Port 6767 Details
known port assignments and vulnerabilities
threat/application/port search:
Port(s) |
Protocol |
Service |
Details |
Source |
6767 |
tcp |
trojans |
KiLo [Symantec-2003-021319-1815-99], Pasana, UandMe, NT Remote Control trojans
Backdoor.Win32.NTRC / Weak Hardcoded Credentials - the malware listens on TCP port 6767. Authentication is required, however the password "Please change me" is weak and hardcoded in cleartext at offset 0045E520. Commands get executed by sending the password delimited by a semicolon ";" E.g. Please change me;SystemInfo;. The command SendScreen dumps screenshot as .BMF file, to get the next part of the file issue SendScreenNextPart.
References: [MVID-2022-0646] |
SG
|
6767 |
tcp |
trojan |
KiLo, Pasana, UandMe |
Trojans
|
6767 |
udp |
trojan |
KiLo, UandMe |
Trojans
|
6767 |
tcp |
UandMe |
[trojan] UandMe |
SANS
|
6767 |
tcp,udp |
bmc-perf-agent |
BMC PERFORM AGENT |
IANA
|
|
5 records found
Related ports: 6766
|