Mobile app version of vmapp.org
Login or Join
Cody1181609

: Unknown file automatically created on root folder I am not sure if it is the correct place to ask such a question. One of my websites got malware. It is hosted on a 1&1 server and the

@Cody1181609

Posted in: #Malware #Wordpress

I am not sure if it is the correct place to ask such a question.
One of my websites got malware. It is hosted on a 1&1 server and the website is developed in WordPress 3.3.1 (now upgraded to 3.5). A few things I noticed are:


A file named 1278bd2dc5f89296044af950a96cd9d0 automatically created in public root directory. If I delete it, it reappear in couple of minutes.
This file has IP address separted by a pipe sign. Every few minutes, a new IP address is added to the list.
Initialy, it also overwrite the index.php and wp-admin/admin.php files with lower permissions. I could not view what the have but I could only delete them.
I SSHed to server and see there are no unknown processes running.
I have one single FTP user. whose password I have changed a while ago.


Can anybody tell me? What and where should I check to stop this happening? Maybe it's remote process but how to track it down?

Contents at this time are:


157.55.32.83|199.21.99.106|173.255.233.124|

10.03% popularity Vote Up Vote Down


Login to follow query

More posts by @Cody1181609

3 Comments

Sorted by latest first Latest Oldest Best

 

@Cody1181609

At last I found that few index.php files had eval code that was creating and recording visitor's IPs. If someone gets in the same situation, I recommend following flow.


Search for any of the following string in whole of your website.


eval(base64_decode
eval(gzinflate
eval(gzuncompress
all above with "echo" instead of "eval".

If step 1 does not work try a more general search


eval
base64_encode
str_rot13
edoced_46esab
gzinflate
gzuncompress

Most probably, the results you will get will contain both good and bad codes. you would then need to identify which one is bad.
Look for the code that is independent, not readable, may be one liner
Delete all occurrence of this code.
Search again for the similar code just to make sure your site is clean now.
Delete files generated by the code.


You can use the thisscript to see what that filthy code does

10% popularity Vote Up Vote Down


 

@Phylliss660

try this WP plugin www.wordfence.com/, though a bit late it can scan your WP files and recommend fixes. I fixed mine manually as well and let wordfence keep running.

10% popularity Vote Up Vote Down


 

@Holmes151

Mark your website as temporarily down.
Rollback to a previous backup (you should have backups from 1&1) that you're sure you weren't infected and you don't lose too much data.
Upgrade to the latest WP (again).
Upgrade any plugins, and remove unnecessary plugins.
Go online again.

10% popularity Vote Up Vote Down


Back to top | Use Dark Theme