Port 7826 Details
known port assignments and vulnerabilities
threat/application/port search:
Port(s) |
Protocol |
Service |
Details |
Source |
7826 |
tcp |
trojan |
MiniOblivion trojan
Trojan-Dropper.Win32.Juntador.a / Weak Hardcoded Password - the malware listens on TCP ports 7826 and 13013 and drops executables under the Windows dir. Authentication is required for remote user access. However, the password "sexjerx sexjerx" is weak and hardcoded in plaintext within the executable.
References: [MVID-2021-0259]
Backdoor.Win32.Oblivion.01.a / Insecure Transit Password Disclosure - the malware listens on TCP port 7826 and makes HTTP GET requests to port 80 for "/scripts/WWPMsg.dll". The system logon credentials "Pass=beacytan" are sent plaintext via the URL query string. Third party attackers who can sniff traffic may locate the credentials which can also potentially be leaked to web server logs and or shared systems.
References: [MVID-2022-0658] |
SG
|
7826 |
tcp |
trojan |
[trojan] Oblivion |
Trojans
|
7826 |
tcp |
Oblivion |
[trojan] Oblivion |
SANS
|
7811-7844 |
tcp,udp |
|
Unassigned |
IANA
|
|
4 records found
Related ports: 13013
|