Home / malwarePDF  

Backdoor:Win32/Hupigon.EC


First posted on 06 March 2019.
Source: Microsoft

Aliases :

Backdoor:Win32/Hupigon.EC is also known as Trj/Thed.A, Mal/Behav-374, BKDR_HUPIGO.SMX.

Explanation :

Backdoor:Win32/Hupigon.EC is a component of Win32/Hupigon, a family of backdoor Trojans. The malware connects to remote websites to send infection notification messages. Installation Backdoor:Win32/Hupigon.EC copies itself to the computer using any of the following file names:   _backupuser.exe _msbackup.exe _recycled.scr autodialer.exe backupuser.exe msbackup.exe ntprint.exe recycled.scr svcfwwm.exe   Backdoor:Win32/Hupigon.EC also injects its code into a running copy of Internet Explorer when run. Payload Connects to a remote website Backdoor:Win32/Hupigon.EC tries connect to different remote websites to send notification of infecting the computer. The domain name of the site may vary according to the following format:   mysguser.okebox.com ttos.okebox.com   For example: mysguser8675.okebox.com mysguser8680.okebox.com ttos019101.okebox.com ttos019102.okebox.com   Analysis by Jireh Sanico

Last update 06 March 2019

 

TOP