Home Malware Programs Backdoors Backdoor.Hugly

Backdoor.Hugly

Posted: January 10, 2013

Threat Metric

Ranking: 2,563
Threat Level: 1/10
Infected PCs: 927
First Seen: January 10, 2013
Last Seen: January 6, 2022
OS(es) Affected: Windows

Backdoor.Hugly is a backdoor Trojan that opens a back door and may also steal information from the infected computer. Once executed,
Backdoor.Hugly creates a mutex to assure it is the only copy of itself running on the targeted PC. When installed, Backdoor.Hugly downloads potentially files. Backdoor.Hugly inserts a code into the file before executing it. Backdoor.Hugly can also delete files. Backdoor.Hugly modifies the registry entry. Backdoor.Hugly collects various information from the affected computer. Backdoor.Hugly then transmits the collected information to the remote location. Backdoor.Hugly then opens a back door on the corrupted PC and may receive commands to perform malicious actions on the attacked machine.

Use SpyHunter to Detect and Remove PC Threats

If you are concerned that malware or PC threats similar to Backdoor.Hugly may have infected your computer, we recommend you start an in-depth system scan with SpyHunter. SpyHunter is an advanced malware protection and remediation application that offers subscribers a comprehensive method for protecting PCs from malware, in addition to providing one-on-one technical support service.

Download SpyHunter's Malware Scanner

Note: SpyHunter's free version is only for malware detection. If SpyHunter detects malware on your PC, you will need to purchase SpyHunter's malware tool to remove the malware threats. Learn more on SpyHunter. If you would like to uninstall SpyHunter for any reason, please follow these uninstall instructions. To learn more about our policies and practices, visit our EULA, Privacy Policy and Threat Assessment Criteria .

Why can't I open any program including SpyHunter? You may have a malware file running in memory that kills any programs that you try to launch on your PC. Tip: Download SpyHunter from a clean computer, copy it to a USB thumb drive, DVD or CD, then install it on the infected PC and run SpyHunter's malware scanner.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



calc.exe File name: calc.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%ProgramFiles%\Common Files\config.exe File name: %ProgramFiles%\Common Files\config.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%ProgramFiles%\[CHINESE CHARACTERS].hwp File name: %ProgramFiles%\[CHINESE CHARACTERS].hwp
Mime Type: unknown/hwp
Group: Malware file
%ProgramFiles%\Windows NT\htrn.dll File name: %ProgramFiles%\Windows NT\htrn.dll
File type: Dynamic link library
Mime Type: unknown/dll
Group: Malware file
%CurrentFolder%\[SAMPLE_NAME].exe File name: %CurrentFolder%\[SAMPLE_NAME].exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%ProgramFiles%\config.exe File name: %ProgramFiles%\config.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%ProgramFiles%\Windows NT\hyper.dll (Trojan Horse) File name: %ProgramFiles%\Windows NT\hyper.dll (Trojan Horse)
Mime Type: unknown/dll (Trojan Horse)
Group: Malware file