Home / malware Backdoor:W32/Hupigon.OET
First posted on 10 September 2008.
Source: SecurityHomeAliases :
There are no other names known for Backdoor:W32/Hupigon.OET.
Explanation :
A remote administration utility which bypasses normal security mechanisms to secretly control a program, computer or network.
right]Upon installation, this backdoor program first attempts to connect to a remote server, to notify the malware author that an infection has taken place. If successfully connected, it then incrementally scans one port after another on the host machine to find an open one that would allow a remote user to connect to the infected system.
Once a remote user has gained access, any of the following actions can be performed on the infected system, without the knowledge or consent of the legitimate user:
* Retrieve system information (Registeredorganization, RegisteredOwner, productID, productkey, ProductName, Date and Time)
* Retrieve registry information
* Download files
* Log keystrokes
* Communicate via telnet
* Capture screen into picture file (BMP)
* Capture screen into video (AVI)
This malware is compressed with BeRoEXEPacker v1.00.Last update 10 September 2008