A fake proof-of-concept (PoC) exploit for a recent LDAP vulnerability distributes information stealer malware.