Malware descriptions

ChewBacca – a New Episode of Tor-based Malware

We have discovered a new Tor-based malware, named “ChewBacca” and detected as “Trojan.Win32.Fsysna.fej”. Adding Tor to malware is not unique to this sample, but it-s still a rare feature.

Lately Tor has become more attractive as a service to ensure users- anonymity. Also criminals use it for their activities, but they are only slowly adopting this to host their malicious infrastructure. This capability was added to Zeus recently, as reported by my colleague Dmitry Tarakanov here. In addition, the CrimewareKit Atrax and the botnet-based on Mevade became known because of this.


Tor is an overlay network for anonymity. It also serves its own top-level domain, ?.onion, which is only accessible through Tor (of course, there are also Web services routing to Onion-domains from the Internet). This protects the location of a server as well as the identity of the owner in most cases. Still there are drawbacks preventing many criminals from hosting their servers within Tor. Due to the overlay and structure, Tor is slower and timeouts are possible. Massive botnet activity may influence the whole network, as seen with Mevade, and therefore let researchers spot them more easily. Also, implementing Tor adds more complexity.


The Malware

The Trojan (MD5: 21f8b9d9a6fa3a0cd3a3f0644636bf09) is a PE32 executable compiled with Free Pascal 2.7.1 (the version dated 22.10.2013). The 5 MB file contains Tor

After execution, the function “P$CHEWBACCA$_$TMYAPPLICATION_$__$$_INSTALL” is called, which drops itself as “spoolsv.exe” into the “Startup folder” (e.g. C:Documents and SettingsAll UsersStart MenuProgramsStartup) and requests the public IP of the victim via a publicly accessible service at (which is not related to the malware).

Tor is dropped as “tor.exe” to the user-s Temp and runs with a default listing on “localhost:9050″.

Once running, the Trojan logs all keystrokes by the user to “system.log”, which is created by the malware in the user-s local Temp folder. This keylogger functionality is installed by using theSetWindowsHookExA-API function with the hook-type WH_KEYBOARD_LL. This system.log is uploaded via [url]/sendlog.php (while the url is hard-coded – see below).

The Trojan also enumerates all running processes and reads their process memory. It contains two different regex (regular expression) patterns to extract information.



This data is sent using the “Exfiltrate” function, uploading to [url]/recvdata.php The malware also contains an uninstall function named “P$CHEWBACCA$_$TMYAPPLICATION_$__$$_DESTROY”.

Command-and-Control Server

The C&C is a simple LAMP-installation based on Linux CentOS, Apache 2.2.15, MySQL and PHP 5.3.3 (including phpmyadmin, hosted at http://5jiXXXXXXXXXXgmb.onion. Opening the URL presents a login interface with the background image of ChewBacca from “A Game of Clones” – a series by Andrew Spear (not related to the malware, of course)



The two above-mentioned hosted php scripts contain the functionality of this server.

  • sendlog.php contains the functionality to upload the keylogger-data from the victim-s computer to the server
  • recvdata.php is for exfiltrating data v simply called this returns following error message: “Notice: Undefined index: raw data in /var/www/html/recvdata.php on line 24”


Conclusion and Notes

Thanks to my colleague Nicolas Brulez for helping with the analysis.

Chewbacca is currently not offered in public (underground) forums, unlike other toolkits such as Zeus. Maybe this is in development or the malware is just privately used or shared.

It seems that Tor is attracting some criminals to host their infrastructure, as it promises more security for C&Cs v but this holds drawbacks, of course, as outlined above.

ChewBacca – a New Episode of Tor-based Malware

Your email address will not be published. Required fields are marked *


  1. reza

    Where can I download ChewBacca?


Ferocious Kitten: 6 years of covert surveillance in Iran

Ferocious Kitten is an APT group that has been targeting Persian-speaking individuals in Iran. Some of the TTPs used by this threat actor are reminiscent of other groups, such as Domestic Kitten and Rampant Kitten. In this report we aim to provide more details on these findings.

Andariel evolves to target South Korea with ransomware

In April 2021, we observed a suspicious Word document with a Korean file name and decoy. It revealed a novel infection scheme and an unfamiliar payload. After a deep analysis, we came to a conclusion: the Andariel group was behind these attacks.

Operation TunnelSnake

A newly discovered rootkit that we dub ‘Moriya’ is used by an unknown actor to deploy passive backdoors on public facing servers, facilitating the creation of a covert C&C communication channel through which they can be silently controlled. The victims are located in Africa, South and South-East Asia.

Subscribe to our weekly e-mails

The hottest research right in your inbox