private rule PHP
{
strings:
$magic = "Ofux Mailer"
$c = "MaILER Password"
condition:
any of them
}
rule imh_php_malware_downloader
{
meta:
description = "Malware that pulls and executes data from another server, like pastebin"
strings:
$pastebin_1 = /file_get_contents\(['"]https:\/\/pastebin.com\/raw\/.{6,15}include/
condition:
any of them
}
rule imh_php_malware_inject
{
meta:
description = "Malware injected into otherwise fine files"
strings:
$obfuscated_include = /\n@?include "([^"]{0,10}\\[0-9]{3}){2}/
condition:
$obfuscated_include in (0..30)
}
rule imh_php_malware_literal
{
strings:
$generic_a = "D@rk sH@d0w"
$generic_b = "ln -s /home/$i/public_html/wp-config.php"
$generic_c = "base'.(32*2)"
$generic_d = "a5b0f6efa9662ef6acd2a6e6ea88f765"
$generic_e = "config['botnet_timeout']"
$generic_f = "substr_count($shellPath"
$generic_g = ""
$generic_h = "$option(\"/438/e\",$au,438);"
$generic_i = "system file do not delete"
$generic_j = "new motherFucker();"
$generic_k = "bfakeprocb"
$generic_l = "PHP_OS.chr(49)"
$generic_m = "%28%0D%0A%66%75%6E%63%74%69%6F%6E%28"
$generic_n = "Grab Usernames from /home/"
$generic_o = "die(PHP_OS.chr(49).chr(48).chr(43).md5(0987654321"
$generic_p = "ZHCtehUnstopable"
$generic_q = "$v4af189b="
$generic_r = "$i437e2fb="
$generic_s = "af5f492a2"
$generic_t = "$EEkRtL8DY="
$generic_u = "function _68758598"
$generic_v = "$O00OO0=urldecode"
// a similar but not exact rule to the following is also in heuristic
$generic_w = "@error_reporting(0);@set_time_limit(0)"
$generic_x = "return $g.''.$o.''.$i;"
$generic_y = "$code = iget_data($_REQUEST['o']);\neval(\"?>\".$code);"
$uploader_1 = "$_FILES[\"\\165\\x70\\154\\x6f\\x61\\x64\\x73\"]"
$wc_ajax_try_2020 = "md5(md5(md5($_POST['token_admin"
$generic_z = "substr(md5(time()), 0, 8) . \".php\""
$fake_log_file = "$filename=Class_UC_key(\"2470617373776F72643D27\").$password."
$vuln = "
Vuln!! patch it Now!\nu H/L6: ="
$ali181091 = "ali181091@yahoo.com"
$key = ".hyib/;dq4ux9*zjmclp3_r80)t(vakng1s2foe75w6"
$globals = "${\"\\x47\\x4c\\x4fB\\x41\\x4c\\x53\"}"
$h4250d5 = "$h4250d5[j5f5dd]"
$backdoor = "ecode(\"UEsDBBQAAAAIAEMl70ysSqmPSQcAALMTAAAMAAA"
$wso_shell = "4k5yui1k5yu='5b37Wxs30zD8Zm1d/R/E1mrXQYyx"
$shadow_mangler = "$b=fopen('/home/'.$user.'/etc/'.$t.'/shadow','ab');fwrit"
$ubh_shell = "add_object_page(\"UBH\",\"U\\x42\\x48\""
$k2ll33d_shell = "ecode(\"PD9waHAKLy8gYnkgazJsbDMz"
$generic_a = "fsockopen(\"udp://$_15\",round(0+13"
$obfuscated = "$jtvyc[7]($_COOKIE, $_POST) as $whezkpg => $mzjyuh)"
$act = ">Anonymous Cyber Team< |
"
$darkshadow = "darkshadow File Manager"
$ofux = "title>Ofux Mailer"
$generic_b = "A='';@eval(base64_decode('QG9iX3N0YXJ0KC"
$shadowdelete = "unlink('/home/'.$user.'/etc/'.$site.'/shadow')"
$toolkit = "64_decode(\"UEsDBAoAAAAAALELCU0AAAAAAAAAAAA"
$uploader_1 = "$f1 = \".ht\"; $f2 = \"acc\"; $f3 = \"ess\";"
$lestershell = "Lester Hax0r"
