkoame
|
5120-5300 |
udp |
applications |
Neverwinter Nights 2 |
Portforward
|
5273-5279 |
tcp,udp |
|
Unassigned |
IANA
|
|
4 records found
|