Home Malware Programs Backdoors Backdoor:Win32/Hupigon.CN

Backdoor:Win32/Hupigon.CN

Posted: March 22, 2013

Threat Metric

Threat Level: 6/10
Infected PCs: 14
First Seen: March 22, 2013
Last Seen: January 28, 2022
OS(es) Affected: Windows

Backdoor:Win32/Hupigon.CN is a backdoor Trojans that allows a remote attacker to gain full access and control of the infected computer. When installed, Backdoor:Win32/Hupigon.CN makes system changes by dropping potentially malicious files on the compromised PC. Backdoor:Win32/Hupigon.CN also makes registry modifications. Backdoor:Win32/Hupigon.CN adds and runs a copy of itself on the corrupted machine. The copies of Backdoor:Win32/Hupigon.CN have the read-only and hidden attributes set. Backdoor:Win32/Hupigon.CN modifies the registry entries to assure that it loads when Windows is started. Backdoor:Win32/Hupigon.CN performs numerous malicious actions, such as, logging keystrokes or stealing personal data, controlling and taking screenshots, controlling a web camera of the desktop, turning on a microphone to listen to and record the victimized computer user, recording the victim's personal information such as usernames, passwords and the websites visited, once the vulnerable computer is affected and connected to the Internet or a network.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



[system folder] \windows.exe File name: [system folder] \windows.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
[system folder] \ windowsapplication1.exe File name: [system folder] \ windowsapplication1.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
[system folder] \taskmrg.exe (not taskmgr.exe) File name: [system folder] \taskmrg.exe (not taskmgr.exe)
Mime Type: unknown/exe)
Group: Malware file
%APPDATA% \svchost.exe\multistarter.exe File name: %APPDATA% \svchost.exe\multistarter.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%APPDATA% \svchost.exe File name: %APPDATA% \svchost.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file

Registry Modifications

The following newly produced Registry Values are:

HKEY..\..\{Value}HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run "Policies" = "%SYSTEM%\windows.exe"HKEY_LOCAL_MACHINE\Software\Microsoft\Active Setup\Installed Components\[RANDOM CHARACTERS] "StubPath" = "%SYSTEM%\windows.exe restart" or "%SYSTEM%\server.exe restart"HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run "Policies" = "%SYSTEM%\server.exe"HKEY_LOCAL_MACHINE\Software\Microsoft\Active Setup\Installed Components\2DW0SJYE-LCXY-1KR2-V0J8-4JW360NX073R" "StubPath" = [system folder]\windows.exe restart
Loading...