A backdoor is a Remote Administration Tools (RAT) that expose infected machines to external control via the Internet by remote attackers.
Once detected, the F-Secure security product will automatically disinfect the suspect file by either deleting it or renaming it.
Detailed instructions for F-Secure security products are available in the documentation found in the Downloads section of our Home - Global site.
You may also refer to the Knowledge Base on the F-Secure Community site for further assistance.
This backdoor is detected as a member of the Hupigon family. the Backdoor:W32/Hupigon description provides additional details.Copies itself to:
Replicates these original Windows applications with an additional "EXE" extension:
- %Windows%\system32\cmd.exe to %Windows%\system32\cmd.exe.exe
- %Windows%\regedit.exe to %Windows%\regedit.exe.exe
Hupigon.EMV attempts to disable/redirect Windows applications using the following registry entries:
- HKLM\Software\Microsoft\Windows NT\ CurrentVersion\Image File Execution Options\cmd.exe Debugger = setuprs1.PIF
- HKLM\Software\Microsoft\Windows NT\ CurrentVersion\Image File Execution Options\regedit.exe Debugger = setuprs1.PIF
- HKLM\Software\Microsoft\Windows NT\ CurrentVersion\Image File Execution Options\regedt32.exe Debugger = setuprs1.PIF
- HKLM\Software\Microsoft\Windows NT\ CurrentVersion\Image File Execution Options\msconfig.exe Debugger = 7303.PIF
Registers itself as Windows COM+ System Application service using these registry entries:
- HKLM\System\CurrentControlSet\Services\COMSystemApp Type = 00000110
- HKLM\System\CurrentControlSet\Services\COMSystemApp ErrorControl = 00000000
- HKLM\System\CurrentControlSet\Services\COMSystemApp ImagePath = C:\WINDOWS\dllhost.exe -netsvcs
- HKLM\System\CurrentControlSet\Services\COMSystemApp DisplayName = COM+ System Applications
Attempts to locate and terminate the following process:
Attempts to close windows containing these strings:
- ZoneAlarm Pro
Attempts to connect to 188.8.131.52 on TCP port 81.
It attempts to propagate by creating "\runauto..\autorun.pif" and "\autorun.inf" on all available drives, including removable drives.The autorun.inf file is detected as Worm.Win32.AutoRun.dms.The autorun.inf appears as:
- [AutoRun] open=RUNAUT~1\autorun.pif shell\1=´ò¿ª(&O) shell\1\Command=RUNAUT~1\autorun.pif shell\2\=ä¯ÀÀ(&B) shell\2\Command=RUNAUT~1\autorun.pif shellexecute=RUNAUT~1\autorun.pif
To make sure it will only run once, the mutex "Red_Server_2007" is created.
File System Changes
Create these directories: