vb.org Archive

vb.org Archive (https://vborg.vbsupport.ru/index.php)
-   vB3 General Discussions (https://vborg.vbsupport.ru/forumdisplay.php?f=111)
-   -   Can somebody explane what is this php files.. (https://vborg.vbsupport.ru/showthread.php?t=194498)

dxflw 10-25-2008 06:47 AM

Can somebody explane what is this php files..
 
1 Attachment(s)
I find this 2 php files and i dont remember if i have uploaded this files on my ftp...
Can explane somebody what is this..?

MysCha 10-25-2008 07:29 AM

lolz im never know this is a vbulletin files ;)

Dismounted 10-25-2008 09:30 AM

Looks like someone has uploaded a malicious file. I have not had time to decode the file - but I can assume that it was designed to hack you or something similar.

UKBusinessLive 10-25-2008 10:09 AM

They definately look like rogue files, change all your passwords to your server and FTP.

Just keep an eye on any attachments you allow your members to post

:cool:

dxflw 10-25-2008 12:57 PM

thanks guys..but can somebody explane to me exsacly what the code can do?
I think my last hosting company have to do with that...

UKBusinessLive 10-25-2008 01:28 PM

its not good what ever they are doing - first off its from somewhere in russia - so thats immediately bad. the other is that they are trying to execute command line `uname -a` which outputs a single line with the name of the machine and the operating system version.

They are doing their homework before they attack. I would check your processing powers and see if it has sky rocketed, they may have anything on the server now.... if so its time for a rebuild.

just check your server permissions and see if any have been changed, its more than likely that you have a weak password on an ftp account back to your server, delete all unnecessary ftp accounts, whilst your at it and make sure you re new all your passwords a mixture of letters and numbers and perhaps a few caps ;)

Without decoding the static elements of the scripts, I would guess the script collects as much information about the client/server and then transmits it by including a remote file with the data in the URL. These are the lines that will give you the greatest insight:

Code:

base64_decode("aHR0cDovL2Jpcy5pZnJhbWUucnUvbWFzdGVyLnBocD9yX2FkZHI9")
base64_decode("aHR0cDovLw==")
base64_decode("dXNlcjkubXNodG1sLnJ1")
base64_decode("dXNlcjcuaHRtbHRhZ3MucnU=")

You should review the permissions and ownership of the files that were placed on your server. If they're owned by the user "nobody", perhaps your compromise is minimal.

Edit: Here is the output of those commands:

Code:

http://bis.iframe.ru/master.php?r_addr=
http://
user9.mshtml.ru

The commands.php script gathers as much information as it can, then provides it to bis.iframe.ru. I assume this is to assist the malicious user in his efforts to steal the identities of others.

The Server has definitely been hacked/cracked but it's possible that it is not owned.;)

What kernel version is being used?
(if not sure, look under WHM > Server Status > Server Information: System Information)

run this command as 'root' in shell: locate code2.php .Free.php md.pl

if any of those files are found and your running kernel 2.6.xx (where xx is less than 17) then odds are the hackers only found a way to upload the defacement and spammer scripts. :eek:

That would mean an OS reload or someone going through the entire Server to find & delete the hacker files "and" setup security to stop them from doing it again.

if you don't own your server then perhaps this is something that you should alk to your hosting company about.

Take care

--------------- Added [DATE]1224949432[/DATE] at [TIME]1224949432[/TIME] ---------------

Just remembered :eek:

Check your Code in .htaccess and see if anythings changed there normally these hackers add a file like this...

Code:

Options -MultiViews
ErrorDocument 404 //e107_plugins/htnbook/820220.php

Also view your index.php and make sure the file as no extra lines in along the lines of...


Code:

<title>Hacked By GHoST61</title>
<center><img border="0" src="http://ghst61.by.ru/gh.jpg" weight="30" heigth="35" style="border:0px dashed black; ">
<p align="center"><font face ="Showcard Gothic" size="8"><font color="#bb1122"> Hacked By GHoST61
<HR color=gray SIZE=4>
<p align="center"><font face ="Bradley Hand ITC" size="6"><font color="#0000cc">Copyright �2006 - 2008 By GHoST61
<h1><center>For T?rkiye<h1><center>

This is just a front screen for these hackers but check anyway.

