Need help? Ask the community or hire an expert.
Go to Avira Answers
Virus:BDS/Hupigon.ccy.28
Date discovered:27/10/2006
Type:Backdoor Server
In the wild:No
Reported Infections:Low
Distribution Potential:Low
Damage Potential:Medium
Static file:Yes
File size:400.196 Bytes
MD5 checksum:23f7553942c25922bfe068c20d2f1ffd
VDF version:6.36.00.175
IVDF version:6.36.00.194

 General Method of propagation:
   • No own spreading routine


Aliases:
   •  Mcafee: BackDoor-AWQ.b
   •  Kaspersky: Backdoor.Win32.Hupigon.ccy
   •  F-Secure: Backdoor.Win32.Hupigon.ccy
   •  Eset: Win32/Hupigon


Platforms / OS:
   • Windows 98
   • Windows 98 SE
   • Windows NT
   • Windows ME
   • Windows 2000
   • Windows XP
   • Windows 2003


Side effects:
   • Downloads a file
   • Drops malicious files
   • Records keystrokes
   • Registry modification
   • Steals information
   • Third party control

 Files It copies itself to the following location:
   • %WINDIR%\svchost.com



It deletes the initially executed copy of itself.



The following files are created:

%WINDIR%\svchost.DLL Further investigation pointed out that this file is malware, too. Detected as: BDS/Hupigon.E.1

%WINDIR%\svchost_Hook.DLL Further investigation pointed out that this file is malware, too. Detected as: BDS/Hupigon.BB.1

%WINDIR%\svchostKey.DLL Further investigation pointed out that this file is malware, too. Detected as: BDS/Hupigon.BB

%WINDIR%\uninstal.bat Furthermore it gets executed after it was fully created. This batch file is used to delete a file.



It tries to download a file:

– The location is the following:
   • i.6to23.com/lovelyairong/**********
This file may contain further download locations and might serve as source for new threats.

 Registry The following registry keys are added in order to load the services after reboot:

– [HKLM\SYSTEM\CurrentControlSet\Services\GrayPigeonServer]
   • "Type"=dword:00000110
   • "Start"=dword:00000002
   • "ErrorControl"=dword:00000000
   • "ImagePath"="%WINDIR%\svchost.com"
   • "DisplayName"="Gray_Pigeon_Server"
   • "ObjectName"="LocalSystem"
   • "Description"="»Ò¸ë×Ó·þÎñ¶Ë³ÌÐò¡£Ô¶³Ì¼à¿Ø¹ÜÀí."

– [HKLM\SYSTEM\CurrentControlSet\Services\GrayPigeonServer\Security]
   • "Security"=%hex values%

– [HKLM\SYSTEM\CurrentControlSet\Services\GrayPigeonServer\Enum]
   • "0"="Root\\LEGACY_GRAYPIGEONSERVER\\0000"
   • "Count"=dword:00000001
   • "NextInstance"=dword:00000001



The following registry keys are changed:

– [HKCU\Software\Microsoft\Internet Explorer\Main]
   Old value:
   • "Check_Associations"=%user defined settings%
   New value:
   • "Check_Associations"="yes"

– [HKCU\Software\Microsoft\Internet Connection Wizard]
   New value:
   • "Completed"=hex:01,00,00,00

 Backdoor Contact server:
The following:
   • %URL from downloaded file%

As a result remote control capability is provided.

Remote control capabilities:
    • Start keylog

 Injection –  It injects the following file into a process: svchost.DLL

    Process name:
   • iexplore.exe



–  It injects the following file into a process: svchostKey.DLL

    Process name:
   • %all running processes%



–  It injects the following file into a process: svchost_Hook.DLL

    Process name:
   • %all running processes%


 Rootkit Technology It is a malware-specific technology. The malware hides its presence from system utilities, security applications and in the end, from the user.


Hides the following:
– Its own files


Method used:
    • Hidden from Windows API

 File details Programming language:
The malware program was written in Delphi.


Runtime packer:
In order to aggravate detection and reduce size of the file it is packed with the following runtime packer:
   • ASPack

Description inserted by Adriana Popa on Wednesday, November 29, 2006
Description updated by Adriana Popa on Wednesday, November 29, 2006

Back . . . .