phpstudyºóÃÅÖ²ÈëÊÂÎñÇ徲ͨ¸æ
Ðû²¼Ê±¼ä 2019-09-21¡ñÊÂÎñÅä¾°
PhpstudyÈí¼þÊǺ£ÄÚµÄÒ»¿îÃâ·ÑµÄPHPµ÷ÊÔÇéÐεijÌÐò¼¯³É°ü£¬Í¨¹ý¼¯³ÉApache¡¢PHP¡¢MySQL¡¢phpMyAdmin¡¢ZendOptimizer¶à¿îÈí¼þÒ»´ÎÐÔ×°Öã¬ÎÞÐèÉèÖü´¿ÉÖ±½Ó×°ÖÃʹÓ㬾ßÓÐPHPÇéÐε÷ÊÔºÍPHP¿ª·¢¹¦Ð§£¬ÔÚº£ÄÚÓÐ׎ü°ÙÍòPHPÓïÑÔѧϰÕß¡¢¿ª·¢ÕßÓû§¡£
¿ËÈÕ£¬º¼Öݹ«°²±¨µÀÁËÒ»ÆðÖØ´óÇå¾²ÊÂÎñº¼Öݾ¯·½×ª´ï¹¥»÷ÉæÍøÎ¥·¨·¸·¨ôß¡°¾»Íø2019¡±×¨ÏîÐж¯Õ½¹û£¬ÆäÖÐÏêϸ˵Ã÷ÎúÒ»Æð¹©Ó¦Á´¹¥»÷ÊÂÎñ¡£
¡ñÊÂÎñÐÎò
2018Äê12ÔÂ4ÈÕ£¬Î÷ºþÇø¹«Ñ·Ö¾ÖÍø¾¯´ó¶Ó½Ó±¨°¸³Æ£¬Ä³¹«Ë¾·¢Ã÷¹«Ë¾ÄÚÓÐ20Óą̀ÅÌËã»ú±»Ö´ÐÐΣÏÕÏÂÁÒÉËÆÔ¶³Ì¿ØÖÆ×¥È¡Õ˺ÅÃÜÂëµÈÅÌËã»úÊý¾Ý»Ø´«´ó×ÚÃô¸ÐÐÅÏ¢¡£
Î÷ºþÍø¾¯Á¬Ã¦¶Ô¸Ã°¸Á¢°¸Õì²é£¬²¢ÔÚÊÐÍø¾¯·Ö¾ÖǣͷÏ£¬×éÖ¯¾«º·¾¯Á¦½¨Éèר°¸×éѸËÙ¿ªÕ¹Õì²éȡ֤ÊÂÇé¡£
ÓÚ2019Äê1ÔÂ4ÈÕÖÁ5ÈÕ£¬±ø·ÖËÄ·£¬»®·ÖÔÚº£ÄÏÁêË®¡¢ËÄ´¨³É¶¼¡¢ÖØÇì¡¢¹ã¶«¹ãÖÝ×¥»ñÂíij¡¢Ñîij¡¢Ì·Ä³¡¢ÖÜijijµÈ7Ãû·¸·¨ÏÓÒÉÈË£¬ÏÖ³¡½É»ñ´ó×ÚÉæ°¸ÎïÆ·£¬²¢ÔÚÏÓÒÉÈ˵ĵç×Ó×°±¸ÖÐÕÒµ½ÁËÖ±½ÓµÄ·¸·¨Ö¤¾Ý¡£¾Ýͳ¼Æ£¬×èÖ¹×¥»ñʱ¼ä£¬·¸·¨ÏÓÒÉÈ˹²²»·¨¿ØÖÆÅÌËã»ú67ÍòÓą̀£¬²»·¨»ñÈ¡Õ˺ÅÃÜÂëÀࡢ̸ÌìÊý¾ÝÀà¡¢×°±¸ÂëÀàµÈÊý¾Ý10ÍòÓà×é¡£
¾ÝÖ÷Òª·¸·¨ÏÓÒÉÈËÂíij¹©Êö£¬ÆäÓÚ2016Äê±àдÁË¡°ºóÃÅ¡±£¬Ê¹ÓúڿÍÊֶβ»·¨ÇÖÈëÁËPhpStudyÈí¼þ¹ÙÍø£¬¸Ä¶¯ÁËÈí¼þ×°ÖðüÄÚÈÝ¡£¸Ã¡°ºóÃÅ¡±ÎÞ·¨±»É±¶¾Èí¼þɨÃèɾ³ý£¬²¢ÇÒÒþ²ØÓÚÈí¼þij¹¦Ð§ÐÔ´úÂëÖУ¬¼«Äѱ»·¢Ã÷¡£
ÔÚר°¸×éµÄÕì²éÀú³ÌÖУ¬Í¬Ê±·¢Ã÷ÂíijµÈÈË̫ͨ¹ýÎö¡°ÍµÈ¡¡±µÄÊý¾Ý£¬»ñµÃÁ˶à¸ö¾³ÍâÍøÕ¾µÄÖÎÀíºǫ́Õ˺ÅÃÜÂ룬²¢Í¨¹ýÐ޸ķþÎñÆ÷Êý¾ÝµÄ·½·¨ÊµÑéÕ©Æ£¬²»·¨Ä²Àû¹²¼Æ600ÓàÍòÔª¡£
ÏÖÔÚ£¬¹Ù·½·¢Í¨¸æ³Æ£¬±»¸Ä¶¯µÄÈí¼þ°æ±¾ÎªPhpStudy2016°æ±¾ÖеÄphp5.4°æ±¾£¬ÈôÊÇÄãÊÇ´ÓÆäËüÏÂÔØÕ¾»ñÈ¡µÄ¸Ã°æ±¾£¬Çë×ÔÐмì²é²¢É¾³ýÆäÖеÄphp5.4°æ±¾¡£
¡ñÊÂÎñÆÊÎö
±»Ñ¬È¾ºóÃŵÄÊÇ /php/php-5.4.45/ext/php_xmlrpc.dll
md5£ºC339482FD2B233FB0A555B629C0EA5D5
²¿·ÖÆÊÎö»ØÁ¬´úÂ룬ÆäÖÐÌá¼°ÁË»ØÁ¬C2
¡ñ¼ì²âÒªÁì
pcheck.shÎļþ£¬ÔËÐкó¿ÉÒԵݹé¼ì²âÄ¿½ñĿ¼ÏÂËùÓÐdllÎļþÖÐÊÇ·ñ°üÀ¨Ä¾ÂíÎļþµÄÌØÕ÷Öµ¡£
#! /bin/bash
# author: pcat@chamd5.org
# http://pcat.cc
# trojan feature
trojan=@eval
