wordpress malware files inspection -


i found few suspicious file (wp-credit.php) in wordpress site not related wordpress default files , running create file name ( w-credits.php) need in analyzing because encrypted

1 ) wp-credit.php ( http://pastebin.com/zn3ck0me or http://www.pastebin.ca/3031425 )

2 ) wp-credits.php created wp-credit.php when run (http://www.pastebin.ca/3031424 )

3 ) wp-searches.php ( http://www.pastebin.ca/3031436 )

there's no reason "brute force decrypt" of these files. they're slight obfuscations of php source code. web sites unphp.net can long way towards readable source code.

  • wp-credit.php appears backdoor program. looks through values in $_cookie superglobal encrypted code, key , maybe authorization code. decrypts encrypted code , eval's it.

  • wp-credits.php , wp-searches.php, when de-obfuscated, give version 2.5 of "web shell orb", possibly popular of php web shells.

you should (hopefully have) through wordpress installation see wp-credit.php file came from. there's unfortunately myriad of possibilities here, wordpress bugs, themes code injections, having guessed wordpress admin login , password.


Comments

Popular posts from this blog

gcc - MinGW's ld cannot perform PE operations on non PE output file -

timeout - Handshake_timeout on RabbitMQ using python and pika from remote vm -

c# - Search and Add Comment with OpenXML for Word -