A backdoor is a Remote Administration Tools (RAT) that expose infected machines to external control via the Internet by remote attackers.
Based on the settings of your F-Secure security program, it will either automatically delete, quarantine or rename the detected program or file, or ask you for a desired action.
This backdoor is detected as a member of the Hupigon family. the Backdoor:W32/Hupigon description provides additional details.Copies itself to:
Replicates these original Windows applications with an additional "EXE" extension:
Hupigon.EMV attempts to disable/redirect Windows applications using the following registry entries:
Registers itself as Windows COM+ System Application service using these registry entries:
Attempts to locate and terminate the following process:
Attempts to close windows containing these strings:
Attempts to connect to 126.96.36.199 on TCP port 81.
It attempts to propagate by creating "\runauto..\autorun.pif" and "\autorun.inf" on all available drives, including removable drives.The autorun.inf file is detected as Worm.Win32.AutoRun.dms.The autorun.inf appears as:
To make sure it will only run once, the mutex "Red_Server_2007" is created.
Create these directories:
Date Created: -
Date Last Modified: -