Backdoor

SScope.Backdoor.Win32.Hupigon.cmpw removal tips

Malware Removal

The SScope.Backdoor.Win32.Hupigon.cmpw is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What SScope.Backdoor.Win32.Hupigon.cmpw virus can do?

  • Executable code extraction
  • Attempts to connect to a dead IP:Port (1 unique times)
  • Creates RWX memory
  • Drops a binary and executes it
  • HTTP traffic contains suspicious features which may be indicative of malware related traffic
  • Performs some HTTP requests
  • Unconventionial binary language: Chinese (Simplified)
  • The binary likely contains encrypted or compressed data.
  • The executable is compressed using UPX
  • Attempts to repeatedly call a single API many times in order to delay analysis time
  • Installs itself for autorun at Windows startup
  • Creates a hidden or system file
  • Creates a copy of itself
  • Anomalous binary characteristics

Related domains:

z.whorecord.xyz
a.tomx.xyz

How to determine SScope.Backdoor.Win32.Hupigon.cmpw?


File Info:

crc32: AFB54C51
md5: 28ee9067d05fd74cdf00ecb2348e612b
name: 28EE9067D05FD74CDF00ECB2348E612B.mlw
sha1: b2d56ed3f5e71085f5b16943f2f96ed71b9015e1
sha256: 8bcfd00ae2012e3d732e7231145b76d76e7d0ed17cebd7d8b7d9b90751177cfc
sha512: ea4e9d4d7a11f9294bc3d02bea82e22d251e9638ea8148073117bf989281602c6a484978ee942a121a367e7bc644c8aa875c0487580c99e90f69c42ec940259c
ssdeep: 6144:1FExhi6m7uv9xyuR5FabPYOLOiIxQ+DQ01oNCI3gbZYd4M7UJlh0D9F6YSsF+tah:0Xrv9piyxQRHN0mdN+lhMF67ylgo
type: PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed

Version Info:

FileVersion: 1.2.3.10
CompanyName: x51e4x51f0x5de5x4f5cx5ba4
Comments: x7070x9e3dx5b50x8fdcx7a0bx7ba1x7406
ProductVersion: 1.2.3.0
FileDescription: x51e4x51f0x5de5x4f5cx5ba4
OriginalFilename: H_Client.exe
Translation: 0x0804 0x03a8

SScope.Backdoor.Win32.Hupigon.cmpw also known as:

K7AntiVirusTrojan ( 004bcce41 )
Elasticmalicious (high confidence)
DrWebTrojan.Packed.551
CynetMalicious (score: 100)
ALYacGen:Trojan.Malware.ym2@aKCSNkg
CylanceUnsafe
CrowdStrikewin/malicious_confidence_90% (W)
K7GWTrojan ( 004bcce41 )
Cybereasonmalicious.7d05fd
CyrenW32/SuspPack.AC.gen!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32a variant of Win32/Hupigon
APEXMalicious
AvastWin32:Trojan-gen
KasperskyHEUR:Trojan.Win32.Generic
BitDefenderGen:Trojan.Malware.ym2@aKCSNkg
MicroWorld-eScanGen:Trojan.Malware.ym2@aKCSNkg
Ad-AwareGen:Trojan.Malware.ym2@aKCSNkg
ComodoPacked.Win32.MUPX.Gen@24tbus
BitDefenderThetaAI:Packer.755E44071D
VIPREVirTool.Win32.Obfuscator.nm (v)
TrendMicroTROJ_GEN.R005C0DF721
McAfee-GW-EditionBehavesLike.Win32.Sytro.fc
FireEyeGeneric.mg.28ee9067d05fd74c
EmsisoftGen:Trojan.Malware.ym2@aKCSNkg (B)
SentinelOneStatic AI – Malicious PE
JiangminBackdoor/Hupigon.ayjb
AviraBDS/Hupigon.Gen
MicrosoftBackdoor:Win32/Hupigon
ZoneAlarmHEUR:Trojan.Win32.Generic
GDataGen:Trojan.Malware.ym2@aKCSNkg
AhnLab-V3Backdoor/Win32.Hupigon.R839
Acronissuspicious
McAfeeBackDoor-AWQ.gen.r
MAXmalware (ai score=89)
VBA32SScope.Backdoor.Win32.Hupigon.cmpw
MalwarebytesMalware.AI.747942345
PandaTrj/Genetic.gen
TrendMicro-HouseCallTROJ_GEN.R005C0DF721
RisingMalware.Heuristic!ET#100% (RDMK:cmRtazr6uOK7/mR1niuySju+Mn8/)
YandexTrojan.Hupigon.Gen!Pac.6
IkarusTrojan-Dropper.Win32.Hupigon
FortinetW32/Kryptik.KYT!tr
AVGWin32:Trojan-gen

How to remove SScope.Backdoor.Win32.Hupigon.cmpw?

SScope.Backdoor.Win32.Hupigon.cmpw removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment