Malicious Executable Code?
-
Hi,
Wordfence detected this as a critical security issue. Have I infected by malware? What should I do?
This file is a PHP executable file and contains the word ‘eval’ (without quotes) and the word ‘unpack(‘ (without quotes). The eval() function along with an encoding function like the one mentioned are commonly used by hackers to hide their code. If you know about this file you can choose to ignore it to exclude it from future scans.
I checked the code and it include this line.
eval(‘$v_result = ‘.$p_options[PCLZIP_CB_PRE_EXTRACT].'(PCLZIP_CB_PRE_EXTRACT, $v_local_header);’);
And these.
Line 2858: $v_data_footer = unpack(‘Vcrc/Vcompressed_size’, $v_binary_data);
Line 4280: $v_data = unpack(‘Vid’, $v_binary_data);
Line 4310: $v_data = unpack(‘vversion/vflag/vcompression/vmtime/vmdate/Vcrc/Vcompressed_size/Vsize/vfilename_len/vextra_len’, $v_binary_data);
Line 4383: $v_data = unpack(‘Vid’, $v_binary_data);
Line 4413: $p_header = unpack(‘vversion/vversion_extracted/vflag/vcompression/vmtime/vmdate/Vcrc/Vcompressed_size/Vsize/vfilename_len/vextra_len/vcomment_len/vdisk/vinternal/Vexternal/Voffset’, $v_binary_data);
Line 4554: $v_data = @unpack(‘Vid’, $v_binary_data);
Line 4630: $v_data = unpack(‘vdisk/vdisk_start/vdisk_entries/ventries/Vsize/Voffset/vcomment_size’, $v_binary_data);Thank you.
- The topic ‘Malicious Executable Code?’ is closed to new replies.