Bkdr_hupigon.oth


 
Thread Tools Search this Thread
Special Forums Cybersecurity Malware Advisories (RSS) Bkdr_hupigon.oth
# 1  
Old 12-30-2007
Bkdr_hupigon.oth

This backdoor may be dropped by other malware. It may be downloaded unknowingly by a user when visiting malicious Web sites.
It drops a copy of itself.
It registers itself as a system service to ensure its automatic execution at every system startup. It does this by creating a registry entry.
This backdoor opens random ports. It listens for a connection from another remote system. Once connected, it enables a remote malicious user to issue commands on the affected system. These commands include hooking keyboard inputs, downloading further malicious files, launching denial of service (DoS) attacks, executing files, and stealing system information. As a result, system security may be compromised.


More...
Login or Register to Ask a Question

Previous Thread | Next Thread
Login or Register to Ask a Question
rpc.sprayd(1M)						  System Administration Commands					    rpc.sprayd(1M)

NAME
rpc.sprayd, sprayd - spray server SYNOPSIS
/usr/lib/netsvc/spray/rpc.sprayd DESCRIPTION
rpc.sprayd is a server that records the packets sent by spray(1M). The rpc.sprayd daemon may be started by inetd(1M) or listen(1M). The service provided by rpc.sprayd is not useful as a networking benchmark as it uses unreliable connectionless transports, (udp for exam- ple). It can report a large number of packets dropped when the drops were caused by the program sending packets faster than they can be buffered locally (before the packets get to the network medium). ATTRIBUTES
See attributes(5) for descriptions of the following attributes: +-----------------------------+-----------------------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +-----------------------------+-----------------------------+ |Availability |SUNWrcmds | +-----------------------------+-----------------------------+ SEE ALSO
svcs(1), inetadm(1M), inetd(1M) listen(1M), pmadm(1M), sacadm(1M), spray(1M), svcadm(1M), attributes(5), smf(5) NOTES
The rpc.sprayd service is managed by the service management facility, smf(5), under the service identifier: svc:/network/rpc/spray:default Administrative actions on this service, such as enabling, disabling, or requesting restart, can be performed using svcadm(1M). Responsibil- ity for initiating and restarting this service is delegated to inetd(1M). Use inetadm(1M) to make configuration changes and to view config- uration information for this service. The service's status can be queried using the svcs(1) command. SunOS 5.10 4 Nov 2004 rpc.sprayd(1M)