Skip to main content
Skip to main content
Microsoft Security Intelligence
Published Feb 28, 2024 | Updated Nov 13, 2025

Backdoor:ASP/Chopper.F

Detected by Microsoft Defender Antivirus

Aliases: No associated aliases

Summary

Backdoor:ASP/Chopper.F is a type of malicious web shell that creates a backdoor on a web server that has been compromised. It falls under the larger Chopper family, which is a known tool used by threat actors in post-exploitation operations. This malware consists of a small server-side script written in either ASP or ASPX that allows the threat actors to launch commands from a remote location, with a user-friendly web front-end, after it is uploaded to the vulnerable server. The use of this malware type has been associated with the exploitation of the following vulnerabilities of public-facing servers: CVE-2020-0688 in Microsoft Exchange and the Proxy Logon vulnerability series, involving CVE-2021-26855CVE-2021-26857CVE-2021-26858 and CVE-2021-27065

  • Identify and remove unauthorized .aspx web shell files from all web directories. 
  • Apply security patches and other SharePoint/IIS vulnerabilities. 
  • Examine IIS and application logs for repeated requests to a single endpoint with unusual parameters or authentication bypass attempts. 
  • Rotate credentials for SharePoint application pool and farm accounts to prevent continued access. 
  • Validate web directory integrity against backups or source-controlled versions to ensure no hidden shells remain. 
  • Audit for lateral movement or data staging activities initiated through w3wp.exe during the compromise window. 
  • Conduct full host triage to confirm no secondary payloads or additional shells exist in nested site collections or custom paths. 

Microsoft Defender Antivirus automatically removes threats as they are detected. However, many infections can leave remnant files and system changes. Updating your antimalware definitions and running a full scan might help address these remnant artifacts. 

You can also visit our advanced troubleshooting page or search the Microsoft virus and malware community for more help. 

Follow us