Attention: We have transitioned to a new AAD or Microsoft Entra ID from the week of May 20, 2024. In case your tenant requires admin consent, please refer to this document located at Overview of user and admin consent - Microsoft Entra ID | Microsoft Learn and grant access to App ID: 6ba09155-cb24-475b-b24f-b4e28fc74365 with graph permissions for Directory.Read.All and User.Read for continued access. While the app may appear unverified, you can confirm its legitimacy by verifying the App ID provided.
9 entries found.
Win32/Hupigon
Microsoft security software detects and removes this family of threats.
This family of backdoor trojans can steal your personal information, such as your online user names and passwords. They can also give a malicious hacker access and control of your PC.
Alert level:
high
Backdoor:Win32/Hupigon.gen!F
Backdoor:Win32/Hupigon.gen!F is a generic detection for variants of Win32/Hupigon, a family of backdoor trojans. Win32/Hupigon.gen!F is installed to run as a service and allows remote unauthorized access to an affected machine.
Alert level:
severe
TrojanDropper:Win32/Hupigon
TrojanDropper:Win32/Hupigon is component of Win32/Hupigon. TrojanDropper:Win32/Hupigon copies itself to the system folder and runs itself from there. It then drops the other Hupigon components, registers the primary Backdoor component as a service, and injects the stealth / password stealer components into other processes using CreateRemoteThread. For more information, see the encyclopedia entry for Win32/Hupigon
Alert level:
severe
Backdoor:Win32/Hupigon
Backdoor:Win32/Hupigon is the main backdoor component of Win32/Hupigon, a family of backdoor Trojans. TrojanDropper:Win32/Hupigon registers this component as a service. The service then opens a backdoor server that allows other computers to connect to and control the infected computer in various ways.
Alert level:
severe
Backdoor:Win32/Hupigon.gen
Backdoor:Win32/Hupigon.gen is a generic detection for a DLL component of Win32/Hupigon. This component logs keystrokes, captures screens and steals passwords and other sensitive data. Detection for this component may indicate that other files on the computer might be infected.
Alert level:
severe
PWS:Win32/Hupigon
Win32/Hupigon is a family of backdoor Trojans. A Win32/Hupigon infection includes TrojanDropper:Win32/Hupigon and two to three files that the dropper installs. These additional files include Backdoor:Win32/Hupigon, the main backdoor component, and Backdoor:Win32/Hupigon!hook, a stealth component that hides files and processes associated with Win32/Hupigon. The Trojan dropper may also install PWS:Win32/Hupigon, a plugin that logs keystrokes and steals passwords. Win32/Hupigon may support other malicious plugins as well.
Alert level:
severe
Trojan:Win32/Hupigon
Alert level:
severe
Worm:Win32/Hupigon.B
Worm:Win32/Autorun.PP is a worm that spreads through fixed and removable drives by dropping copies of itself. It may change the computer system settings and attempt to connect to a remote web server to run commands by an attacker.
Alert level:
severe
TrojanDownloader:Win32/Hupigon
Alert level:
severe