PORTHOLE
Description
(Mandiant) FIN13 used PORTHOLE, a Java-based port scanner, to conduct network research. PORTHOLE may attempt multiple socket connections to many IPs and ports and, as it is multi-threaded, can execute this operation rapidly with potentially multiple overlapping connections. The malware accepts as its first argument either an IP address with wildcards in the address, or a filename. The second argument is the starting port range to scan for each IP, and the third is the ending port range.
Names
Name |
---|
PORTHOLE |
Category
Malware
Type
- Reconnaissance
Information
Other Information
Uuid
c840fb35-74e8-4953-a1a5-58b7607053bf
Last Card Change
2021-12-26