;)

--------------- Added [DATE]1224950097[/DATE] at [TIME]1224950097[/TIME] ---------------

Whilst i've been looking into this it looks like it's a "pay per click" scam.

They hack your site with these bogus files then seed search engines to go there, and just sit back and collect for every click.

Check your file/folder permissions.

FILE permissions shouldn't be higher than 644

FOLDER permissions shouldn't be higher than 755

dxflw 10-25-2008 03:21 PM

Thank you very much "UKBusinessLive"
I have create new hosting account to new hosting company.
I have find more files like this on my forum folder:
This was on forums root folder:
34914.php
141171.php
and i have find more on:
images/avatar
forum root/modules (this is for CMPS)
includes/
install/
======================
All the files i have find with numbers example 54656.php is deleted
and all the forum is loaded to new server and new company.
I have a data base backup and with this i will restore my forum on the new server.
You think this is enough?

UKBusinessLive 10-25-2008 04:36 PM

Quote:

Originally Posted by dxflw (Post 1652504)
Thank you very much "UKBusinessLive"
I have create new hosting account to new hosting company.
I have find more files like this on my forum folder:
This was on forums root folder:
34914.php
141171.php
and i have find more on:
images/avatar
forum root/modules (this is for CMPS)
includes/
install/
======================
All the files i have find with numbers example 54656.php is deleted
and all the forum is loaded to new server and new company.
I have a data base backup and with this i will restore my forum on the new server.
You think this is enough?

Just make sure the following permissions are set...


FILE permissions shouldn't be higher than 644

FOLDER permissions shouldn't be higher than 755

and make sure you use a high strenght password, do regular checks of your image folders as they will most probably try to upload a file as an image.

Regulate and moderate your attachments and exactly what your allowing your members to upload to your server, Set user permissions so that banned, unregistered and guest CANNOT upload anything to your server, i know people will say but we do that anyway, you'll be suprised at the amount of people that apparently leave a "Back Door" open.

Above all just be carefull

Take care

;)

dxflw 10-28-2008 01:02 PM

ok thank you very much.
cu.


All times are GMT. The time now is 04:49 AM.

Powered by vBulletin® Version 3.8.12 by vBS
Copyright ©2000 - 2025, vBulletin Solutions Inc.

X vBulletin 3.8.12 by vBS Debug Information
  • Page Generation 0.01739 seconds
  • Memory Usage 1,742KB
  • Queries Executed 10 (?)
More Information
Template Usage:
  • (1)ad_footer_end
  • (1)ad_footer_start
  • (1)ad_header_end
  • (1)ad_header_logo
  • (1)ad_navbar_below
  • (4)bbcode_code_printable
  • (1)bbcode_quote_printable
  • (1)footer
  • (1)gobutton
  • (1)header
  • (1)headinclude
  • (6)option
  • (1)post_thanks_navbar_search
  • (1)printthread
  • (9)printthreadbit
  • (1)spacer_close
  • (1)spacer_open 

Phrase Groups Available:
  • global
  • postbit
  • showthread
Included Files:
  • ./printthread.php
  • ./global.php
  • ./includes/init.php
  • ./includes/class_core.php
  • ./includes/config.php
  • ./includes/functions.php
  • ./includes/class_hook.php
  • ./includes/modsystem_functions.php
  • ./includes/class_bbcode_alt.php
  • ./includes/class_bbcode.php
  • ./includes/functions_bigthree.php 

Hooks Called:
  • init_startup
  • init_startup_session_setup_start
  • init_startup_session_setup_complete
  • cache_permissions
  • fetch_threadinfo_query
  • fetch_threadinfo
  • fetch_foruminfo
  • style_fetch
  • cache_templates
  • global_start
  • parse_templates
  • global_setup_complete
  • printthread_start
  • bbcode_fetch_tags
  • bbcode_create
  • bbcode_parse_start
  • bbcode_parse_complete_precache
  • bbcode_parse_complete
  • printthread_post
  • printthread_complete