wordpress malware files inspection -
i found few suspicious file (wp-credit.php) in wordpress site not related wordpress default files , running create file name ( w-credits.php) need in analyzing because encrypted
1 ) wp-credit.php ( http://pastebin.com/zn3ck0me or http://www.pastebin.ca/3031425 )
2 ) wp-credits.php created wp-credit.php when run (http://www.pastebin.ca/3031424 )
3 ) wp-searches.php ( http://www.pastebin.ca/3031436 )
there's no reason "brute force decrypt" of these files. they're slight obfuscations of php source code. web sites unphp.net can long way towards readable source code.
wp-credit.php
appears backdoor program. looks through values in $_cookie superglobal encrypted code, key , maybe authorization code. decrypts encrypted code , eval's it.wp-credits.php
,wp-searches.php
, when de-obfuscated, give version 2.5 of "web shell orb", possibly popular of php web shells.
you should (hopefully have) through wordpress installation see wp-credit.php
file came from. there's unfortunately myriad of possibilities here, wordpress bugs, themes code injections, having guessed wordpress admin login , password.
Comments
Post a Comment