Need help? Ask the community or hire an expert.
Go to Avira Answers
Virus:BDS/Hupigon.cct.2
Date discovered:25/09/2006
Type:Backdoor Server
In the wild:No
Reported Infections:Low
Distribution Potential:Low
Damage Potential:Low to medium
Static file:Yes
File size:338.944 Bytes
MD5 checksum:cf18ac20f3b377dd369cf8286d3a5df5
VDF version:6.35.01.196
IVDF version:6.35.01.200 - Friday, September 8, 2006

 General Method of propagation:
   • No own spreading routine


Aliases:
   •  Kaspersky: Backdoor.Win32.Hupigon.cct
   •  TrendMicro: BKDR_HUPIGON.GEN
   •  Bitdefender: Backdoor.Hupigon.E


Platforms / OS:
   • Windows 95
   • Windows 98
   • Windows 98 SE
   • Windows NT
   • Windows ME
   • Windows 2000
   • Windows XP
   • Windows 2003


Side effects:
   • Drops malicious files
   • Records keystrokes
   • Registry modification

 Files It copies itself to the following location:
   • %WINDIR%\G_Server2006.exe



It deletes the initially executed copy of itself.



The following files are created:

%WINDIR%\G_Server2006Key.log This is a non malicious text file with the following content:
   • %stolen information%

%WINDIR%\uninstal.bat Furthermore it gets executed after it was fully created. This batch file is used to delete a file.
%WINDIR%\G_Server2006.DLL Further investigation pointed out that this file is malware, too. Detected as: TR/Hupigon.GQ.1

%WINDIR%\G_Server2006Key.DLL Furthermore it gets executed after it was fully created. Further investigation pointed out that this file is malware, too. Detected as: TR/Hupigon.GQ.1




It tries to download a file:

– The location is the following:
   • http://www.news.huigezi.com/**********
At the time of writing this file was not online for further investigation.



It tries to executes the following file:

– Filename:
   • %SYSDIR%\services.exe %WINDIR%\G_Server2006.exe

 Registry The following registry keys are added in order to load the service after reboot:

– [HKLM\SYSTEM\CurrentControlSet\Services\GrayPigeonServer\Security]
   • "Security"=%hex values%

– [HKLM\SYSTEM\CurrentControlSet001\Services\GrayPigeonServer\
   Security]
   • "Security"=%hex values%

– [HKLM\SYSTEM\CurrentControlSet\Services\GrayPigeonServer]
   • "Type"=dword:00000110
     "Start"=dword:00000002
     "ErrorControl"=dword:00000000
     "ImagePath"="%WINDIR%\G_Server2006.exe"
     "DisplayName"="GrayPigeonServer"
     "ObjectName"="LocalSystem"
     "Description"="%random character string%"

– [HKLM\SYSTEM\CurrentControlSet\Services\GrayPigeonServer\Enum]
   • "0"="Root\LEGACY_GRAYPIGEONSERVER\\0000"
     "Count"=dword:00000001
     "NextInstance"=dword:00000001

– [HKLM\SYSTEM\ControlSet001\Services\GrayPigeonServer]
   • "Type"=dword:00000110
     "Start"=dword:00000002
     "ErrorControl"=dword:00000000
     "ImagePath"="%WINDIR%\G_Server2006.exe"
     "DisplayName"="GrayPigeonServer"
     "ObjectName"="LocalSystem"
     "Description"="%random character string%"

– [HKLM\SYSTEM\CurrentControlSet001\Services\GrayPigeonServer\Enum]
   • "0"="Root\LEGACY_GRAYPIGEONSERVER\\0000"
     "Count"=dword:00000001
     "NextInstance"=dword:00000001



The following registry keys are added:

– [HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_GRAYPIGEONSERVER\
   0000]
   • "Service"="GrayPigeonServer"
   • "Legacy"=dword:00000001
   • "ConfigFlags"=dword:00000000
   • "Class"="LegacyDriver"
   • "ClassGUID"="{8ECC055D-047F-11D1-A537-0000F8753ED1}"
   • "DeviceDesc"="GrayPigeonServer"

– [HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_GRAYPIGEONSERVER\
   0000\Control]
   • "*NewlyCreated*"=dword:00000000
   • "ActiveService"="GrayPigeonServer"

– [HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_GRAYPIGEONSERVER]
   • "NextInstance"=dword:00000001



The following registry key is changed:

– [HKCU\Software\Microsoft\Internet Explorer\Main]
   New value:
   • "Check_Associations"="no"

 Backdoor Contact server:
The following:
   • http://32758.ipread.**********



Sends information about:
    • Computer name
    • Information about the network


Remote control capabilities:
    • Disable network shares
    • Enable network shares

 Injection –  It injects the following file into a process: %WINDIR%\G_Server2006Key.DLL

    Process name:
   • %all running processes%



– It injects itself into a process.

    Process name:
   • iexplore.exe


 Rootkit Technology It is a malware-specific technology. The malware hides its presence from system utilities, security applications and in the end, from the user.


Hides the following:
– Its own files
– Its own registry key


Method used:
    • Hidden from Windows API

 File details Programming language:
The malware program was written in Delphi.


Runtime packer:
In order to aggravate detection and reduce size of the file it is packed with the following runtime packer:
   • UPX

Description inserted by Monica Ghitun on Monday, September 25, 2006
Description updated by Andrei Ivanes on Monday, December 4, 2006

Back . . . .