Need help? Ask the community or hire an expert.
Go to Avira Answers
Virus:BDS/Hupigon.pi.2
Date discovered:06/12/2005
Type:Backdoor Server
In the wild:No
Reported Infections:Low
Distribution Potential:Low
Damage Potential:Medium
Static file:Yes
File size:932.096 Bytes
MD5 checksum:1a3cd56d52f007d9ba012b6a125e30db
VDF version:6.32.01.11

 General Method of propagation:
   • No own spreading routine


Aliases:
   •  Mcafee: BackDoor-AWQ.b
   •  Bitdefender: Backdoor.Hupigon.E


Platforms / OS:
   • Windows 95
   • Windows 98
   • Windows 98 SE
   • Windows NT
   • Windows ME
   • Windows 2000
   • Windows XP
   • Windows 2003


Side effects:
   • Drops malicious files
   • Registry modification
   • Third party control

 Files It copies itself to the following location:
   • %WINDIR%\internet.exe



It deletes the initially executed copy of itself.



The following files are created:

– A file that is for temporary use and it might be deleted afterwards:
   • %TEMPDIR%\mc%hex number%.tmp

%WINDIR%\internet.DLL Further investigation pointed out that this file is malware, too. Detected as: BDS/Feutel.A.2

%WINDIR%\internet_HOOk.DLL Further investigation pointed out that this file is malware, too. Detected as: BDS/Hupigon.MK.2

 Registry The following registry keys are added in order to load the services after reboot:

– [HKLM\SYSTEM\CurrentControlSet\Services\internet]
   • Type"=dword:00000110
   • Start"=dword:00000002
   • ErrorControl = dword:00000000
   • ImagePath = %WINDIR%\internet.exe
   • DisplayName = internet
   • ObjectName = LocalSystem
   • Description = ϵͳ¹¤¾ß

– [HKLM\SYSTEM\CurrentControlSet\Services\internet\Security]
   • Security = %hex values%

– [HKLM\SYSTEM\CurrentControlSet\Services\internet\Enum]
   • 0 = Root\\LEGACY_INTERNET\\0000
   • Count = dword:00000001
   • NextInstance = dword:00000001

– [HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_INTERNET]
   • NextInstance = dword:00000001

– [HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_INTERNET\0000]
   • Service"="internet"
   • Legacy = dword:00000001
   • ConfigFlags = dword:00000000
   • Class = LegacyDriver
   • ClassGUID = {8ECC055D-047F-11D1-A537-0000F8753ED1}
   • DeviceDesc = internet

– [HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_INTERNET\0000\
   Control]
   • *NewlyCreated* = dword:00000000
   • ActiveService = internet

– [HKLM\SYSTEM\CurrentControlSet\Services\mchInjDrv]
   • Type = dword:00000001
   • ErrorControl = dword:00000000
   • Start = dword:00000004
   • ImagePath = \??\%TEMPDIR%\mc%hex number%.tmp
   • DeleteFlag"=dword:00000001



The following registry keys are added:

– [HKCU\Software\Microsoft\Internet Connection Wizard]
   • Completed = hex:01,00,00,00

– [HKCU\Software\Microsoft\Internet Explorer\Main]
   • Check_Associations = no

 Backdoor Contact server:
The following:
   • vip.huigezi.com/user/**********

As a result remote control capability is provided.

 Injection – It injects a backdoor routine into a process.

    Process name:
   • iexplore.exe



–  It injects the following file into a process: %WINDIR%\internet_HOOk.DLL

    Process name:
   • %all running processes%


 Rootkit Technology It is a malware-specific technology. The malware hides its presence from system utilities, security applications and in the end, from the user.


Hides the following:
– Its own files


Method used:
    • Hidden from Windows API

 File details Programming language:
The malware program was written in Delphi.

Description inserted by Andrei Gherman on Thursday, March 2, 2006
Description updated by Andrei Gherman on Thursday, March 2, 2006

Back . . . .