#Raw string patterns #All strings in this file are case sensitive #Comments are supported, but '#' must be the first character (index[0]) on the line. #More critical patterns should be higher in the file as only the first pattern match is reported. #Backdoor patterns @eval($_POST[' Backdoor @include($_GET[ system($_GET[ md5($_GET[ fwrite($fpsetv, getenv("HTTP_COOKIE") system\"$cmd 1> /tmp/ \145\166\141\154\050\142\141\163\145\066\064\137\144\145\143\157\144\145\050 #Web-Shell patterns $sh3llColor w4ck1ng shell private Shell by m4rco Shell by Mawar_Hitam SHELL_PASSWORD ConnectBackShell ShellBOT == "bindshell" #Remote Code curl_get_from_webpage file_get_contents('http://codepad.org #Base64 String Samples. Each plain text string should have 3 base64 equivalents # "shell" in base64 c2hlbG NoZWxs zaGVsb # " eval('?> "base64_decode" ='base'.(32*2).'_de'.'code' "p"."r"."e"."g"."_" WSOstripslashes \x73\x79\x73\x74\x65\x6d' /* case, dec/hex issue? */, // system \x70\x72\x65\x67\x5f\x72\x65\x70\x6c\x61\x63\x65' /* case, dec/hex issue? */, // preg_replace \x65\x78\x65\x63' /* dec/hex issue? */, // exec ev\x61l \x65\166\x61\154\x28' /* dec/hex issue? */, \x65\x76\x61\x6C' /* case, dec/hex issue? */, 'ev'.'al'.' eval(base64_decode( IrIsT Hacked By EnDLeSs Punker2Bot Zed0x darkminz ReaL_PuNiShEr OoN_Boy Pashkela Webcommander at YENI3ERI d3lete Made by Delorean Cybester90 K!LL3r MrHazem BY MMNBOBZ Hackeado bgeteam VOBRA GANGO Asmodeus Cautam fisierele de configurare BRUTEFORCING FaTaLisTiCz_Fx Fx29Sh DX_Header_drawn Dr.abolalh C0derz.com Mr.HiTman IrSecTeam FLoodeR eriuqer zehirhacker freetellafriend.com casus15 temp_r57_table By Psych0 c99ftpbrutecheck d3b~X profexor.hell ZOBUGTEL The Dark Raver M4ll3r itsoknoproblembro tmhapbzcerff IndoXploit FaisaL Ahmed aka rEd X smisbot smotherbot Indonesian Hacker Rulez pwetan.com # WP-VCD Malware https://www.getastra.com/blog/911/how-to-fix-wp-vcd-backdoor-hack-in-wordpress-functions-php/ wp-vcd class.theme-modules.php wp-tmp.php tmpcontentx function wp_temp_setupx derna.top/code.php stripos($tmpcontent, $wp_auth_key) #Miscellaneous uname -a /etc/shadow /etc/passwd \x47\x4c\x4f\x42\x41LS ${${ PHPJiaMi DisablePHP= moban.html a,b,c,d,e,f,g @x0powo @preg_replace 1@1.com META http-equiv="refresh" content="0; ="create_";global Net@ddress Mail __VIEWSTATEENCRYPTED createFilesForInputOutput R0lGODlhEwAQALMAAAAAAP///5ycAM7OY///nP//zv/OnPf39////wAAAAAA ayu pr1 pr2 pr3 pr4 pr5 pr6 f0VMRgEBAQA 0d0a0d0a676c6f62616c20246d795f736d7 etalfnizg JHZpc2l0Y291bnQgPSAkSFRUUF9DT09LSUVf R2aXNpdGNvdW50ID0gJEhUVFBfQ09PS0lFX kdmlzaXRjb3VudCA9ICRIVFRQX0NPT0tJRV HTTP flood complete after exploitcookie az88pix00q98 Q3JlZGl0IDogVW5kZXJncm91bmQgRGV2aWwgJm5ic3A7ICB8DQo8YSBocmVmP 463839610c000b00800100ffffffffffff21f90401000001002c000 AAAAAAAAMAAwABAAAAeAUAADQAAADsCQAAAAAAADQAIAADACgAFwAUAAEA