A backdoor is a Remote Administration Tools (RAT) that expose infected machines to external control via the Internet by remote attackers.
Depending on the settings of your F-Secure security product, it will either automatically delete, quarantine or rename the suspect file, or ask you for a desired action.
More scanning & removal options
More information on the scanning and removal options available in your F-Secure product can be found in the Help Center.
You may also refer to the Knowledge Base on the F-Secure Community site for more information.
This backdoor is detected as a member of the Hupigon family. the Backdoor:W32/Hupigon description provides additional details.Copies itself to:
Replicates these original Windows applications with an additional "EXE" extension:
- %Windows%\system32\cmd.exe to %Windows%\system32\cmd.exe.exe
- %Windows%\regedit.exe to %Windows%\regedit.exe.exe
Hupigon.EMV attempts to disable/redirect Windows applications using the following registry entries:
- HKLM\Software\Microsoft\Windows NT\ CurrentVersion\Image File Execution Options\cmd.exe Debugger = setuprs1.PIF
- HKLM\Software\Microsoft\Windows NT\ CurrentVersion\Image File Execution Options\regedit.exe Debugger = setuprs1.PIF
- HKLM\Software\Microsoft\Windows NT\ CurrentVersion\Image File Execution Options\regedt32.exe Debugger = setuprs1.PIF
- HKLM\Software\Microsoft\Windows NT\ CurrentVersion\Image File Execution Options\msconfig.exe Debugger = 7303.PIF
Registers itself as Windows COM+ System Application service using these registry entries:
- HKLM\System\CurrentControlSet\Services\COMSystemApp Type = 00000110
- HKLM\System\CurrentControlSet\Services\COMSystemApp ErrorControl = 00000000
- HKLM\System\CurrentControlSet\Services\COMSystemApp ImagePath = C:\WINDOWS\dllhost.exe -netsvcs
- HKLM\System\CurrentControlSet\Services\COMSystemApp DisplayName = COM+ System Applications
Attempts to locate and terminate the following process:
Attempts to close windows containing these strings:
- ZoneAlarm Pro
Attempts to connect to 126.96.36.199 on TCP port 81.
It attempts to propagate by creating "\runauto..\autorun.pif" and "\autorun.inf" on all available drives, including removable drives.The autorun.inf file is detected as Worm.Win32.AutoRun.dms.The autorun.inf appears as:
- [AutoRun] open=RUNAUT~1\autorun.pif shell\1=´ò¿ª(&O) shell\1\Command=RUNAUT~1\autorun.pif shell\2\=ä¯ÀÀ(&B) shell\2\Command=RUNAUT~1\autorun.pif shellexecute=RUNAUT~1\autorun.pif
To make sure it will only run once, the mutex "Red_Server_2007" is created.
File System Changes
Create these directories: