Threat Database Malware ChewBacca Malware

ChewBacca Malware

By ESGI Advisor in Malware

Threat Scorecard

Ranking: 5,208
Threat Level: 20 % (Normal)
Infected Computers: 2,123
First Seen: December 23, 2013
Last Seen: September 19, 2023
OS(es) Affected: Windows

Security researchers have issued warnings about the ChewBacca malware, a harmful information-stealing threat that uses TOR to make its communications with its command and control server anonymous.TOR is being integrated into an increasing number of threats, including high profile attacks like ZeuS variants in the wild. Tor has increasingly become a worrying aspect of online communications for law enforcement. TOR has useful applications, for example, to allow political activists and other potentially endangered individuals to communicate anonymously. However, TOR has been co-opted by criminal organizations for use in child pornography rings, underground markets, money laundering and to hide the tracks of various criminal organizations. The ChewBacca malware should be removed with a strong security program.

The ChewBacca malware – A Weird Name for a Damaging Threat

The ChewBacca malware is not distributed publicly on underground forums. There may be several reasons for this; the ChewBacca malware may still be in development or its developers may only sell the ChewBacca malware privately. Some specific characteristics of the ChewBacca malware include the fact that the ChewBacca malware is developed using Free Pascal 2.7.1, the ChewBacca malware is contained in an executable file measuring 5MB and uses TOR 0.2.3.25 to communicate with its command and control server. Although the ChewBacca malware is commonly known after the famous Star Wars character, the ChewBacca malware is commonly also known as Trojan.Win32.Dsysna.fej. As soon as the ChewBacca malware is installed on the affected computer the ChewBacca malware drops its compromised executable, gathers information about the victim's IP address and installs TOR software.

Avoiding the Spiteful Presence of the ChewBacca malware

As soon as the ChewBacca malware is installed, the ChewBacca malware logs the victim's keystrokes into a file named system.log. This file is then sent to a third party using TOR. The ChewBacca malware may be uninstalled by a third party to prevent malware researchers from studying the ChewBacca malware closely. Although TOR is increasingly being used by threats like the ChewBacca malware, there are downsides to TOR that have prevented criminals from adopting it. TOR communications are slower. Also, using it excessively has attracted the attention of law enforcement, which may compromise the anonymity of this threatening network.

SpyHunter Detects & Remove ChewBacca Malware

File System Details

ChewBacca Malware may create the following file(s):
# File Name Detections
1. tor.exe
2. recvdata.php
3. sendlog.php
4. system.log

Cookies

The following cookies were found:

thebestoffersintheweb.com

URLs

ChewBacca Malware may call the following URLs:

https://thebestoffersintheweb.com/redirect
thebestoffersintheweb.com

Trending

Most Viewed

Loading...