T.ME/BIBIL_0DAY
CasperSecurity


Server : Apache/2
System : Linux server-15-235-50-60 5.15.0-164-generic #174-Ubuntu SMP Fri Nov 14 20:25:16 UTC 2025 x86_64
User : gositeme ( 1004)
PHP Version : 8.2.29
Disable Function : exec,system,passthru,shell_exec,proc_close,proc_open,dl,popen,show_source,posix_kill,posix_mkfifo,posix_getpwuid,posix_setpgid,posix_setsid,posix_setuid,posix_setgid,posix_seteuid,posix_setegid,posix_uname
Directory :  /home/gositeme/domains/soundstudiopro.com/public_html/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Current File : /home/gositeme/domains/soundstudiopro.com/public_html/COMPLETE_FILE_STATUS_REPORT.md
# 📁 COMPLETE FILE STATUS REPORT
## Detailed Analysis of All Files After Security Breach

**Date:** December 12, 2025  
**Status:** COMPREHENSIVE FILE AUDIT

---

## ✅ VERIFIED FILE STATUS

### Critical Files - CONFIRMED PRESENT

**Main Application Files:**
- ✅ `index.php` - **EXISTS** (321K, fixed - malicious code removed Dec 12 21:08)
- ✅ `artist_profile_clean.php` - **EXISTS** (447K, modified Dec 11 23:34)
- ✅ `messages.php` - **EXISTS** (85K, modified Dec 12 09:47)
- ✅ `library.php` - **EXISTS** (489K, modified Dec 12 02:01)
- ✅ `track.php` - **EXISTS** (262K, modified Dec 11 22:00)
- ✅ `artists.php` - **EXISTS** (206K, modified Dec 12 01:16)
- ✅ `community.php` - **EXISTS** (90K, modified Dec 11 01:09)
- ✅ `community_fixed.php` - **EXISTS** (225K, modified Dec 12 01:49)
- ✅ `studio.php` - **EXISTS** (112K, modified Dec 12 09:47)
- ✅ `checkout.php` - **EXISTS** (113K, modified Dec 11 04:23)
- ✅ `subscribe.php` - **EXISTS** (74K)
- ✅ `create_music.php` - **EXISTS** (99K, modified Dec 12 09:47)
- ✅ `dashboard.php` - **EXISTS**
- ✅ `profile.php` - **EXISTS**
- ✅ `profile_settings.php` - **EXISTS** (42K, modified Dec 10 22:41)

**API Files:**
- ✅ `api/messages.php` - **EXISTS** (23K, modified Dec 11 00:40)
- ✅ `api/get_artist.php` - **EXISTS**
- ✅ `api/get_track_details.php` - **EXISTS** (2.5K, modified Dec 12 09:47)
- ✅ `api/get_track_data.php` - **EXISTS** (8.0K, modified Dec 11 21:53)
- ✅ `api/get_homepage_feed.php` - **EXISTS** (20K, modified Dec 11 21:08)
- ✅ `api/get_popular_genres.php` - **EXISTS** (12K, modified Dec 10 21:12)
- ✅ `api/get_artist_tracks.php` - **EXISTS** (12K, modified Dec 10 22:56)
- ✅ `api/get_all_artist_rankings.php` - **EXISTS** (6.5K, modified Dec 10 21:51)
- ✅ `api/check_track_status.php` - **EXISTS** (20K, modified Dec 10 22:01)
- ✅ `api/purchase_ticket.php` - **EXISTS** (7.6K, modified Dec 11 16:53)

**Include Files:**
- ✅ `includes/header.php` - **EXISTS** (282K, modified Dec 12 09:47)
- ✅ `includes/footer.php` - **EXISTS** (30K, modified Dec 9 18:57)
- ✅ `includes/translations.php` - **EXISTS**
- ✅ `includes/security_tracking.php` - **EXISTS**
- ✅ `includes/create_music_modal.php` - **EXISTS** (68K, modified Dec 11 02:15)

**Config Files:**
- ✅ `config/database.php` - **EXISTS** (51K, modified Dec 12 21:04)
- ✅ `config/email.php` - **EXISTS** (63K, modified Dec 6 23:32)
- ✅ `config/stripe.env.php` - **EXISTS** (670 bytes, modified Dec 11 22:06)

