Port 5859 Details
known port assignments and vulnerabilities
threat/application/port search:
Port(s) |
Protocol |
Service |
Details |
Source |
5859 |
tcp,udp |
wherehoo |
Backdoor.Win32.Armagedon.R / Hardcoded Cleartext Credentials - the malware listens on TCP port 5859 and requires authentication. The password "KOrUPtIzEre" is stored in cleartext within the PE file at offset 0x4635f. Connecting to the backdoor returns the value "1" then enter the password.
References: [MVID-2024-0670]
WHEREHOO (IANA official) |
SG
|
5859 |
tcp,udp |
wherehoo |
WHEREHOO |
IANA
|
|
2 records found
|