$docdownloader = "77841099('ZXJyb3JfcmVwb3J0aW5"
$generic_c = "bh4dy2k = \"G%03B%11E%06T%03%5E"
$generic_d = "cf4050bc('ZXJyb3JfcmVwb3J0aW"
$downloader = "fn5b7c5e7aaf705('6261736536345f6465636f6465'"
$passwordreset = "':2083/resetpass?user=' . get_current_user()"
$generic_e = "$_klgsMO(\"\\x65\\x76\\x61\\x6c\\x28\\x62"
$docmalware_1 = "fn5b887ea9aabcf('6261736536345f6465636f6465"
$generic = "$rjiqlbk[31].$rjiqlbk[32].$rjiqlbk"
$docmalware_2 = "fn5b8667d2b6bc3('6261736536345f6465636f6465"
$i47_shell = "$lktd = \"eNrsvGmT40iSKPZ5xmz/Q6mszaZH2B0AxEH"
$bangledeshi = ">#Bangladeshi HackeR<"
$dx1z1_shell = "title>Mr.DX1Z1<"
$generic_4 = "$_f2k1cg3 = \"GR%13%1A%16WU_"
$generic_5 = "vxvxgddrtwrewfdsf($e,$q,$w)"
$brute_force = "createBrutePass($_GET['wordsList']"
$cookie_thief = "$GLOBALS['_79565595_']=Array('str_' .'rot13'"
$shell = "ecode(\"PD9waHANCmhlYWRlcignQ2"
$malware_unpacker = "new PclZip(\"ytpovuie.zip\")"
$arbitrary_curl = "$ch, CURLOPT_URL, $_GET['url'])"
$generic_6 = "$zUaDnOj408.\"'1X1rd9u2suj3rJX/gGjrhFIjyZI"
$minexmr = "0@pool.minexmr.com"
$downloader_2 = "$n5b98460961ddd('ZXJyb3JfcmVwb3J0aW5nKDA"
$generic_1 = "tbz74e1 = \"GP%17M%16P%5C%04%0C%40%0C%07G"
$backdoor_3 = "base64_decode('PD9waHANCmVjaG8gIlRoaXMgc2hpdCB3b3JrcyEiOw0"
$stylewpp = "Array('UkVRVUVTVF9VUkk=','P3JlYm9vdD15ZXM='"
$document_downloader = "$x = ''; for ($i = 0, $n = strlen($s); $i < $n; $i +="
$generic_2 = "s($q, $d){ for($g=0;$gexecute"
$arbitrary_eval = "ecode(\"PD9waHAgJFpUZUo9Y3JlYX"
$unpacker_1 = "PclZip(\"zlvkejwe.zip"
$bloodninja = "ecode('eNq1fflvU2f677/iieaqQDPhbD7HbsWtQqFAy9ZCp6UDNzq2j2M3jp3aDkk"
$phploot = "http://5.188.86.29:7000"
$z879 = "targetpthrowinticksEntimeType"
$uploader_4 = "file_put_contents($_SERVER[\"DOCUMENT_ROOT\"].\"/\".$_POST["
$spam_script = "$jfnbrsjfq = mail($jewrqwbnlk, $xaouf"
$tuhan_shell = "title>SH3LL TUHAN"
$orb_shell_1 = "ecode(YiunIUY76bBhuhNYIO8($XnNhAWEn"
$indoxploit_shell = "title>IndoXploit"
$outbound_stealth = "_dt2wacy = \"GS%19%19%19%5C%5DUX%40%0C%07G%09"
$shell_1 = "if(isset($_REQUEST['clr_htacc']) == true)\n {\n CheckSecureValue();\n ClearHtaccess();\n exit();"
$filebrowser = "function ShowPage($sFullPathToFile)\n{\n $sOutContent = '';\n $stFileHandle = fopen($sFullPathToFile, 'r');"
$downloader = "exec(\"\\160\\x6b\\151\\154\\x6c\\x20\\x2d\\x39\\40\\55\\x66\\x20\\163\\x74\\x65\\x61\\x6c\\164\\150\");"
$downloader_1 = "IndoXploit"
$spiritokiller = "spiritokiller"
$cheetah_shell = "code(\"PD9waHANCiRjb2xvciA9ICIjYTNlOTU2"
$anonymousfoux = "anonymousfox.com"
$generic = /\(isset\(\$.....\[\$_POST\['fm_usr']]\) && \$_POST\['fm_pwd'] === \$.....\[\$_POST\['fm_usr']]\)/
$scp173 = /array\('','}'\.\$[a-z0-9]{1,12}\.'\/\/'\)\);\/\/scp-173\?>$/
$scp173_2 = /^<\?php ?\x0d\n\/\/scp-173/ // \r\n
$reseller_finder = "coded by: ~Rizi_haxor" // PHP, but no magic
condition:
filesize < 1MB and PHP and any of them
}