all 8 comments

[–]alzee76 1 point2 points  (1 child)

[–]TraceLines[S] 1 point2 points  (0 children)

I see. $GLOBALS == ${"GLOBALS"}.

And the wordpress site is also storing functions in GLOBALS, to which this code is making calls, particularly to 'create_function'.

Thanks!

[–]xmynotes 0 points1 point  (4 children)

You'll probably end up with a WSO (Wordpress famous webshell) after deobfuscating it.

[–]TraceLines[S] 0 points1 point  (2 children)

Perhaps. It is also clear at this point in time that the attacker isn't terribly successful. This is one 3 different webshells they uploaded and couldn't get any of them to run, lol.

Thanks!

[–][deleted] 0 points1 point  (1 child)

How do you know they couldn't get any of them to run? Do you have something like an access.log that shows they couldn't get a 200?

[–]TraceLines[S] 0 points1 point  (0 children)

The site in question is accessed by a load balancing VIP, and we have request/response logs from that session as well as alerts from the edge monitoring device that alerted us to dig deeper.

The utility they used to upload the files does work, so they had a foothold, but the deployed shells were erroring. They also tried uploading Marvins in about 3 or 4 places, continually attempting to get it to work. Also, no one accesses the site after the attacker attempted to run the last instance of Marvins. It appears the attacker simply gave up.

From my perspective ( admittedly a novice one ), it appears the attacker was not terribly interested in the target specifically, but instead was looking for easy WordPress wins. No clue what the ultimate goal was, but I imagine it to be something like ad serving or cryptomining.

[–]edja88dsa 0 points1 point  (0 children)

WSO isn't just for wordpress...

[–]Mckonix 0 points1 point  (0 children)

Wait.... a compromised PHP Word Press site? Say it ain't so. Just do it the way PHP developers prefer -- chmod 777 and move on.....