function check_dir(){
for file in `ls $1`
do
f2=$1"/"$file
if [ -d $f2 ]
then
check_dir $f2
# just check dll file
elif [ "${file##*.}"x = "dll"x ]
then
strings $f2 |grep -q $trojan
if [ $? == 0 ]
then
echo "===" $f2 "===="
strings $f2 |grep $trojan
fi
fi
done
}
# . stand for current directory
check_dir .
windowsϵͳ£¬Ö´ÐÐpcheck.py
# -*- coding:utf8 -*-
__author__='pcat@chamd5.org'
__blog__='http://pcat.cc'
import os
import string
import re
def strings(file) :
chars = string.printable[:94]
shortestReturnChar = 4
regExp = '[%s]{%d,}' % (chars, shortestReturnChar)
pattern = re.compile(regExp)
with open(file, 'rb') as f:
return pattern.findall(f.read())
def grep(lines,pattern):
for line in lines:
if pattern in line:
yield line
def pcheck(filename):
# trojan feature
trojan='@eval'
# just check dll file
if filename.endswith('.dll'):
lines=strings(filename)
try:
grep(lines,trojan).next()
except:
return
print '=== {0} ==='.format(filename)
for line in grep(lines,trojan):
print line
pass
def foo():
# . stand for current directory
for path, dirs, files in os.walk(".", topdown=False):
for name in files:
pcheck(os.path.join(path, name))
for name in dirs:
pcheck(os.path.join(path, name))
pass
if __name__ == '__main__':
foo()
¡ñÐÞ¸´½¨Òé
ÏÖÔÚPhpStudy¹Ù·½µÄ×îа汾Öв»±£´æÒÔºóÃÅ£¬Çë»á¼û¹Ù·½Á´½Ó¸üе½×îÐÂÈí¼þ£º
https://www.xp.cn/
¡ñIOC
IP
133.130.101.150
ÓòÃû
360se.net
bbs.360se.net
www.360se.net
up.360se.net
down.360se.net
cms.360se.net
file.360se.net
ftp.360se.net
MD5
C339482FD2B233FB0A555B629C0EA5D5
0f7ad38e7a9857523dfbce4bce43a9e9
¡ñ²Î¿¼Á´½Ó
http://baijiahao.www.hyhths.com/s?id=1645182793211249695&wfr=spider&for=pc
https://mp.weixin.qq.com/s/xikzveCJqkKAu1MnMRCYPw


¾©¹«Íø°²±¸11010802024551ºÅ