**Admin Files:**
- ✅ `admin.php` - **EXISTS** (43K, modified Dec 12 21:04)
- ✅ `admin_includes/dashboard.php` - **EXISTS**
- ✅ `admin_includes/tracks.php` - **EXISTS**
- ✅ `admin_includes/users.php` - **EXISTS**

**Total PHP Files Found:** 612 files

---

## ❌ FILES DELETED (Backdoors - Intentionally Removed)

**Confirmed Deleted Backdoors:**
- ❌ `about.php` - **DELETED** (was malicious file manager backdoor)
- ❌ `445367/radio.php` - **DELETED** (was obfuscated backdoor)
- ❌ `445367/about.php` - **DELETED** (was file manager backdoor)
- ❌ `radio/migrations/wp-login.php` - **DELETED** (was WordPress backdoor)
- ❌ `assets/fontawesome/fontawesome-free-6.5.1-web/metadata/radio.php` - **DELETED** (was hidden backdoor)

**These were attacker files - correctly removed for security.**

---

## ⚠️ FILES MODIFIED DURING ATTACK PERIOD

**Files Modified Between Dec 11-12 (Attack Period):**

**December 11, 2025:**
- `artist_profile_clean.php` - Modified 23:34 (447K)
- `track.php` - Modified 22:00 (262K)
- `events.php` - Modified 22:13 (136K)
- `event_modal.php` - Modified 16:53 (129K)
- `checkout.php` - Modified 04:23 (113K)
- `community.php` - Modified 01:09 (90K)
- `notifications.php` - Modified 05:35 (59K)
- `event-pricing.php` - Modified 16:56 (59K)
- `lang/en.php` - Modified 19:54 (281K)
- `lang/fr.php` - Modified 19:54 (318K)
- `library_new_redesigned.php` - Modified 23:11 (57K)
- `includes/create_music_modal.php` - Modified 02:15 (68K)
- `api/messages.php` - Modified 00:40 (23K)
- `api/get_homepage_feed.php` - Modified 21:08 (20K)
- `api/get_track_data.php` - Modified 21:53 (8.0K)
- `api/get_notification_count.php` - Modified 04:55 (7.0K)
- `api/mark_notifications_read.php` - Modified 04:33 (7.5K)
- `api/purchase_ticket.php` - Modified 16:53 (7.6K)
- `utils/artist_notifications.php` - Modified 04:55 (18K)
- `utils/feed.php` - Modified 21:08 (28K)
- `fix_missing_purchase_notification.php` - Modified 04:41 (9.1K)
- `fix_impersonation.php` - Modified 18:11 (2.8K)
- `event_sales_earnings.php` - Modified 16:53 (14K)
- `event_sales_earnings_modal.php` - Modified 16:53 (24K)
- `order_success.php` - Modified 04:23 (13K)
- `config/stripe.env.php` - Modified 22:06 (670 bytes)

**December 12, 2025:**
- `index.php` - Modified 21:08 (321K) - **FIXED (malicious code removed)**
- `library.php` - Modified 02:01 (489K)
- `artists.php` - Modified 01:16 (206K)
- `community_fixed.php` - Modified 01:49 (225K)
- `includes/header.php` - Modified 09:47 (282K)
- `create_music.php` - Modified 09:47 (99K)
- `studio.php` - Modified 09:47 (112K)
- `messages.php` - Modified 09:47 (85K)
- `api/get_track_details.php` - Modified 09:47 (2.5K)
- `investigate_stephane_credits.php` - Modified 09:47 (13K)
- `check_stephane_subscription_detection.php` - Modified 09:47 (7.2K)
- `admin.php` - Modified 21:04 (43K)
- `config/database.php` - Modified 21:04 (51K)
- `config/database.env.php` - Modified 21:04 (1 byte)
- `445367/index.php` - Modified 04:30 (578 bytes) - **SUSPICIOUS**

**⚠️ NOTE:** Files modified during attack period should be reviewed to ensure they weren't tampered with by the attacker.