HJ3HjutckoRfpXf9A1zQO2AwDRrRey9uGvTeez79qAao1a0rgudkZkR8Ra Ly83MTg3OWQyMTJkYzhjYmY0ZDRmZDA0NGEzZDE3Zjk3ZmI2N DJ7VIU7RICXr6sEEV2cBtHDSOe9nVdpEGhEmvRVRNURfw1wQ LS0gRHVtcDNkIGJ5IFBpcnVsaW4uUEhQIFdlYnNoM2xsIHYxLjAgYzBkZWQgYnkgcjBkcjEgOkw\= 5jb20iKW9yIHN0cmlzdHIoJHJlZmVyZXIsImFwb3J0Iikgb3Igc3RyaXN0cigkcmVmZXJlciwibmlnbWEiKSBvciBzdHJpc3RyKCRyZWZlcmVyLCJ3ZWJhbHRhIikgb3Igc3RyaXN0cigk X1NFU1NJT05bJ3R4dGF1dGhpbiddID0gdHJ1ZTsNCiAgICBpZiAoJF9QT1NUWydybSddKSB7DQogICAgICBzZXRjb29raWUoJ3R4dGF1dGhfJy4kcm1ncm91cCwgbW R0lGODlhFAAUAKIAAAAAAP///93d3cDAwIaGhgQEBP///wAAACH5BAEAAAYALAAAAAAUABQAA m91dCwgJGVvdXQpOw0Kc2VsZWN0KCRyb3V0ID0gJHJpbiwgdW5kZWYsICRlb3V0ID0gJHJpbiwgMTIwKTsNCmlmICghJHJvdXQgICYmICAhJGVvdX CB2aTZpIDEwMjQtDQojLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLQ0KI3JlcXVp BDAQkJCQwLDBgNDRgyIRwhMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjIyMjL/wAARCAAQABADASIAAhEBA REREFER_PTTH Joomla_brute_Force /usr/sbin/httpd sshkeys eggdrop rwxrwxrwx GIF89A;tpircs/< aka \x3E\x74\x70\x69\x72\x63\x73\x2F\x3C # comment spoof function call /*;*/ # web shells host type extraction php_uname() # decode content with basic rot13 str_split(rawurldecode(str_rot13( # generating PHP file name to put content substr(md5(time()), 0, 8) . ".php" # webshell 0byt3m1n1 ZeroByte # obfuscated function name 'str_' .'rot13' 'st' .'rrev' # JS escaped: document.createElement('script'); 100, 111, 99, 117, 109, 101, 110, 116, 46, 99, 114, 101, 97, 116, 101, 69, 108, 101, 109, 101, 110, 116, 40, 39, 115, 99, 114, 105, 112, 116, 39, 41, 59 # JS escaped: String.fromCharCode( 83, 116, 114, 105, 110, 103, 46, 102, 114, 111, 109, 67, 104, 97, 114, 67, 111, 100, 101, 40 # SEO poisoning control site call "http://$xxx ?useragent=$botbotbot # php://input encoded in base64 cGhwOi8vaW5wdXQ= # backdoor script Upload Gagal..
explode('?>',$shell 0.33333333333333+0.33333333333333+0.33333333333333 0.66666666666667+0.66666666666667+0.66666666666667 1.3333333333333+1.3333333333333+1.3333333333333 class _t{private static$_ 'LQ'.'==' # common mobile agent check in SEO poison scripts Array("1207", "3gso", "4thp", "501i", "502i", "503i", "504i", "505i", "506i", # eval url decoded string eval(rawurldecode(' # simple obfuscated function 'gz'.'unc'.'ompress' 'create'.'_'.'function' 'gzinf', 'la', 'te' 'e_f', 'cti', 'un', 'on', 'cr', 'eat' 'base', '64_dec', 'ode' 'cook', 'set', 'ie' 'repl', 'str_', 'ace' "base"."64_" 'base'.'64_' "t"."m"."p"."_"."n"."a"."m"."e" "f"."i"."l"."e"."_"."p"."u"."t" "f"."i"."l"."e"."_"."g"."e"."t" 'ode', 'e64_', 'bas', 'dec' 'unct', 'ion', 'te_f', 'crea' 'te', 'g', 'nf', 'l', 'a', 'zi' 'tion', 'e_func', 'creat' '64_d', 'se', 'eco', 'de', 'ba' 'co', 'ki', 'e', 'o', 'set' 'str', '_rep', 'lace' # process data from request object directly extract($_REQUEST) && @$ extract($_REQUEST)&&@$ xtract($_REQUEST)&&@$ # uncompress cafted content gzuncompress(strrev(substr(