A backdoor is a Remote Administration Tools (RAT) that expose infected machines to external control via the Internet by remote attackers.
Based on the settings of your F-Secure security product, it will either move the file to the quarantine where it cannot spread or cause harm, or remove it.
This backdoor is detected as a member of the Hupigon family. the Backdoor:W32/Hupigon description provides additional details.Copies itself to:
Replicates these original Windows applications with an additional "EXE" extension:
Hupigon.EMV attempts to disable/redirect Windows applications using the following registry entries:
Registers itself as Windows COM+ System Application service using these registry entries:
Attempts to locate and terminate the following process:
Attempts to close windows containing these strings:
Attempts to connect to 22.214.171.124 on TCP port 81.
It attempts to propagate by creating "\runauto..\autorun.pif" and "\autorun.inf" on all available drives, including removable drives.The autorun.inf file is detected as Worm.Win32.AutoRun.dms.The autorun.inf appears as:
To make sure it will only run once, the mutex "Red_Server_2007" is created.
Create these directories:
Date Created: -
Date Last Modified: -