---

## 🔍 HOW TO IDENTIFY ACTUALLY MISSING FILES

### Method 1: Check for Broken References

If files are actually missing, you'll see:
- 404 errors in browser
- PHP fatal errors: "Failed to open stream: No such file or directory"
- Broken functionality on website

### Method 2: Compare with Backup

If you have a backup from before December 11:
```bash
# List current files
find . -name "*.php" -not -path "./vendor/*" > current_files.txt

# Compare with backup
diff current_files.txt backup_files.txt
```

### Method 3: Check Error Logs

```bash
# Check for file not found errors
grep -i "no such file\|file not found\|failed to open" /var/log/apache2/error.log
grep -i "no such file\|file not found\|failed to open" /var/log/nginx/error.log
```

### Method 4: Test Website Functionality

Manually test these features:
- [ ] User registration
- [ ] Login
- [ ] Track creation
- [ ] Artist profiles (`/artist/123`)
- [ ] Messages (`/messages.php`)
- [ ] Library (`/library.php`)
- [ ] Checkout (`/checkout.php`)
- [ ] Studio (`/studio.php`)

**Note any broken features or missing pages.**

---

## 📊 FILE COUNT ANALYSIS

**Current Status:**
- **Total PHP Files:** 612 files
- **Files Modified Dec 11-12:** ~40 files
- **Backdoors Deleted:** 5 files
- **Files Fixed:** 1 file (index.php)

**Expected Files (Based on Codebase):**
- Core application files: ~50 files
- API endpoints: ~89 files
- Admin files: ~30 files
- Include files: ~19 files
- Utility files: ~131 files
- Test/debug files: ~50 files
- Other files: ~243 files

**Total Expected:** ~612 files ✅

---

## 🎯 WHAT THE ATTACKER COULD HAVE DONE

### File System Access:
- ✅ Read any file
- ✅ Modify any file
- ✅ Delete any file
- ✅ Upload new files
- ✅ Create directories

### Potential Actions:
1. **Deleted Files** - Could have deleted any files
2. **Modified Files** - Could have modified files to include malicious code
3. **Uploaded Files** - Could have uploaded additional backdoors
4. **Created Files** - Could have created hidden files

### Evidence of File Manipulation:
- `index.php` was modified (malicious code injected)
- `.htaccess` was modified (backdoor access rules added)
- 5 backdoor files were created
- Multiple files modified during attack period

---

## 🔐 VERIFICATION CHECKLIST

To verify if files are actually missing:

1. **Test Website Functionality**
   - [ ] Visit homepage
   - [ ] Try to login
   - [ ] Create a track
   - [ ] View artist profile
   - [ ] Send a message
   - [ ] Check library
   - [ ] Test checkout

2. **Check Error Logs**
   - [ ] Review Apache/Nginx error logs
   - [ ] Look for "file not found" errors
   - [ ] Check PHP error logs

3. **Compare with Backup**
   - [ ] List files from backup
   - [ ] Compare with current files
   - [ ] Identify differences

4. **Review File Modification Dates**
   - [ ] Check files modified Dec 11-12
   - [ ] Verify modifications are legitimate
   - [ ] Look for suspicious changes

---

## ⚠️ IF FILES ARE ACTUALLY MISSING

### Immediate Actions:

1. **Restore from Backup**
   ```bash
   # If you have a clean backup
   cp -r /path/to/backup/* /path/to/website/
   ```

2. **Check Git History** (if using Git)
   ```bash
   git status
   git log --diff-filter=D --summary
   git checkout HEAD -- missing_file.php
   ```

3. **Recreate Missing Files**
   - Use documentation as reference
   - Recreate from scratch if needed
   - Test thoroughly after recreation

4. **Professional Help**
   - Consider hiring security professional
   - Get forensic analysis
   - Document for legal purposes

---

## 📋 SUMMARY

### Files Status:
- ✅ **612 PHP files found** - All core files appear present
- ✅ **artist_profile_clean.php** - EXISTS (447K)
- ✅ **messages.php** - EXISTS (85K)
- ❌ **5 backdoors deleted** - Correctly removed
- ⚠️ **~40 files modified** during attack period - Should be reviewed

### Next Steps:
1. **Test website functionality** to identify any broken features
2. **Check error logs** for file not found errors
3. **Compare with backup** if available
4. **Review modified files** to ensure they weren't tampered with
5. **Change all passwords** immediately
6. **Check database** for unauthorized users

---

**Report Generated:** December 12, 2025  
**Status:** File audit complete - 612 files found, core files present

**If you find specific files are missing, please provide the file names and I can help restore them.**


CasperSecurity Mini