wordpress malware files inspection -


i found few suspicious file (wp-credit.php) in wordpress site not related wordpress default files , running create file name ( w-credits.php) need in analyzing because encrypted

1 ) wp-credit.php ( http://pastebin.com/zn3ck0me or http://www.pastebin.ca/3031425 )

2 ) wp-credits.php created wp-credit.php when run (http://www.pastebin.ca/3031424 )

3 ) wp-searches.php ( http://www.pastebin.ca/3031436 )

there's no reason "brute force decrypt" of these files. they're slight obfuscations of php source code. web sites unphp.net can long way towards readable source code.

  • wp-credit.php appears backdoor program. looks through values in $_cookie superglobal encrypted code, key , maybe authorization code. decrypts encrypted code , eval's it.

  • wp-credits.php , wp-searches.php, when de-obfuscated, give version 2.5 of "web shell orb", possibly popular of php web shells.

you should (hopefully have) through wordpress installation see wp-credit.php file came from. there's unfortunately myriad of possibilities here, wordpress bugs, themes code injections, having guessed wordpress admin login , password.


Comments

Popular posts from this blog

powershell Start-Process exit code -1073741502 when used with Credential from a windows service environment -

twig - Using Twigbridge in a Laravel 5.1 Package -

c# - LINQ join Entities from HashSet's, Join vs Dictionary vs HashSet performance -