Welcome to the Virus Encyclopedia of Panda Security.
It receives remote control commands such as logging the keystrokes typed by the user, obtaining files from the affected computer or downloading files to the affected system in order to run them later. It also downloads files from several domains and monitors the running processes.
|First detected on:||Aug. 19, 2005|
|Detection updated on:||Nov. 26, 2007|
|Yes, using TruPrevent Technologies
Hupigon.BS is a backdoor that receives remote control commands such as logging the keystrokes typed by the user, obtaining files from the affected computer, downloading files to the affected system in order to run them later, capturing screenshots or checking which processes are running and attempts to download files from several domains.
Additionally, Hupigon.BS injects its own DLL (Dynamic Link Library) into all the running processes. By doing this, Hupigon.BS ensures that its files and processes are not displayed in any security tool or program used to list those.
Hupigon.BS is dropped to the affected computer by another backdoor, detected as Fuetel.T.
Hupigon.BS is difficult to recognize, as it does not display any messages or warnings that indicate it has reached the computer.