Home / malwarePDF  

Backdoor:Win32/Hupigon.FN


First posted on 11 October 2012.
Source: Microsoft

Aliases :

Backdoor:Win32/Hupigon.FN is also known as not-a-virus:NetTool.Win32.ZXProxy.a (Kaspersky), TR/Stealer.2ns1.A (Avira), Trojan.Popuper.40110 (Dr.Web), Win32/NetTool.ZxShell.A application (ESET), not-a-virus:NetTool.Win32.ZXProxy.a (Ikarus), BackDoor-EGR (McAfee), Hack.Win32.ArpCheater.b (Rising AV).

Explanation :



Backdoor:Win32/Hupigon.FN is a backdoor component of Win32/Hupigon. It runs as a service and opens a backdoor server in your computer.



Installation

Backdoor:Win32/Hupigon.FN drops a DLL file as "%SystemRoot%\system32\sdna.flasher.dll". This DLL file is also detected as Backdoor:Win32/Hupigon.FN.

It creates the following registry entries so that the DLL file automatically runs every time Windows starts:

In subkey: HKLM\SYSTEM\CurrentControlSet\Services\6to4\Parameters
Sets value: "ServiceDll"
With data: "%SystemRoot%\system32\sdna.flasher.dll"
Sets value: "ImagePath"
With data: "%SystemRoot%\System32\svchost.exe -k netsvcs"



Payload

Allows backdoor access and control

Backdoor:Win32/Hupigon.FN connects to a remote server to receive instructions from an attacker. It connects to the server located in "8.8.ki" via port 53.

The commands it receives include, but are not limited to:

  • Controlling Windows services: creating, deleting, starting, and stopping services, and modifying service settings
  • Configuring Windows Terminal Services: enabling or disabling desktop sharing, modifying the listening port
  • Opening a Windows console, with the attacker controlling input and output of the console
  • Logging off, restarting, or shutting down the system
  • Performing port scans
  • Injecting a DLL into a specified process
  • Creating a process with elevated privileges
  • Listing the processes running in your computer
  • Downloading or uploading arbitrary files
  • Uninstalling itself




Analysis by Horea Coroiu

Last update 11 October 2012

 

TOP