ChewBacca

Description

(Trend Micro) ChewBacca is a PoS RAM scraper family, first discovered at the end of 2013, which uses the Tor network to exfiltrate stolen data. When first executed, ChewBacca copies itself to %USERPROFILE%\START MENU\Programs\Startup\spoolsv.exe and adds itself to an Auto Start runkey to remain persistent. It is self-contained and installs obfsproxy v0.2.3.25—a Tor proxy application—in %TEMP%. It then hooks WH_KEYBOARD_LL, which monitors keyboard input events. This allows ChewBacca to capture all keyboard events, which are then logged to %TEMP%\system.log.

Names

Name
ChewBacca

Category

Malware

Type

  • POS malware
  • Keylogger
  • Credential stealer

Information

Malpedia

Other Information

Uuid

639ab604-a3b4-4e35-9eaf-b67b0d4d9503

Last Card Change

2020-05-25