A backdoor is a Remote Administration Tools (RAT) that expose infected machines to external control via the Internet by remote attackers.
Depending on the settings of your F-Secure security product, it will either automatically delete, quarantine or rename the suspect file, or ask you for a desired action.
More information on the scanning and removal options available in your F-Secure product can be found in the Help Center.
You may also refer to the Knowledge Base on the F-Secure Community site for more information.
This backdoor is detected as a member of the Hupigon family. the Backdoor:W32/Hupigon description provides additional details.Copies itself to:
Replicates these original Windows applications with an additional "EXE" extension:
Hupigon.EMV attempts to disable/redirect Windows applications using the following registry entries:
Registers itself as Windows COM+ System Application service using these registry entries:
Attempts to locate and terminate the following process:
Attempts to close windows containing these strings:
Attempts to connect to 184.108.40.206 on TCP port 81.
It attempts to propagate by creating "\runauto..\autorun.pif" and "\autorun.inf" on all available drives, including removable drives.The autorun.inf file is detected as Worm.Win32.AutoRun.dms.The autorun.inf appears as:
To make sure it will only run once, the mutex "Red_Server_2007" is created.
Create these directories: