[
  {
    "path": "README.md",
    "content": "# whohk\n\nwhohk，linux下一款强大的应急响应工具\n\n<a href=\"https://github.com/wgpsec/whohk\"><img alt=\"Release\" src=\"https://img.shields.io/badge/python-3.x-9cf\"></a>\n<a href=\"https://github.com/wgpsec/whohk\"><img alt=\"Release\" src=\"https://img.shields.io/badge/whohk-1.1-ff69b4\"></a>\n<a href=\"https://github.com/wgpsec/whohk\"><img alt=\"Release\" src=\"https://img.shields.io/badge/LICENSE-GPL-important\"></a>\n![GitHub Repo stars](https://img.shields.io/github/stars/wgpsec/whohk?color=success)\n![GitHub forks](https://img.shields.io/github/forks/wgpsec/whohk)\n![GitHub all release](https://img.shields.io/github/downloads/wgpsec/whohk/total?color=blueviolet)  \n\n在linux下的应急响应往往需要通过繁琐的命令行来查看各个点的情况，有的时候还需要做一些格式处理，这对于linux下命令不是很熟悉的人比较不友好。本工具将linux下应急响应中常用的一些操作给集合了起来，并处理成了较为友好的格式，只需要通过一个参数就能代替繁琐复杂的命令来实现对各个点的检查。\n\n支持主流的Linux，包含centos、redhat、ubuntu、debian、opensuse。\n\n## 使用指南\n```\noptional arguments:\n  -h, --help            show this help message and exit\n  -user                 用于查看系统可登录账户和空口令账户（无参数）\n  -history              用于查看所有用户的敏感历史命令（无参数）\n  -cron                 用于查看所有用户的定时任务（无参数）\n  -ip                   用于查看外连ip（无参数）\n  --pid 1234            用于定位进程物理路径（参数为pid号）\n  --ssh-fip             用于查看ssh登录失败的ip和次数（无参数）\n  --ssh-fuser           用于查看ssh登录失败的用户和次数（无参数）\n  --ssh-sip             用于查看ssh登录成功的ip和次数（无参数）\n  --ssh-sinfo           用于查看ssh登录成功的用户详情（无参数）\n  --file-cron 7         用于查看系统各个级别定时任务目录中，n天内被修改的文件（参数为天数）\n  --file-starup 7       用于查看系统启动项目录中，n天内被修改的文件（参数为天数）\n  --file-os 7           用于查看系统重要目录中，n天内被修改的文件（参数为天数）\n  --file-change /www 7 php\n                        用于查看在n天内指定目录中指定后缀的被修改的文件（参数为物理路径、天数、后缀）\n  --file-perm /www jsp 777\n                        用于查看指定目录下指定后缀指定权限的文件（参数为物理路径、后缀、天数）\n  --s-backdoor /home    用于检测指定路径下的恶意样本（参数为物理路径）\n  --s-webshell /var/www\n                        用于检测指定路径下的webshell（参数为物理路径）\n```\n\n## 细节\n\n由于懒得重新截图，所以就直接放公众号之前发的图了\n- whohk，一款强大的linux应急响应辅助工具：[点击跳转](https://mp.weixin.qq.com/s?__biz=MzIyNDkwNjQ5Ng==&mid=2247484224&idx=1&sn=616be624b7936abef282c5611f710a6a&chksm=e8069f2fdf71163973a712de55de80b042fb6224fa9179b4a655b5fe2e5be647f63d7f038e60&token=1653316416&lang=zh_CN#rd)\n\n- [更新]Linux下应急响应工具whohk v1.1版本：[点击跳转](https://mp.weixin.qq.com/s?__biz=MzIyNDkwNjQ5Ng==&mid=2247485371&idx=1&sn=8f6a32e28bf06e100edcd9241a8923e4&chksm=e8069bd4df7112c28a416e740b6025982d1d4a920906f9e3aa2f6244c5a691af6cf9a96bb55d#rd)\n\n- 如何打造一款自己的恶意样本检测工具：[点击跳转](https://mp.weixin.qq.com/s?__biz=MzIyNDkwNjQ5Ng==&amp;mid=2247484475&amp;idx=1&amp;sn=7180cb7a18335c71ef561f9ec468f601&amp;chksm=e8069854df7111425708634704d07832764f02545065717fd45424abb960938cbc121a417eb5&token=393884268&lang=zh_CN#rd)\n\n## 碎碎念\n- 2020-09-21 \n>  在历次的Linux系统下应急中感受到了敲命令的繁琐，以及有些太长记不住的命令当着客户面去百度的尴尬，决定把Linux下应急检查的一些点的命令用工具来集合到一起。在这个工具之前其实还做过一个windows/Linux系统下的安全巡检小工具，但由于对我的工作意义不大，所以最后经过一顿操作，有了`whohk`这一款小工具。\n\n- 2021-08-26\n> 在过去的近一年里应急的次数不那么频繁了，基本无视这个工具。不过有一次登录公众号后，发现有一些粉丝私信提新功能以及反馈了一些问题（原谅我半年登一次公众号），所以这次根据之前的反馈，进行了一些更新。\n\n- 2022-04-30\n> 发现这个工具居然成为了我GitHub stars最多的一个项目，或许真的帮助到了一些人。\n> 决定开源。代码写的很简单，也可以说比较烂，本次上传的是2021.08.26的版本，也是目前最新版（因为只要没有新的需求就不会更新，以及我~~没有时间~~懒也不会更新🐶）。\n> \n> ~~不会摆烂。目前有一些新的想法，但是很模糊，大家有好的建议欢迎提issue。~~ 摆烂中...\n\n## TODO\n- [ ] 重构，代码写的优雅点\n- [ ] Windows支持\n- [ ] server端\n- [ ] 多台主机数据聚合分析\n\n## 交流\n\n![](img/taixiayanshu.png)\n![](img/wgpsec.png)\n\n\n"
  },
  {
    "path": "rules/malware/MALW_BackdoorSSH.yar",
    "content": "/*\n    This Yara ruleset is under the GNU-GPLv2 license (http://www.gnu.org/licenses/gpl-2.0.html) and open to any user or organization, as    long as you use it under this license.\n\n*/\n\nrule SSH_backdoor\n{\n\n    meta:\n        description = \"Custome SSH backdoor based on python and paramiko - file server.py\"\n        author = \"Florian Roth\"\n        reference = \"https://goo.gl/S46L3o\"\n        date = \"2015-05-14\"\n        hash = \"0953b6c2181249b94282ca5736471f85d80d41c9\"\n\n    strings:\n        $s0 = \"command= raw_input(\\\"Enter command: \\\").strip('n')\" fullword ascii\n        $s1 = \"print '[-] (Failed to load moduli -- gex will be unsupported.)'\" fullword ascii\n        $s2 = \"print '[-] Listen/bind/accept failed: ' + str(e)\" fullword ascii\n        $s3 = \"chan.send(command)\" fullword ascii\n        $s4 = \"print '[-] SSH negotiation failed.'\" fullword ascii\n        $s5 = \"except paramiko.SSHException, x:\" fullword ascii\n\n    condition:\n        filesize < 10KB and 5 of them\n}\n"
  },
  {
    "path": "rules/malware/MALW_BlackRev.yar",
    "content": "/*\n    This Yara ruleset is under the GNU-GPLv2 license (http://www.gnu.org/licenses/gpl-2.0.html) and open to any user or organization, as\n    long as you use it under this license.\n\n*/\n\nrule BlackRev_BotNet\n{\n   meta:\n      author = \"Dennis Schwarz\"\n      date = \"2013-05-21\"\n      description = \"Black Revolution DDoS Malware. http://www.arbornetworks.com/asert/2013/05/the-revolution-will-be-written-in-delphi/\"\n      origin = \"https://github.com/arbor/yara/blob/master/blackrev.yara\"\n\n   strings: \n      $base1 = \"http\"\n      $base2 = \"simple\"\n      $base3 = \"loginpost\"\n      $base4 = \"datapost\"\n\n      $opt1 = \"blackrev\"\n      $opt2 = \"stop\"\n      $opt3 = \"die\"\n      $opt4 = \"sleep\"\n      $opt5 = \"syn\"\n      $opt6 = \"udp\"\n      $opt7 = \"udpdata\"\n      $opt8 = \"icmp\"\n      $opt9 = \"antiddos\"\n      $opt10 = \"range\"\n      $opt11 = \"fastddos\"\n      $opt12 = \"slowhttp\"\n      $opt13 = \"allhttp\"\n      $opt14 = \"tcpdata\"\n      $opt15 = \"dataget\"\n\n   condition:\n      all of ($base*) and 5 of ($opt*)\n}\n"
  },
  {
    "path": "rules/malware/MALW_PE_sections.yar",
    "content": "/*\n    This Yara ruleset is under the GNU-GPLv2 license (http://www.gnu.org/licenses/gpl-2.0.html) and open to any user or organization, as    long as you use it under this license.\n\n*/\n\nimport \"pe\"\n\nrule packered : packer PE {\n\n    meta:\n\n        author = \"@j0sm1\"\n        date = \"2016/10/21\"\n        description = \"The packer/protector section names/keywords\"\n        reference = \"http://www.hexacorn.com/blog/2012/10/14/random-stats-from-1-2m-samples-pe-section-names/\"\n        filetype = \"binary\"\n\n    strings:\n\n        $s1 = \".aspack\" wide ascii\n        $s2 = \".adata\" wide ascii\n        $s3 = \"ASPack\" wide ascii\n        $s4 = \".ASPack\" wide ascii\n        $s5 = \".ccg\" wide ascii\n        $s6 = \"BitArts\" wide ascii\n        $s7 = \"DAStub\" wide ascii\n        $s8 = \"!EPack\" wide ascii\n        $s9 = \"FSG!\" wide ascii\n        $s10 = \"kkrunchy\" wide ascii\n        $s11 = \".mackt\" wide ascii\n        $s12 = \".MaskPE\" wide ascii\n        $s13 = \"MEW\" wide ascii\n        $s14 = \".MPRESS1\" wide ascii\n        $s15 = \".MPRESS2\" wide ascii\n        $s16 = \".neolite\" wide ascii\n        $s17 = \".neolit\" wide ascii\n        $s18 = \".nsp1\" wide ascii\n        $s19 = \".nsp2\" wide ascii\n        $s20 = \".nsp0\" wide ascii\n        $s21 = \"nsp0\" wide ascii\n        $s22 = \"nsp1\" wide ascii\n        $s23 = \"nsp2\" wide ascii\n        $s24 = \".packed\" wide ascii\n        $s25 = \"pebundle\" wide ascii\n        $s26 = \"PEBundle\" wide ascii\n        $s27 = \"PEC2TO\" wide ascii\n        $s28 = \"PECompact2\" wide ascii\n        $s29 = \"PEC2\" wide ascii\n        $s30 = \"pec1\" wide ascii\n        $s31 = \"pec2\" wide ascii\n        $s32 = \"PEC2MO\" wide ascii\n        $s33 = \"PELOCKnt\" wide ascii\n        $s34 = \".perplex\" wide ascii\n        $s35 = \"PESHiELD\" wide ascii\n        $s36 = \".petite\" wide ascii\n        $s37 = \"ProCrypt\" wide ascii\n        $s38 = \".RLPack\" wide ascii\n        $s39 = \"RCryptor\" wide ascii\n        $s40 = \".RPCrypt\" wide ascii\n        $s41 = \".sforce3\" wide ascii\n        $s42 = \".spack\" wide ascii\n        $s43 = \".svkp\" wide ascii\n        $s44 = \"Themida\" wide ascii\n        $s45 = \".Themida\" wide ascii\n        $s46 = \".packed\" wide ascii\n        $s47 = \".Upack\" wide ascii\n        $s48 = \".ByDwing\" wide ascii\n        $s49 = \"UPX0\" wide ascii\n        $s50 = \"UPX1\" wide ascii\n        $s51 = \"UPX2\" wide ascii\n        $s52 = \".UPX0\" wide ascii\n        $s53 = \".UPX1\" wide ascii\n        $s54 = \".UPX2\" wide ascii\n        $s55 = \".vmp0\" wide ascii\n        $s56 = \".vmp1\" wide ascii\n        $s57 = \".vmp2\" wide ascii\n        $s58 = \"VProtect\" wide ascii\n        $s59 = \"WinLicen\" wide ascii\n        $s60 = \"WWPACK\" wide ascii\n        $s61 = \".yP\" wide ascii\n        $s62 = \".y0da\" wide ascii\n        $s63 = \"UPX!\" wide ascii\n\n    condition:\n        // DOS stub signature                           PE signature\n        uint16(0) == 0x5a4d and uint32be(uint32(0x3c)) == 0x50450000 and (\n            for any of them : ( $ in (0..1024) )\n        )\n}\n"
  },
  {
    "path": "rules/malware/ddg.yar",
    "content": "// ddg脚本通配规则\nrule linux_miner_ddg_script_gen\n{\n    meta:\n        description = \"ddg shell script general\"\n        author = \"G4rb3n\"\n        reference = \"https://blog.netlab.360.com/ddg-a-mining-botnet-aiming-at-database-server\"\n        date = \"2020-5-13\"\n\n   strings:\n      $s1 = \"/i.sh\"\n      $s2 = \"/ddgs\"\n\n      $c1 = \"/var/spool/cron/root\"\n      $c2 = \"crontab -\"\n\n   condition:\n      ( filesize < 50KB ) and ( all of ($s*) ) and ( 1 of ($c*) )\n}\n\n// v5000以上版本的规则\nrule linux_miner_ddg_script_v5\n{\n    meta:\n      description = \"ddg shell script v5000+\"\n      author = \"G4rb3n\"\n      reference = \"https://blog.netlab.360.com/ddg-upgrade-to-new-p2p-hybrid-model\"\n      date = \"2020-5-13\"\n      url = \"http://67.205.168.20:8000/i.sh\"\n      md5_v5023 = \"FE0D7BCF06779EF0CC6702FBB7C330E7\"\n      md5_v5019 = \"D6F402F6DCB75EA1A81A7C596CDA50C5\"\n\n   strings:\n      $s1 = \"/i.sh\"\n      $s2 = /\\/50[0-9]{2}\\/ddgs.+/\n\n      $c1 = \"/var/spool/cron/root\"\n      $c2 = \"crontab -\"\n\n   condition:\n        ( filesize < 50KB ) and ( all of ($s*) ) and ( 1 of ($c*) )\n}"
  },
  {
    "path": "rules/malware/h2miner.yar",
    "content": "// H2Miner脚本通配规则\nrule linux_miner_h2miner_script_gen\n{\n    meta:\n        description = \"h2miner script general\"\n        author = \"G4rb3n\"\n        reference = \"https://mp.weixin.qq.com/s/iNq8SdTZ9IrttAoQYLJw5A\"\n        date = \"2020-7-31\"\n        md5_2001 = \"A626C7274F51C55FDFF1F398BB10BAD5\"\n        md5_2005 = \"E600632DA9A710BBA3C53C1DFDD7BAC1\"\n        md5_2007 = \"BE17040E1A4EAF7E2DF8C0273FF2DFD2\"\n        md5_2008 = \"69886742CF56F9FC97B97DF0A19FC8F0\"\n\n   strings:\n      $s1 = \"echo \\\"P OK\\\"\"\n      $s2 = \"echo \\\"T DIR $DIR\\\"\"\n      $s3 = \"echo \\\"No md5sum\\\"\"\n      $s4 = \"echo \\\"P NOT EXISTS\\\"\"\n      $s5 = \"case $sum in\"\n      \n      $x1 = \"ulimit -n 65535\"\n      $x2 = \"https://bitbucket.org\"\n\n      $c1 = \"kingsing\"\n      $c2 = \"salt-store\"\n      $c3 = \"195.3.146.118\"\n      $c4 = \"217.12.210.192\"\n\n   condition:\n      ( filesize < 50KB ) and ( ( 4 of ($s*) ) and ( ( 2 of ($x*) ) or ( 2 of ($c*) ) ) )\n}"
  },
  {
    "path": "rules/malware/lsdminer.yar",
    "content": "// LSDMiner脚本通配规则\nrule linux_miner_lsdminer_script_gen\n{\n    meta:\n        description = \"lsdminer script general\"\n        author = \"G4rb3n\"\n        reference = \"https://www.anquanke.com/post/id/193116\"\n        date = \"2020-5-21\"\n\n   strings:\n      $s1 = \"hwlh3wlh44lh\"\n      $s2 = \"Circle_MI\"\n      $s3 = \"thyrsi.com\"\n      $s4 = \"img.sobot.com\"\n      $s5 = \"cdn.xiaoduoai.com\"\n      $s6 = \"res.cloudinary.com\"\n      $s7 = \"pastebin.com\"\n      $s8 = \"user-images.githubusercontent.com\"\n\n   condition:\n      ( filesize < 50KB ) and ( 4 of ($s*) )\n}"
  },
  {
    "path": "rules/malware/rainbowminer.yar",
    "content": "// StartMiner脚本通配规则\nrule linux_miner_rainbowminer_script_gen\n{\n    meta:\n        description = \"rainbowminer script general\"\n        author = \"G4rb3n\"\n        reference = \"https://mp.weixin.qq.com/s/KUK2hW7oRA2hN_cJ5QaYUA\"\n        date = \"2020-5-21\"\n\n   strings:\n      $s1 = \"=\\\"/lib64/\"\n      $s2 = \"pdflushType=\\\"\"\n      $s3 = \"kthreadds\"\n      $s4 = \"processhider\"\n      $s5 = \"paDKiUwmHNUSW7E1S18Cl\"    // ssh公钥片段\n      $s6 = \"cron.py\"\n      $s7 = \"/pdflushs\"\n      \n      $x1 = \"Rainbow66\"\n      $x2 = \"47.106.187.104\"\n\n   condition:\n      ( filesize < 50KB ) and ( ( 4 of ($s*) ) or ( 1 of ($x*) ) )\n}"
  },
  {
    "path": "rules/malware/skipmap.yar",
    "content": "// SkipMap脚本通配规则\nrule linux_miner_skipmap_script_gen\n{\n    meta:\n        description = \"skipmap shell script general\"\n        author = \"G4rb3n\"\n        reference = \"https://blog.trendmicro.com/trendlabs-security-intelligence/skidmap-linux-malware-uses-rootkit-capabilities-to-hide-cryptocurrency-mining-payload\"\n        date = \"2020-8-7\"\n\n   strings:\n      $s1 = \"chmod +x /var/lib/\"\n      $s2 = \"/bin/get\"\n      $s3 = \"/bin/cur\"\n\n      $c1 = \"pm.ipfswallet.tk\"\n      $c2 = \"a.powerofwish.com\"\n\n   condition:\n      ( filesize < 10KB ) and ( all of ($s*) ) and ( 1 of ($c*) )\n}"
  },
  {
    "path": "rules/malware/startminer.yar",
    "content": "// StartMiner脚本通配规则\nrule linux_miner_startminer_script_gen\n{\n    meta:\n        description = \"startminer script general\"\n        author = \"G4rb3n\"\n        reference = \"https://s.tencent.com/research/report/978.html\"\n        date = \"2020-5-20\"\n\n   strings:\n      $s1 = \"echo \\\"P OK\\\"\"\n      $s2 = \"echo \\\"T DIR $DIR\\\"\"\n      $s3 = \"echo \\\"No md5sum\\\"\"\n      $s4 = \"echo \\\"P NOT EXISTS\\\"\"\n      $s5 = \"case $sum in\"\n      \n      $x1 = \"f2=\\\"\"\n      $x2 = \"downloadIfNeed()\"\n      $x3 = \"judge()\"\n      $x4 = \"judge2()\"\n      $x5 = \"start.jpg\"\n\n      $c1 = \"jukesxdbrxd.xyz\"\n      $c2 = \"37.44.212.223\"\n      $c3 = \"107.189.11.170\"\n\n   condition:\n      ( filesize < 50KB ) and ( ( 4 of ($s*) ) and ( ( 2 of ($x*) ) or ( 1 of ($c*) ) ) )\n}\n\n"
  },
  {
    "path": "rules/malware/sysupdataminer.yar",
    "content": "// SysUpdataMiner脚本通配规则\nrule linux_miner_sysupdataminer_script_gen\n{\n    meta:\n        description = \"sysupdataminer script general\"\n        author = \"G4rb3n\"\n        reference = \"https://www.freebuf.com/articles/system/172987.html\"\n        date = \"2020-6-4\"\n\n   strings:\n      $s1 = \"miner_url\"\n      $s2 = \"miner_size\"\n      $s3 = \"sh_url\"\n      $s4 = \"config_url\"\n      $s5 = \"config_size\"\n      $s6 = \"scan_url\"\n      $s7 = \"scan_size\"\n      $s8 = \"watchdog_url\"\n      $s9 = \"watchdog_size\"\n      \n      $x1 = \"/etc/update.sh\"\n      $x2 = \"/etc/sysupdate\"\n      $x3 = \"/etc/networkservice\"\n      $x4 = \"/usr/bin/cur\" fullword ascii\n      $x5 = \"/usr/bin/wge\" fullword ascii\n\n      $c1 = \"185.181.10.234\"\n      $c2 = \"de.gsearch.com.de\"\n      $c3 = \"AAAAB3NzaC1yc2EAAAADAQABAAABAQC9WKiJ7yQ6HcafmwzDMv1RKxPdJI\"\n\n   condition:\n      ( filesize < 50KB ) and ( ( ( 3 of ($s*) ) or ( 2 of ($x*) ) ) and ( 2 of ($c*) ) )\n}"
  },
  {
    "path": "rules/malware/teamtnt.yar",
    "content": "// TeamTNT脚本通配规则\nrule linux_miner_teamtnt_script_gen\n{\n    meta:\n        description = \"teamtnt shell script general\"\n        author = \"G4rb3n\"\n        reference = \"https://x.threatbook.cn/nodev4/vb4/article?threatInfoID=2813\"\n        date = \"2020-8-8\"\n        md5_2008 = \"BE5B1BE30CF430AF6F76776FEBE805F2\"\n        md5_2009 = \"856109FAFF327638BA3A8EC5800E988C\"\n\n   strings:\n      $s1 = \"LDR=\\\"wget -q -O -\\\"\"\n      $s2 = \"LDR=\\\"curl\\\"\"\n      $s3 = \"echo \\\"cron good\\\"\"\n      $s4 = \"echo \\\"setup cron\\\"\"\n      $s5 = \"downloadxmin()\"\n      $s6 = \"startxmin()\"\n      $s7 = \"setupmyapps()\"\n      $s8 = \"loadthisfile()\"\n      $s9 = \"uploadthersa()\"\n      $s10 = \"getsomelanssh()\"\n      $s11 = \"localgo()\"\n\n      $c1 = \"85.214.149.236\"\n\n   condition:\n      ( filesize < 10KB ) and ( 2 of ($s*) ) and ( 1 of ($c*) )\n}"
  },
  {
    "path": "rules/malware/watchbogminer.yar",
    "content": "// WatchBogMiner脚本通配规则\nrule linux_miner_watchbogminer_script_gen\n{\n    meta:\n        description = \"watchbogminer shell script general\"\n        author = \"G4rb3n\"\n        reference = \"https://s.tencent.com/research/report/1056.html\"\n        date = \"2020-8-17\"\n\n   strings:\n      $s1 = \"pastebin.com\"\n      $s2 = \"kill_miner_proc()\"\n      $s3 = \"gettarfile()\"\n      $s4 = \"base -d\"\n\n      $c1 = \"UhUmR517\"\n      $c2 = \"/JavaUpdates\"\n      $c3 = \"tmpdropoff\"\n\n   condition:\n      ( filesize < 50KB ) and ( 2 of ($s*) ) and ( 2 of ($c*) )\n}"
  },
  {
    "path": "rules/utils/wget.yar",
    "content": "rule wget {\r\n    meta:\r\n        author = \"yiansec\"\r\n    strings:\r\n        $url_regex = /wget https?:\\/\\// wide ascii\r\n    condition:\r\n        $url_regex\r\n}"
  },
  {
    "path": "rules/webshell.yar",
    "content": "/*\nyiansec\n2020.5.1\n*/\ninclude \"./webshells/WShell_APT_Laudanum.yar\"\ninclude \"./webshells/WShell_ASPXSpy.yar\"\ninclude \"./webshells/WShell_Drupalgeddon2_icos.yar\"\ninclude \"./webshells/WShell_PHP_Anuna.yar\"\ninclude \"./webshells/WShell_PHP_in_images.yar\"\ninclude \"./webshells/WShell_THOR_Webshells.yar\"\ninclude \"./webshells/WShell_Behinder.yar\"\n\n"
  },
  {
    "path": "rules/webshells/WShell_APT_Laudanum.yar",
    "content": "/*\n    This Yara ruleset is under the GNU-GPLv2 license (http://www.gnu.org/licenses/gpl-2.0.html) and open to any user or organization, as    long as you use it under this license.\n\n*/\nrule asp_file : webshell {\n\tmeta:\n\t\tdescription = \"Laudanum Injector Tools - file file.asp\"\n\t\tauthor = \"Florian Roth\"\n\t\treference = \"http://laudanum.inguardians.com/\"\n\t\tdate = \"2015-06-22\"\n\t\thash = \"ff5b1a9598735440bdbaa768b524c639e22f53c5\"\n\tstrings:\n\t\t$s1 = \"' *** Written by Tim Medin <tim@counterhack.com>\" fullword ascii\n\t\t$s2 = \"Response.BinaryWrite(stream.Read)\" fullword ascii\n\t\t$s3 = \"Response.Write(Response.Status & Request.ServerVariables(\\\"REMOTE_ADDR\\\"))\" fullword ascii /* PEStudio Blacklist: strings */\n\t\t$s4 = \"%><a href=\\\"<%=Request.ServerVariables(\\\"URL\\\")%>\\\">web root</a><br/><%\" fullword ascii /* PEStudio Blacklist: strings */\n\t\t$s5 = \"set folder = fso.GetFolder(path)\" fullword ascii\n\t\t$s6 = \"Set file = fso.GetFile(filepath)\" fullword ascii\n\tcondition:\n\t\tuint16(0) == 0x253c and filesize < 30KB and 5 of them\n}\n\nrule php_killnc : webshell {\n\tmeta:\n\t\tdescription = \"Laudanum Injector Tools - file killnc.php\"\n\t\tauthor = \"Florian Roth\"\n\t\treference = \"http://laudanum.inguardians.com/\"\n\t\tdate = \"2015-06-22\"\n\t\thash = \"c0dee56ee68719d5ec39e773621ffe40b144fda5\"\n\tstrings:\n\t\t$s1 = \"if ($_SERVER[\\\"REMOTE_ADDR\\\"] == $IP)\" fullword ascii /* PEStudio Blacklist: strings */\n\t\t$s2 = \"header(\\\"HTTP/1.0 404 Not Found\\\");\" fullword ascii\n\t\t$s3 = \"<?php echo exec('killall nc');?>\" fullword ascii /* PEStudio Blacklist: strings */\n\t\t$s4 = \"<title>Laudanum Kill nc</title>\" fullword ascii /* PEStudio Blacklist: strings */\n\t\t$s5 = \"foreach ($allowedIPs as $IP) {\" fullword ascii\n\tcondition:\n\t\tfilesize < 15KB and 4 of them\n}\n\nrule asp_shell : webshell {\n\tmeta:\n\t\tdescription = \"Laudanum Injector Tools - file shell.asp\"\n\t\tauthor = \"Florian Roth\"\n\t\treference = \"http://laudanum.inguardians.com/\"\n\t\tdate = \"2015-06-22\"\n\t\thash = \"8bf1ff6f8edd45e3102be5f8a1fe030752f45613\"\n\tstrings:\n\t\t$s1 = \"<form action=\\\"shell.asp\\\" method=\\\"POST\\\" name=\\\"shell\\\">\" fullword ascii /* PEStudio Blacklist: strings */\n\t\t$s2 = \"%ComSpec% /c dir\" fullword ascii /* PEStudio Blacklist: strings */\n\t\t$s3 = \"Set objCmd = wShell.Exec(cmd)\" fullword ascii /* PEStudio Blacklist: strings */\n\t\t$s4 = \"Server.ScriptTimeout = 180\" fullword ascii /* PEStudio Blacklist: strings */\n\t\t$s5 = \"cmd = Request.Form(\\\"cmd\\\")\" fullword ascii /* PEStudio Blacklist: strings */\n\t\t$s6 = \"' ***  http://laudanum.secureideas.net\" fullword ascii\n\t\t$s7 = \"Dim wshell, intReturn, strPResult\" fullword ascii /* PEStudio Blacklist: strings */\n\tcondition:\n\t\tfilesize < 15KB and 4 of them\n}\n\nrule settings : webshell {\n\tmeta:\n\t\tdescription = \"Laudanum Injector Tools - file settings.php\"\n\t\tauthor = \"Florian Roth\"\n\t\treference = \"http://laudanum.inguardians.com/\"\n\t\tdate = \"2015-06-22\"\n\t\thash = \"588739b9e4ef2dbb0b4cf630b73295d8134cc801\"\n\tstrings:\n\t\t$s1 = \"Port: <input name=\\\"port\\\" type=\\\"text\\\" value=\\\"8888\\\">\" fullword ascii /* PEStudio Blacklist: strings */\n\t\t$s2 = \"<li>Reverse Shell - \" fullword ascii /* PEStudio Blacklist: strings */\n\t\t$s3 = \"<li><a href=\\\"<?php echo plugins_url('file.php', __FILE__);?>\\\">File Browser</a>\" ascii /* PEStudio Blacklist: strings */\n\tcondition:\n\t\tfilesize < 13KB and all of them\n}\n\nrule asp_proxy : webshell {\n\tmeta:\n\t\tdescription = \"Laudanum Injector Tools - file proxy.asp\"\n\t\tauthor = \"Florian Roth\"\n\t\treference = \"http://laudanum.inguardians.com/\"\n\t\tdate = \"2015-06-22\"\n\t\thash = \"51e97040d1737618b1775578a772fa6c5a31afd8\"\n\tstrings:\n\t\t$s1 = \"'response.write \\\"<br/>  -value:\\\" & request.querystring(key)(j)\" fullword ascii /* PEStudio Blacklist: strings */\n\t\t$s2 = \"q = q & \\\"&\\\" & key & \\\"=\\\" & request.querystring(key)(j)\" fullword ascii /* PEStudio Blacklist: strings */\n\t\t$s3 = \"for each i in Split(http.getAllResponseHeaders, vbLf)\" fullword ascii\n\t\t$s4 = \"'urlquery = mid(urltemp, instr(urltemp, \\\"?\\\") + 1)\" fullword ascii /* PEStudio Blacklist: strings */\n\t\t$s5 = \"s = urlscheme & urlhost & urlport & urlpath\" fullword ascii /* PEStudio Blacklist: strings */\n\t\t$s6 = \"Set http = Server.CreateObject(\\\"Microsoft.XMLHTTP\\\")\" fullword ascii /* PEStudio Blacklist: strings */\n\tcondition:\n\t\tfilesize < 50KB and all of them\n}\n\nrule cfm_shell : webshell {\n\tmeta:\n\t\tdescription = \"Laudanum Injector Tools - file shell.cfm\"\n\t\tauthor = \"Florian Roth\"\n\t\treference = \"http://laudanum.inguardians.com/\"\n\t\tdate = \"2015-06-22\"\n\t\thash = \"885e1783b07c73e7d47d3283be303c9719419b92\"\n\tstrings:\n\t\t$s1 = \"Executable: <Input type=\\\"text\\\" name=\\\"cmd\\\" value=\\\"cmd.exe\\\"><br>\" fullword ascii /* PEStudio Blacklist: strings */\n\t\t$s2 = \"<cfif ( #suppliedCode# neq secretCode )>\" fullword ascii /* PEStudio Blacklist: strings */\n\t\t$s3 = \"<cfif IsDefined(\\\"form.cmd\\\")>\" fullword ascii\n\tcondition:\n\t\tfilesize < 20KB and 2 of them\n}\n\nrule aspx_shell  : webshell{\n\tmeta:\n\t\tdescription = \"Laudanum Injector Tools - file shell.aspx\"\n\t\tauthor = \"Florian Roth\"\n\t\treference = \"http://laudanum.inguardians.com/\"\n\t\tdate = \"2015-06-22\"\n\t\thash = \"076aa781a004ecb2bf545357fd36dcbafdd68b1a\"\n\tstrings:\n\t\t$s1 = \"remoteIp = HttpContext.Current.Request.Headers[\\\"X-Forwarded-For\\\"].Split(new\" ascii /* PEStudio Blacklist: strings */\n\t\t$s2 = \"remoteIp = Request.UserHostAddress;\" fullword ascii /* PEStudio Blacklist: strings */\n\t\t$s3 = \"<form method=\\\"post\\\" name=\\\"shell\\\">\" fullword ascii /* PEStudio Blacklist: strings */\n\t\t$s4 = \"<body onload=\\\"document.shell.c.focus()\\\">\" fullword ascii /* PEStudio Blacklist: strings */\n\tcondition:\n\t\tfilesize < 20KB and all of them\n}\n\nrule php_shell  : webshell{\n\tmeta:\n\t\tdescription = \"Laudanum Injector Tools - file shell.php\"\n\t\tauthor = \"Florian Roth\"\n\t\treference = \"http://laudanum.inguardians.com/\"\n\t\tdate = \"2015-06-22\"\n\t\thash = \"dc5c03a21267d024ef0f5ab96a34e3f6423dfcd6\"\n\tstrings:\n\t\t$s1 = \"command_hist[current_line] = document.shell.command.value;\" fullword ascii /* PEStudio Blacklist: strings */\n\t\t$s2 = \"if (e.keyCode == 38 && current_line < command_hist.length-1) {\" fullword ascii /* PEStudio Blacklist: strings */\n\t\t$s3 = \"array_unshift($_SESSION['history'], $command);\" fullword ascii /* PEStudio Blacklist: strings */\n\t\t$s4 = \"if (preg_match('/^[[:blank:]]*cd[[:blank:]]*$/', $command)) {\" fullword ascii /* PEStudio Blacklist: strings */\n\tcondition:\n\t\tfilesize < 40KB and all of them\n}\n\nrule php_reverse_shell : webshell {\n\tmeta:\n\t\tdescription = \"Laudanum Injector Tools - file php-reverse-shell.php\"\n\t\tauthor = \"Florian Roth\"\n\t\treference = \"http://laudanum.inguardians.com/\"\n\t\tdate = \"2015-06-22\"\n\t\thash = \"3ef03bbe3649535a03315dcfc1a1208a09cea49d\"\n\tstrings:\n\t\t$s1 = \"$process = proc_open($shell, $descriptorspec, $pipes);\" fullword ascii /* PEStudio Blacklist: strings */\n\t\t$s2 = \"printit(\\\"Successfully opened reverse shell to $ip:$port\\\");\" fullword ascii /* PEStudio Blacklist: strings */\n\t\t$s3 = \"$input = fread($pipes[1], $chunk_size);\" fullword ascii /* PEStudio Blacklist: strings */\n\tcondition:\n\t\tfilesize < 15KB and all of them\n}\n\nrule php_dns  : webshell{\n\tmeta:\n\t\tdescription = \"Laudanum Injector Tools - file dns.php\"\n\t\tauthor = \"Florian Roth\"\n\t\treference = \"http://laudanum.inguardians.com/\"\n\t\tdate = \"2015-06-22\"\n\t\thash = \"01d5d16d876c55d77e094ce2b9c237de43b21a16\"\n\tstrings:\n\t\t$s1 = \"$query = isset($_POST['query']) ? $_POST['query'] : '';\" fullword ascii /* PEStudio Blacklist: strings */\n\t\t$s2 = \"$result = dns_get_record($query, $types[$type], $authns, $addtl);\" fullword ascii /* PEStudio Blacklist: strings */\n\t\t$s3 = \"if ($_SERVER[\\\"REMOTE_ADDR\\\"] == $IP)\" fullword ascii /* PEStudio Blacklist: strings */\n\t\t$s4 = \"foreach (array_keys($types) as $t) {\" fullword ascii\n\tcondition:\n\t\tfilesize < 15KB and all of them\n}\n\nrule WEB_INF_web  : webshell{\n\tmeta:\n\t\tdescription = \"Laudanum Injector Tools - file web.xml\"\n\t\tauthor = \"Florian Roth\"\n\t\treference = \"http://laudanum.inguardians.com/\"\n\t\tdate = \"2015-06-22\"\n\t\thash = \"0251baed0a16c451f9d67dddce04a45dc26cb4a3\"\n\tstrings:\n\t\t$s1 = \"<servlet-name>Command</servlet-name>\" fullword ascii /* PEStudio Blacklist: strings */\n\t\t$s2 = \"<jsp-file>/cmd.jsp</jsp-file>\" fullword ascii\n\tcondition:\n\t\tfilesize < 1KB and all of them\n}\n\nrule jsp_cmd : webshell {\n\tmeta:\n\t\tdescription = \"Laudanum Injector Tools - file cmd.war\"\n\t\tauthor = \"Florian Roth\"\n\t\treference = \"http://laudanum.inguardians.com/\"\n\t\tdate = \"2015-06-22\"\n\t\thash = \"55e4c3dc00cfab7ac16e7cfb53c11b0c01c16d3d\"\n\tstrings:\n\t\t$s0 = \"cmd.jsp}\" fullword ascii\n\t\t$s1 = \"cmd.jspPK\" fullword ascii\n\t\t$s2 = \"WEB-INF/web.xml\" fullword ascii /* Goodware String - occured 1 times */\n\t\t$s3 = \"WEB-INF/web.xmlPK\" fullword ascii /* Goodware String - occured 1 times */\n\t\t$s4 = \"META-INF/MANIFEST.MF\" fullword ascii /* Goodware String - occured 12 times */\n\tcondition:\n\t\tuint16(0) == 0x4b50 and filesize < 2KB and all of them\n}\n\nrule laudanum : webshell {\n\tmeta:\n\t\tdescription = \"Laudanum Injector Tools - file laudanum.php\"\n\t\tauthor = \"Florian Roth\"\n\t\treference = \"http://laudanum.inguardians.com/\"\n\t\tdate = \"2015-06-22\"\n\t\thash = \"fd498c8b195967db01f68776ff5e36a06c9dfbfe\"\n\tstrings:\n\t\t$s1 = \"public function __activate()\" fullword ascii\n\t\t$s2 = \"register_activation_hook(__FILE__, array('WP_Laudanum', 'activate'));\" fullword ascii /* PEStudio Blacklist: strings */\n\tcondition:\n\t\tfilesize < 5KB and all of them\n}\n\nrule php_file  : webshell{\n\tmeta:\n\t\tdescription = \"Laudanum Injector Tools - file file.php\"\n\t\tauthor = \"Florian Roth\"\n\t\treference = \"http://laudanum.inguardians.com/\"\n\t\tdate = \"2015-06-22\"\n\t\thash = \"7421d33e8007c92c8642a36cba7351c7f95a4335\"\n\tstrings:\n\t\t$s1 = \"$allowedIPs =\" fullword ascii /* PEStudio Blacklist: strings */\n\t\t$s2 = \"<a href=\\\"<?php echo $_SERVER['PHP_SELF']  ?>\\\">Home</a><br/>\" fullword ascii /* PEStudio Blacklist: strings */\n\t\t$s3 = \"$dir  = isset($_GET[\\\"dir\\\"])  ? $_GET[\\\"dir\\\"]  : \\\".\\\";\" fullword ascii\n\t\t$s4 = \"$curdir .= substr($curdir, -1) != \\\"/\\\" ? \\\"/\\\" : \\\"\\\";\" fullword ascii\n\tcondition:\n\t\tfilesize < 10KB and all of them\n}\n\nrule warfiles_cmd : webshell {\n\tmeta:\n\t\tdescription = \"Laudanum Injector Tools - file cmd.jsp\"\n\t\tauthor = \"Florian Roth\"\n\t\treference = \"http://laudanum.inguardians.com/\"\n\t\tdate = \"2015-06-22\"\n\t\thash = \"3ae3d837e7b362de738cf7fad78eded0dccf601f\"\n\tstrings:\n\t\t$s1 = \"Process p = Runtime.getRuntime().exec(request.getParameter(\\\"cmd\\\"));\" fullword ascii /* PEStudio Blacklist: strings */\n\t\t$s2 = \"out.println(\\\"Command: \\\" + request.getParameter(\\\"cmd\\\") + \\\"<BR>\\\");\" fullword ascii /* PEStudio Blacklist: strings */\n\t\t$s3 = \"<FORM METHOD=\\\"GET\\\" NAME=\\\"myform\\\" ACTION=\\\"\\\">\" fullword ascii\n\t\t$s4 = \"String disr = dis.readLine();\" fullword ascii\n\tcondition:\n\t\tfilesize < 2KB and all of them\n}\n\nrule asp_dns  : webshell{\n\tmeta:\n\t\tdescription = \"Laudanum Injector Tools - file dns.asp\"\n\t\tauthor = \"Florian Roth\"\n\t\treference = \"http://laudanum.inguardians.com/\"\n\t\tdate = \"2015-06-22\"\n\t\thash = \"5532154dd67800d33dace01103e9b2c4f3d01d51\"\n\tstrings:\n\t\t$s1 = \"command = \\\"nslookup -type=\\\" & qtype & \\\" \\\" & query \" fullword ascii /* PEStudio Blacklist: strings */\n\t\t$s2 = \"Set objCmd = objWShell.Exec(command)\" fullword ascii /* PEStudio Blacklist: strings */\n\t\t$s3 = \"Response.Write command & \\\"<br>\\\"\" fullword ascii /* PEStudio Blacklist: strings */\n\t\t$s4 = \"<form name=\\\"dns\\\" method=\\\"POST\\\">\" fullword ascii /* PEStudio Blacklist: strings */\n\tcondition:\n\t\tfilesize < 21KB and all of them\n}\n\nrule php_reverse_shell_2  : webshell{\n\tmeta:\n\t\tdescription = \"Laudanum Injector Tools - file php-reverse-shell.php\"\n\t\tauthor = \"Florian Roth\"\n\t\treference = \"http://laudanum.inguardians.com/\"\n\t\tdate = \"2015-06-22\"\n\t\thash = \"025db3c3473413064f0606d93d155c7eb5049c42\"\n\tstrings:\n\t\t$s1 = \"$process = proc_open($shell, $descriptorspec, $pipes);\" fullword ascii /* PEStudio Blacklist: strings */\n\t\t$s7 = \"$shell = 'uname -a; w; id; /bin/sh -i';\" fullword ascii /* PEStudio Blacklist: strings */\n\tcondition:\n\t\tfilesize < 10KB and all of them\n}\n\nrule Laudanum_Tools_Generic  : webshell Toolkit{\n\tmeta:\n\t\tdescription = \"Laudanum Injector Tools\"\n\t\tauthor = \"Florian Roth\"\n\t\treference = \"http://laudanum.inguardians.com/\"\n\t\tdate = \"2015-06-22\"\n\t\tsuper_rule = 1\n\t\thash0 = \"076aa781a004ecb2bf545357fd36dcbafdd68b1a\"\n\t\thash1 = \"885e1783b07c73e7d47d3283be303c9719419b92\"\n\t\thash2 = \"01d5d16d876c55d77e094ce2b9c237de43b21a16\"\n\t\thash3 = \"7421d33e8007c92c8642a36cba7351c7f95a4335\"\n\t\thash4 = \"f49291aef9165ee4904d2d8c3cf5a6515ca0794f\"\n\t\thash5 = \"c0dee56ee68719d5ec39e773621ffe40b144fda5\"\n\t\thash6 = \"f32b9c2cc3a61fa326e9caebce28ef94a7a00c9a\"\n\t\thash7 = \"dc5c03a21267d024ef0f5ab96a34e3f6423dfcd6\"\n\t\thash8 = \"fd498c8b195967db01f68776ff5e36a06c9dfbfe\"\n\t\thash9 = \"b50ae35fcf767466f6ca25984cc008b7629676b8\"\n\t\thash10 = \"5570d10244d90ef53b74e2ac287fc657e38200f0\"\n\t\thash11 = \"42bcb491a11b4703c125daf1747cf2a40a1b36f3\"\n\t\thash12 = \"83e4eaaa2cf6898d7f83ab80158b64b1d48096f4\"\n\t\thash13 = \"dec7ea322898690a7f91db9377f035ad7072b8d7\"\n\t\thash14 = \"a2272b8a4221c6cc373915f0cc555fe55d65ac4d\"\n\t\thash15 = \"588739b9e4ef2dbb0b4cf630b73295d8134cc801\"\n\t\thash16 = \"43320dc23fb2ed26b882512e7c0bfdc64e2c1849\"\n\tstrings:\n\t\t$s1 = \"***  laudanum@secureideas.net\" fullword ascii\n\t\t$s2 = \"*** Laudanum Project\" fullword ascii\n\tcondition:\n\t\tfilesize < 60KB and all of them\n}\n"
  },
  {
    "path": "rules/webshells/WShell_ASPXSpy.yar",
    "content": "/*\n    This Yara ruleset is under the GNU-GPLv2 license (http://www.gnu.org/licenses/gpl-2.0.html) and open to any user or organization, as long as you use it under this license.\n*/\n\nrule ASPXSpy\n{\n    meta:\n    description= \"Detect ASPXSpy\"\n    author = \"xylitol@temari.fr\"\n    date = \"2019-02-26\"\n    // May only the challenge guide you\n    strings:\n    $string1 = \"CmdShell\" wide ascii\n    $string2 = \"ADSViewer\" wide ascii\n    $string3 = \"ASPXSpy.Bin\" wide ascii\n    $string4 = \"PortScan\" wide ascii\n    $plugin = \"Test.AspxSpyPlugins\" wide ascii\n \n    condition:\n    3 of ($string*) or $plugin\n}\n"
  },
  {
    "path": "rules/webshells/WShell_Behinder.yar",
    "content": "rule Behinder_aspx {\n   meta:\n      description = \"Behinder - file shell.aspx\"\n      author = \"yarGen Rule Generator\"\n      reference = \"https://github.com/Neo23x0/yarGen\"\n      date = \"2021-08-26\"\n      hash1 = \"224c7f43f72938e44b4f164c1c899c398a9c099a92c6d084856f5e227761e3b0\"\n   strings:\n      $x1 = \"<%@ Page Language=\\\"C#\\\" %><%@Import Namespace=\\\"System.Reflection\\\"%><%Session.Add(\\\"k\\\",;\" ascii\n      $s3 = \"ssion[0] + \\\"\\\"),c = Request.BinaryRead(Request.ContentLength);Assembly.Load(new System.Security.Cryptography.RijndaelManaged().\" ascii\n      $s4 = \"eateDecryptor(k, k).TransformFinalBlock(c, 0, c.Length)).CreateInstance(\\\"U\\\").Equals(this);%>\" fullword ascii\n   condition:\n      uint16(0) == 0x253c and filesize < 1KB and\n      1 of ($x*) and all of them\n}\n\nrule Behinder_php {\n   meta:\n      description = \"Behinder - file shell.php\"\n      author = \"yarGen Rule Generator\"\n      reference = \"https://github.com/Neo23x0/yarGen\"\n      date = \"2021-08-26\"\n      hash1 = \"3566561d818e868a96f2bc8db9c93663a4fb81c06041259f66d04147d50ce8ab\"\n   strings:\n      $s1 = \"$post=openssl_decrypt($post, \\\"AES128\\\", $key);\" fullword ascii\n      $s2 = \"$post=file_get_contents(\\\"php://input\\\");\" fullword ascii\n      $s3 = \" $post[$i] = $post[$i]^$key[$i+1&15]; \" fullword ascii\n      $s4 = \"$_SESSION['k']=$key;\" fullword ascii\n      $s5 = \"@error_reporting(0);\" fullword ascii\n      $s6 = \"$post=$t($post.\\\"\\\");\" fullword ascii\n      $s7 = \"for($i=0;$i<strlen($post);$i++) {\" fullword ascii\n      $s8 = \"$t=\\\"base64_\\\".\\\"decode\\\";\" fullword ascii\n      $s9 = \"if(!extension_loaded('openssl'))\" fullword ascii\n      $s10 = \"    $arr=explode('|',$post);\" fullword ascii\n      $s11 = \"class C{public function __invoke($p) {eval($p.\\\"\\\");}}\" fullword ascii\n   condition:\n      uint16(0) == 0x3f3c and filesize < 1KB and\n      8 of them\n}\n\nrule shell_jspx {\n   meta:\n      description = \"Behinder - file shell.jspx.jsp\"\n      author = \"yarGen Rule Generator\"\n      reference = \"https://github.com/Neo23x0/yarGen\"\n      date = \"2021-08-26\"\n      hash1 = \"a8d79695c9b23ad3a157f112863144fd8a196aae5c3fcb4e52b0ab4d1bf64367\"\n   strings:\n      $x1 = \"<jsp:root xmlns:jsp=\\\"http://java.sun.com/JSP/Page\\\" version=\\\"1.2\\\"><jsp:directive.page import=\\\"java.util.*,javax.crypto.*,jav\" ascii\n      $s2 = \";c.init(2,new SecretKeySpec((session.getValue(\\\"u\\\")+\\\"\\\").getBytes(),\\\"AES\\\"));new U(this.getClass().getClassLoader()).g(c.doFi\" ascii\n      $s3 = \"<jsp:root xmlns:jsp=\\\"http://java.sun.com/JSP/Page\\\" version=\\\"1.2\\\"><jsp:directive.page import=\\\"java.util.*,javax.crypto.*,jav\" ascii\n      $s4 = \"ypto.spec.*\\\"/><jsp:declaration> class U extends ClassLoader{U(ClassLoader c){super(c);}public Class g(byte []b){return super.de\" ascii\n      $s5 = \"w sun.misc.BASE64Decoder().decodeBuffer(request.getReader().readLine()))).newInstance().equals(pageContext);</jsp:scriptlet></js\" ascii\n      $s6 = \"session.putValue(\\\"u\\\",k);Cipher c=Cipher.getInstance(\\\"\" ascii\n      $s7 = \"p:root>\" fullword ascii\n   condition:\n      uint16(0) == 0x6a3c and filesize < 1KB and\n      1 of ($x*) and all of them\n}\n\nrule Behinder_asp {\n   meta:\n      description = \"Behinder - file shell.asp\"\n      author = \"yarGen Rule Generator\"\n      reference = \"https://github.com/Neo23x0/yarGen\"\n      date = \"2021-08-26\"\n      hash1 = \"2c87faf7c25688c83c86c8b1e9f706f98a4195b84d1f5ce3169de6f2997320f7\"\n   strings:\n      $s1 = \"content=Request.BinaryRead(size)\" fullword ascii\n      $s2 = \"execute(result)\" fullword ascii\n      $s3 = \"result=result&Chr(ascb(midb(content,i,1)) Xor Asc(Mid(k,(i and 15)+1,1)))\" fullword ascii\n      $s4 = \"Session(\\\"k\\\")=k\" fullword ascii\n      $s5 = \"Response.CharSet = \\\"UTF-8\\\" \" fullword ascii\n      $s6 = \"size=Request.TotalBytes\" fullword ascii\n      $s7 = \"For i=1 To size\" fullword ascii\n   condition:\n      uint16(0) == 0x253c and filesize < 1KB and\n      all of them\n}\n\nrule Behinder_jsp {\n   meta:\n      description = \"Behinder - file shell.jsp\"\n      author = \"yarGen Rule Generator\"\n      reference = \"https://github.com/Neo23x0/yarGen\"\n      date = \"2021-08-26\"\n      hash1 = \"5c8c2d64aef4e586b077b5fde7d8fc3aea16ae9d15438b516ec277c42a7164a5\"\n   strings:\n      $x1 = \"<%@page import=\\\"java.util.*,javax.crypto.*,javax.crypto.spec.*\\\"%><%!class U extends ClassLoader{U(ClassLoader c){super(c);}pub\" ascii\n      $s2 = \"ader()).g(c.doFinal(new sun.misc.BASE64Decoder().decodeBuffer(request.getReader().readLine()))).newInstance().equals(pageContext\" ascii\n      $s3 = \"<%@page import=\\\"java.util.*,javax.crypto.*,javax.crypto.spec.*\\\"%><%!class U extends ClassLoader{U(ClassLoader c){super(c);}pub\" ascii\n      $s4 = \"c Class g(byte []b){return super.defineClass(b,0,b.length);}}%><%if (request.getMethod().equals(\\\"POST\\\"))\" ascii\n      $s5 = \"Value(\\\"u\\\",k);Cipher c=Cipher.getInstance(\\\"AES\\\");c.init(2,new SecretKeySpec(k.getBytes(),\\\"AES\\\"));new U(this.getClass().getC\" ascii\n   condition:\n      uint16(0) == 0x253c and filesize < 1KB and\n      1 of ($x*) and all of them\n}\n\nrule shell_java9 {\n   meta:\n      description = \"Behinder - file shell_java9.jsp\"\n      author = \"yarGen Rule Generator\"\n      reference = \"https://github.com/Neo23x0/yarGen\"\n      date = \"2021-08-26\"\n      hash1 = \"cfd86cc11928d594f4ccfb6be371a09383f83bbe82d4d6d86703f5fa6b5233f2\"\n   strings:\n      $x1 = \"<%@page import=\\\"java.util.*,javax.crypto.*,javax.crypto.spec.*\\\"%><%!class U extends ClassLoader{U(ClassLoader c){super(c);}pub\" ascii\n      $s2 = \"ader()).g(c.doFinal(Base64.getDecoder().decode(request.getReader().readLine()))).newInstance().equals(pageContext);}%>\" fullword ascii\n      $s3 = \"<%@page import=\\\"java.util.*,javax.crypto.*,javax.crypto.spec.*\\\"%><%!class U extends ClassLoader{U(ClassLoader c){super(c);}pub\" ascii\n      $s4 = \"c Class g(byte []b){return super.defineClass(b,0,b.length);}}%><%if (request.getMethod().equals(\\\"POST\\\")){String k=\" ascii\n      $s5 = \"Value(\\\"u\\\",k);Cipher c=Cipher.getInstance(\\\"AES\\\");c.init(2,new SecretKeySpec(k.getBytes(),\\\"AES\\\"));new U(this.getClass().getC\" ascii\n   condition:\n      uint16(0) == 0x253c and filesize < 1KB and\n      1 of ($x*) and all of them\n}\n\n\n"
  },
  {
    "path": "rules/webshells/WShell_Drupalgeddon2_icos.yar",
    "content": "/*\nThis Yara ruleset is under the GNU-GPLv2 license \n(http://www.gnu.org/licenses/gpl-2.0.html) and open to any user or \norganization, as long as you use it under this license.\n*/\n\n/*\nAuthor: Luis Fueris \nDate: 4 october, 2019\nDescription: Drupalgeddon 2 - Web Shells Extract. This rules matchs with\nwebshells that inserts the Drupal core vulnerability SA-CORE-2018-002 \n(https://www.drupal.org/sa-core-2018-002)\n*/\n\nrule Dotico_PHP_webshell : webshell {\n    meta:\n        description = \".ico PHP webshell - file <eight-num-letter-chars>.ico\"\n        author = \"Luis Fueris\"\n        reference = \"https://rankinstudio.com/Drupal_ico_index_hack\"\n        date = \"2019/12/04\"\n    strings:\n        $php = \"<?php\" ascii\n        $regexp = /basename\\/\\*[a-z0-9]{,6}\\*\\/\\(\\/\\*[a-z0-9]{,5}\\*\\/trim\\/\\*[a-z0-9]{,5}\\*\\/\\(\\/\\*[a-z0-9]{,5}\\*\\//\n    condition:\n        $php at 0 and $regexp and filesize > 70KB and filesize < 110KB\n}\n"
  },
  {
    "path": "rules/webshells/WShell_PHP_Anuna.yar",
    "content": "/*\n    I first found this in May 2016, appeared in every PHP file on the\n    server, cleaned it with `sed` and regex magic. Second time was\n    in June 2016, same decoded content, different encoding/naming.\n\n    https://www.symantec.com/security_response/writeup.jsp?docid=2015-111911-4342-99\n*/\nrule php_anuna\n{\n    meta:\n        author      = \"Vlad https://github.com/vlad-s\"\n        date        = \"2016/07/18\"\n        description = \"Catches a PHP Trojan\"\n    strings:\n        $a = /<\\?php \\$[a-z]+ = '/\n        $b = /\\$[a-z]+=explode\\(chr\\(\\([0-9]+[-+][0-9]+\\)\\)/\n        $c = /\\$[a-z]+=\\([0-9]+[-+][0-9]+\\)/\n        $d = /if \\(!function_exists\\('[a-z]+'\\)\\)/\n    condition:\n        all of them\n}\n"
  },
  {
    "path": "rules/webshells/WShell_PHP_in_images.yar",
    "content": "/*\n    Finds PHP code in JP(E)Gs, GIFs, PNGs.\n    Magic numbers via Wikipedia.\n*/\nrule php_in_image\n{\n    meta:\n        author      = \"Vlad https://github.com/vlad-s\"\n        date        = \"2016/07/18\"\n        description = \"Finds image files w/ PHP code in images\"\n    strings:\n        $gif = /^GIF8[79]a/\n        $jfif = { ff d8 ff e? 00 10 4a 46 49 46 }\n        $png = { 89 50 4e 47 0d 0a 1a 0a }\n\n        $php_tag = \"<?php\"\n    condition:\n        (($gif at 0) or\n        ($jfif at 0) or\n        ($png at 0)) and\n\n        $php_tag\n}\n"
  },
  {
    "path": "rules/webshells/WShell_THOR_Webshells.yar",
    "content": "/*\n    This Yara ruleset is under the GNU-GPLv2 license (http://www.gnu.org/licenses/gpl-2.0.html) and open to any user or organization, as    long as you use it under this license.\n\n*/\n\n/*\n\n   THOR APT Scanner - Web Shells Extract\n   This rulset is a subset of all hack tool rules included in our\n   APT Scanner THOR - the full featured APT scanner\n\n   We will frequently update this file with new rules rated TLP:WHITE\n\n   Florian Roth\n   BSK Consulting GmbH\n   Web: bsk-consulting.de\n\n   revision: 20150122\n\n*/\n\nrule Weevely_Webshell : webshell {\n\tmeta:\n\t\tdescription = \"Weevely Webshell - Generic Rule - heavily scrambled tiny web shell\"\n\t\tauthor = \"Florian Roth\"\n\t\treference = \"http://www.ehacking.net/2014/12/weevely-php-stealth-web-backdoor-kali.html\"\n\t\tdate = \"2014/12/14\"\n\t\tscore = 60\n\tstrings:\n\t\t$php = \"<?php\" ascii\n\t\t$s0 = /\\$[a-z]{4} = \\$[a-z]{4}\\(\"[a-z][a-z]?\",[\\s]?\"\",[\\s]?\"/ ascii\n\t\t$s1 = /\\$[a-z]{4} = str_replace\\(\"[a-z][a-z]?\",\"\",\"/ ascii\n\t\t$s2 = /\\$[a-z]{4}\\.\\$[a-z]{4}\\.\\$[a-z]{4}\\.\\$[a-z]{4}\\)\\)\\); \\$[a-z]{4}\\(\\);/ ascii\n\t\t$s4 = /\\$[a-z]{4}=\"[a-zA-Z0-9]{70}/ ascii\n\tcondition:\n\t\t$php at 0 and all of ($s*) and filesize > 570 and filesize < 800\n}\n\nrule webshell_h4ntu_shell_powered_by_tsoi_  : webshell {\n\tmeta:\n\t\tdescription = \"Web Shell - file h4ntu shell [powered by tsoi].php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"06ed0b2398f8096f1bebf092d0526137\"\n\tstrings:\n\t\t$s0 = \"  <TD><DIV STYLE=\\\"font-family: verdana; font-size: 10px;\\\"><b>Server Adress:</b\"\n\t\t$s3 = \"  <TD><DIV STYLE=\\\"font-family: verdana; font-size: 10px;\\\"><b>User Info:</b> ui\"\n\t\t$s4 = \"    <TD><DIV STYLE=\\\"font-family: verdana; font-size: 10px;\\\"><?= $info ?>: <?= \"\n\t\t$s5 = \"<INPUT TYPE=\\\"text\\\" NAME=\\\"cmd\\\" value=\\\"<?php echo stripslashes(htmlentities($\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_PHP_sql  : webshell {\n\tmeta:\n\t\tdescription = \"Web Shell - file sql.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"2cf20a207695bbc2311a998d1d795c35\"\n\tstrings:\n\t\t$s0 = \"$result=mysql_list_tables($db) or die (\\\"$h_error<b>\\\".mysql_error().\\\"</b>$f_\"\n\t\t$s4 = \"print \\\"<a href=\\\\\\\"$_SERVER[PHP_SELF]?s=$s&login=$login&passwd=$passwd&\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_PHP_a : webshell {\n\tmeta:\n\t\tdescription = \"Web Shell - file a.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"e3b461f7464d81f5022419d87315a90d\"\n\tstrings:\n\t\t$s1 = \"echo \\\"<option value=\\\\\\\"\\\". strrev(substr(strstr(strrev($work_dir), \\\"/\\\"\"\n\t\t$s2 = \"echo \\\"<option value=\\\\\\\"$work_dir\\\\\\\" selected>Current Directory</option>\"\n\t\t$s4 = \"<input name=\\\"submit_btn\\\" type=\\\"submit\\\" value=\\\"Execute Command\\\"></p> \" fullword\n\tcondition:\n\t\t2 of them\n}\nrule webshell_iMHaPFtp_2  : webshell{\n\tmeta:\n\t\tdescription = \"Web Shell - file iMHaPFtp.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"12911b73bc6a5d313b494102abcf5c57\"\n\tstrings:\n\t\t$s8 = \"if ($l) echo '<a href=\\\"' . $self . '?action=permission&amp;file=' . urlencode($\"\n\t\t$s9 = \"return base64_decode('R0lGODlhEQANAJEDAMwAAP///5mZmf///yH5BAHoAwMALAAAAAARAA0AAA\"\n\tcondition:\n\t\t1 of them\n}\nrule webshell_Jspspyweb  : webshell{\n\tmeta:\n\t\tdescription = \"Web Shell - file Jspspyweb.jsp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"4e9be07e95fff820a9299f3fb4ace059\"\n\tstrings:\n\t\t$s0 = \"      out.print(\\\"<tr><td width='60%'>\\\"+strCut(convertPath(list[i].getPath()),7\"\n\t\t$s3 = \"  \\\"reg add \\\\\\\"HKEY_LOCAL_MACHINE\\\\\\\\SYSTEM\\\\\\\\CurrentControlSet\\\\\\\\Control\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_Safe_Mode_Bypass_PHP_4_4_2_and_PHP_5_1_2  : webshell{\n\tmeta:\n\t\tdescription = \"Web Shell - file Safe_Mode Bypass PHP 4.4.2 and PHP 5.1.2.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"49ad9117c96419c35987aaa7e2230f63\"\n\tstrings:\n\t\t$s0 = \"die(\\\"\\\\nWelcome.. By This script you can jump in the (Safe Mode=ON) .. Enjoy\\\\n\"\n\t\t$s1 = \"Mode Shell v1.0</font></span></a></font><font face=\\\"Webdings\\\" size=\\\"6\\\" color\"\n\tcondition:\n\t\t1 of them\n}\nrule webshell_SimAttacker_Vrsion_1_0_0_priv8_4_My_friend  : webshell{\n\tmeta:\n\t\tdescription = \"Web Shell - file SimAttacker - Vrsion 1.0.0 - priv8 4 My friend.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"089ff24d978aeff2b4b2869f0c7d38a3\"\n\tstrings:\n\t\t$s2 = \"echo \\\"<a href='?id=fm&fchmod=$dir$file'><span style='text-decoration: none'><fo\"\n\t\t$s3 = \"fputs ($fp ,\\\"\\\\n*********************************************\\\\nWelcome T0 Sim\"\n\tcondition:\n\t\t1 of them\n}\nrule webshell_phpshell_2_1_pwhash  : webshell{\n\tmeta:\n\t\tdescription = \"Web Shell - file pwhash.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"ba120abac165a5a30044428fac1970d8\"\n\tstrings:\n\t\t$s1 = \"<tt>&nbsp;</tt>\\\" (space), \\\"<tt>[</tt>\\\" (left bracket), \\\"<tt>|</tt>\\\" (pi\"\n\t\t$s3 = \"word: \\\"<tt>null</tt>\\\", \\\"<tt>yes</tt>\\\", \\\"<tt>no</tt>\\\", \\\"<tt>true</tt>\\\",\"\n\tcondition:\n\t\t1 of them\n}\nrule webshell_PHPRemoteView  : webshell{\n\tmeta:\n\t\tdescription = \"Web Shell - file PHPRemoteView.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"29420106d9a81553ef0d1ca72b9934d9\"\n\tstrings:\n\t\t$s2 = \"<input type=submit value='\\\".mm(\\\"Delete all dir/files recursive\\\").\\\" (rm -fr)'\"\n\t\t$s4 = \"<a href='$self?c=delete&c2=$c2&confirm=delete&d=\\\".urlencode($d).\\\"&f=\\\".u\"\n\tcondition:\n\t\t1 of them\n}\nrule webshell_jsp_12302  : webshell{\n\tmeta:\n\t\tdescription = \"Web Shell - file 12302.jsp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"a3930518ea57d899457a62f372205f7f\"\n\tstrings:\n\t\t$s0 = \"</font><%out.print(request.getRealPath(request.getServletPath())); %>\" fullword\n\t\t$s1 = \"<%@page import=\\\"java.io.*,java.util.*,java.net.*\\\"%>\" fullword\n\t\t$s4 = \"String path=new String(request.getParameter(\\\"path\\\").getBytes(\\\"ISO-8859-1\\\"\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_caidao_shell_guo  : webshell{\n\tmeta:\n\t\tdescription = \"Web Shell - file guo.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"9e69a8f499c660ee0b4796af14dc08f0\"\n\tstrings:\n\t\t$s0 = \"<?php ($www= $_POST['ice'])!\"\n\t\t$s1 = \"@preg_replace('/ad/e','@'.str_rot13('riny').'($ww\"\n\tcondition:\n\t\t1 of them\n}\nrule webshell_PHP_redcod  : webshell{\n\tmeta:\n\t\tdescription = \"Web Shell - file redcod.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"5c1c8120d82f46ff9d813fbe3354bac5\"\n\tstrings:\n\t\t$s0 = \"H8p0bGFOEy7eAly4h4E4o88LTSVHoAglJ2KLQhUw\" fullword\n\t\t$s1 = \"HKP7dVyCf8cgnWFy8ocjrP5ffzkn9ODroM0/raHm\" fullword\n\tcondition:\n\t\tall of them\n}\nrule webshell_remview_fix  : webshell{\n\tmeta:\n\t\tdescription = \"Web Shell - file remview_fix.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"a24b7c492f5f00e2a19b0fa2eb9c3697\"\n\tstrings:\n\t\t$s4 = \"<a href='$self?c=delete&c2=$c2&confirm=delete&d=\\\".urlencode($d).\\\"&f=\\\".u\"\n\t\t$s5 = \"echo \\\"<P><hr size=1 noshade>\\\\n\\\\n\\\\n\\\\n\\\\n\\\\n\\\\n\\\\n\\\\n\\\\n\\\\n\\\\n\\\\n\\\\n\\\\n\"\n\tcondition:\n\t\t1 of them\n}\nrule webshell_asp_cmd : webshell {\n\tmeta:\n\t\tdescription = \"Web Shell - file cmd.asp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"895ca846858c315a3ff8daa7c55b3119\"\n\tstrings:\n\t\t$s0 = \"<%= \\\"\\\\\\\\\\\" & oScriptNet.ComputerName & \\\"\\\\\\\" & oScriptNet.UserName %>\" fullword\n\t\t$s1 = \"Set oFileSys = Server.CreateObject(\\\"Scripting.FileSystemObject\\\")\" fullword\n\t\t$s3 = \"Call oScript.Run (\\\"cmd.exe /c \\\" & szCMD & \\\" > \\\" & szTempFile, 0, True)\" fullword\n\tcondition:\n\t\t1 of them\n}\nrule webshell_php_sh_server : webshell {\n\tmeta:\n\t\tdescription = \"Web Shell - file server.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 50\n\t\thash = \"d87b019e74064aa90e2bb143e5e16cfa\"\n\tstrings:\n\t\t$s0 = \"eval(getenv('HTTP_CODE'));\" fullword\n\tcondition:\n\t\tall of them\n}\nrule webshell_PH_Vayv_PH_Vayv : webshell {\n\tmeta:\n\t\tdescription = \"Web Shell - file PH Vayv.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"35fb37f3c806718545d97c6559abd262\"\n\tstrings:\n\t\t$s0 = \"style=\\\"BACKGROUND-COLOR: #eae9e9; BORDER-BOTTOM: #000000 1px in\"\n\t\t$s4 = \"<font color=\\\"#858585\\\">SHOPEN</font></a></font><font face=\\\"Verdana\\\" style\"\n\tcondition:\n\t\t1 of them\n}\nrule webshell_caidao_shell_ice  : webshell{\n\tmeta:\n\t\tdescription = \"Web Shell - file ice.asp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"6560b436d3d3bb75e2ef3f032151d139\"\n\tstrings:\n\t\t$s0 = \"<%eval request(\\\"ice\\\")%>\" fullword\n\tcondition:\n\t\tall of them\n}\nrule webshell_cihshell_fix : webshell {\n\tmeta:\n\t\tdescription = \"Web Shell - file cihshell_fix.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"3823ac218032549b86ee7c26f10c4cb5\"\n\tstrings:\n\t\t$s7 = \"<tr style='background:#242424;' ><td style='padding:10px;'><form action='' encty\"\n\t\t$s8 = \"if (isset($_POST['mysqlw_host'])){$dbhost = $_POST['mysqlw_host'];} else {$dbhos\"\n\tcondition:\n\t\t1 of them\n}\nrule webshell_asp_shell : webshell {\n\tmeta:\n\t\tdescription = \"Web Shell - file shell.asp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"e63f5a96570e1faf4c7b8ca6df750237\"\n\tstrings:\n\t\t$s7 = \"<input type=\\\"submit\\\" name=\\\"Send\\\" value=\\\"GO!\\\">\" fullword\n\t\t$s8 = \"<TEXTAREA NAME=\\\"1988\\\" ROWS=\\\"18\\\" COLS=\\\"78\\\"></TEXTAREA>\" fullword\n\tcondition:\n\t\tall of them\n}\nrule webshell_Private_i3lue  : webshell{\n\tmeta:\n\t\tdescription = \"Web Shell - file Private-i3lue.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"13f5c7a035ecce5f9f380967cf9d4e92\"\n\tstrings:\n\t\t$s8 = \"case 15: $image .= \\\"\\\\21\\\\0\\\\\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_php_up : webshell {\n\tmeta:\n\t\tdescription = \"Web Shell - file up.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"7edefb8bd0876c41906f4b39b52cd0ef\"\n\tstrings:\n\t\t$s0 = \"copy($HTTP_POST_FILES['userfile']['tmp_name'], $_POST['remotefile']);\" fullword\n\t\t$s3 = \"if(is_uploaded_file($HTTP_POST_FILES['userfile']['tmp_name'])) {\" fullword\n\t\t$s8 = \"echo \\\"Uploaded file: \\\" . $HTTP_POST_FILES['userfile']['name'];\" fullword\n\tcondition:\n\t\t2 of them\n}\nrule webshell_Mysql_interface_v1_0 {\n\tmeta:\n\t\tdescription = \"Web Shell - file Mysql interface v1.0.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"a12fc0a3d31e2f89727b9678148cd487\"\n\tstrings:\n\t\t$s0 = \"echo \\\"<td><a href='$PHP_SELF?action=dropDB&dbname=$dbname' onClick=\\\\\\\"return\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_php_s_u {\n\tmeta:\n\t\tdescription = \"Web Shell - file s-u.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"efc7ba1a4023bcf40f5e912f1dd85b5a\"\n\tstrings:\n\t\t$s6 = \"<a href=\\\"?act=do\\\"><font color=\\\"red\\\">Go Execute</font></a></b><br /><textarea\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_phpshell_2_1_config {\n\tmeta:\n\t\tdescription = \"Web Shell - file config.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"bd83144a649c5cc21ac41b505a36a8f3\"\n\tstrings:\n\t\t$s1 = \"; (choose good passwords!).  Add uses as simple 'username = \\\"password\\\"' lines.\" fullword\n\tcondition:\n\t\tall of them\n}\nrule webshell_asp_EFSO_2 {\n\tmeta:\n\t\tdescription = \"Web Shell - file EFSO_2.asp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"a341270f9ebd01320a7490c12cb2e64c\"\n\tstrings:\n\t\t$s0 = \"%8@#@&P~,P,PP,MV~4BP^~,NS~m~PXc3,_PWbSPU W~~[u3Fffs~/%@#@&~~,PP~~,M!PmS,4S,mBPNB\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_jsp_up {\n\tmeta:\n\t\tdescription = \"Web Shell - file up.jsp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"515a5dd86fe48f673b72422cccf5a585\"\n\tstrings:\n\t\t$s9 = \"// BUG: Corta el fichero si es mayor de 640Ks\" fullword\n\tcondition:\n\t\tall of them\n}\nrule webshell_NetworkFileManagerPHP {\n\tmeta:\n\t\tdescription = \"Web Shell - file NetworkFileManagerPHP.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"acdbba993a5a4186fd864c5e4ea0ba4f\"\n\tstrings:\n\t\t$s9 = \"  echo \\\"<br><center>All the data in these tables:<br> \\\".$tblsv.\\\" were putted \"\n\tcondition:\n\t\tall of them\n}\nrule webshell_Server_Variables {\n\tmeta:\n\t\tdescription = \"Web Shell - file Server Variables.asp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"47fb8a647e441488b30f92b4d39003d7\"\n\tstrings:\n\t\t$s7 = \"<% For Each Vars In Request.ServerVariables %>\" fullword\n\t\t$s9 = \"Variable Name</B></font></p>\" fullword\n\tcondition:\n\t\tall of them\n}\nrule webshell_caidao_shell_ice_2 {\n\tmeta:\n\t\tdescription = \"Web Shell - file ice.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"1d6335247f58e0a5b03e17977888f5f2\"\n\tstrings:\n\t\t$s0 = \"<?php ${${eval($_POST[ice])}};?>\" fullword\n\tcondition:\n\t\tall of them\n}\nrule webshell_caidao_shell_mdb {\n\tmeta:\n\t\tdescription = \"Web Shell - file mdb.asp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"fbf3847acef4844f3a0d04230f6b9ff9\"\n\tstrings:\n\t\t$s1 = \"<% execute request(\\\"ice\\\")%>a \" fullword\n\tcondition:\n\t\tall of them\n}\nrule webshell_jsp_guige {\n\tmeta:\n\t\tdescription = \"Web Shell - file guige.jsp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"2c9f2dafa06332957127e2c713aacdd2\"\n\tstrings:\n\t\t$s0 = \"if(damapath!=null &&!damapath.equals(\\\"\\\")&&content!=null\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_phpspy2010 {\n\tmeta:\n\t\tdescription = \"Web Shell - file phpspy2010.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"14ae0e4f5349924a5047fed9f3b105c5\"\n\tstrings:\n\t\t$s3 = \"eval(gzinflate(base64_decode(\"\n\t\t$s5 = \"//angel\" fullword\n\t\t$s8 = \"$admin['cookiedomain'] = '';\" fullword\n\tcondition:\n\t\tall of them\n}\nrule webshell_asp_ice {\n\tmeta:\n\t\tdescription = \"Web Shell - file ice.asp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"d141e011a92f48da72728c35f1934a2b\"\n\tstrings:\n\t\t$s0 = \"D,'PrjknD,J~[,EdnMP[,-4;DS6@#@&VKobx2ldd,'~JhC\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_drag_system {\n\tmeta:\n\t\tdescription = \"Web Shell - file system.jsp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"15ae237cf395fb24cf12bff141fb3f7c\"\n\tstrings:\n\t\t$s9 = \"String sql = \\\"SELECT * FROM DBA_TABLES WHERE TABLE_NAME not like '%$%' and num_\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_DarkBlade1_3_asp_indexx {\n\tmeta:\n\t\tdescription = \"Web Shell - file indexx.asp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"b7f46693648f534c2ca78e3f21685707\"\n\tstrings:\n\t\t$s3 = \"Const strs_toTransform=\\\"command|Radmin|NTAuThenabled|FilterIp|IISSample|PageCou\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_phpshell3 {\n\tmeta:\n\t\tdescription = \"Web Shell - file phpshell3.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"76117b2ee4a7ac06832d50b2d04070b8\"\n\tstrings:\n\t\t$s2 = \"<input name=\\\"nounce\\\" type=\\\"hidden\\\" value=\\\"<?php echo $_SESSION['nounce'];\"\n\t\t$s5 = \"<p>Username: <input name=\\\"username\\\" type=\\\"text\\\" value=\\\"<?php echo $userna\"\n\t\t$s7 = \"$_SESSION['output'] .= \\\"cd: could not change to: $new_dir\\\\n\\\";\" fullword\n\tcondition:\n\t\t2 of them\n}\nrule webshell_jsp_hsxa {\n\tmeta:\n\t\tdescription = \"Web Shell - file hsxa.jsp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"d0e05f9c9b8e0b3fa11f57d9ab800380\"\n\tstrings:\n\t\t$s0 = \"<%@ page language=\\\"java\\\" pageEncoding=\\\"gbk\\\"%><jsp:directive.page import=\\\"ja\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_jsp_utils {\n\tmeta:\n\t\tdescription = \"Web Shell - file utils.jsp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"9827ba2e8329075358b8e8a53e20d545\"\n\tstrings:\n\t\t$s0 = \"ResultSet r = c.getMetaData().getTables(null, null, \\\"%\\\", t);\" fullword\n\t\t$s4 = \"String cs = request.getParameter(\\\"z0\\\")==null?\\\"gbk\\\": request.getParameter(\\\"z\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_asp_01 {\n\tmeta:\n\t\tdescription = \"Web Shell - file 01.asp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 50\n\t\thash = \"61a687b0bea0ef97224c7bd2df118b87\"\n\tstrings:\n\t\t$s0 = \"<%eval request(\\\"pass\\\")%>\" fullword\n\tcondition:\n\t\tall of them\n}\nrule webshell_asp_404 {\n\tmeta:\n\t\tdescription = \"Web Shell - file 404.asp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"d9fa1e8513dbf59fa5d130f389032a2d\"\n\tstrings:\n\t\t$s0 = \"lFyw6pd^DKV^4CDRWmmnO1GVKDl:y& f+2\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_webshell_cnseay02_1 {\n\tmeta:\n\t\tdescription = \"Web Shell - file webshell-cnseay02-1.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"95fc76081a42c4f26912826cb1bd24b1\"\n\tstrings:\n\t\t$s0 = \"(93).$_uU(41).$_uU(59);$_fF=$_uU(99).$_uU(114).$_uU(101).$_uU(97).$_uU(116).$_uU\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_php_fbi {\n\tmeta:\n\t\tdescription = \"Web Shell - file fbi.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"1fb32f8e58c8deb168c06297a04a21f1\"\n\tstrings:\n\t\t$s7 = \"erde types','Getallen','Datum en tijd','Tekst','Binaire gegevens','Netwerk','Geo\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_B374kPHP_B374k {\n\tmeta:\n\t\tdescription = \"Web Shell - file B374k.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"bed7388976f8f1d90422e8795dff1ea6\"\n\tstrings:\n\t\t$s0 = \"Http://code.google.com/p/b374k-shell\" fullword\n\t\t$s1 = \"$_=str_rot13('tm'.'vas'.'yngr');$_=str_rot13(strrev('rqb'.'prq'.'_'.'46r'.'fno'\"\n\t\t$s3 = \"Jayalah Indonesiaku & Lyke @ 2013\" fullword\n\t\t$s4 = \"B374k Vip In Beautify Just For Self\" fullword\n\tcondition:\n\t\t1 of them\n}\nrule webshell_cmd_asp_5_1 {\n\tmeta:\n\t\tdescription = \"Web Shell - file cmd-asp-5.1.asp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"8baa99666bf3734cbdfdd10088e0cd9f\"\n\tstrings:\n\t\t$s9 = \"Call oS.Run(\\\"win.com cmd.exe /c \\\"\\\"\\\" & szCMD & \\\" > \\\" & szTF &\" fullword\n\tcondition:\n\t\tall of them\n}\nrule webshell_php_dodo_zip {\n\tmeta:\n\t\tdescription = \"Web Shell - file zip.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"b7800364374077ce8864796240162ad5\"\n\tstrings:\n\t\t$s0 = \"$hexdtime = '\\\\x' . $dtime[6] . $dtime[7] . '\\\\x' . $dtime[4] . $dtime[5] . '\\\\x\"\n\t\t$s3 = \"$datastr = \\\"\\\\x50\\\\x4b\\\\x03\\\\x04\\\\x0a\\\\x00\\\\x00\\\\x00\\\\x00\\\\x00\\\\x00\\\\x00\\\\x00\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_aZRaiLPhp_v1_0 {\n\tmeta:\n\t\tdescription = \"Web Shell - file aZRaiLPhp v1.0.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"26b2d3943395682e36da06ed493a3715\"\n\tstrings:\n\t\t$s5 = \"echo \\\" <font color='#0000FF'>CHMODU \\\".substr(base_convert(@fileperms($\"\n\t\t$s7 = \"echo \\\"<a href='./$this_file?op=efp&fname=$path/$file&dismi=$file&yol=$path'><fo\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_php_list {\n\tmeta:\n\t\tdescription = \"Web Shell - file list.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"922b128ddd90e1dc2f73088956c548ed\"\n\tstrings:\n\t\t$s1 = \"// list.php = Directory & File Listing\" fullword\n\t\t$s2 = \"    echo \\\"( ) <a href=?file=\\\" . $fichero . \\\"/\\\" . $filename . \\\">\\\" . $filena\"\n\t\t$s9 = \"// by: The Dark Raver\" fullword\n\tcondition:\n\t\t1 of them\n}\nrule webshell_ironshell {\n\tmeta:\n\t\tdescription = \"Web Shell - file ironshell.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"8bfa2eeb8a3ff6afc619258e39fded56\"\n\tstrings:\n\t\t$s4 = \"print \\\"<form action=\\\\\\\"\\\".$me.\\\"?p=cmd&dir=\\\".realpath('.').\\\"\"\n\t\t$s8 = \"print \\\"<td id=f><a href=\\\\\\\"?p=rename&file=\\\".realpath($file).\\\"&di\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_caidao_shell_404 {\n\tmeta:\n\t\tdescription = \"Web Shell - file 404.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"ee94952dc53d9a29bdf4ece54c7a7aa7\"\n\tstrings:\n\t\t$s0 = \"<?php $K=sTr_RepLaCe('`','','a`s`s`e`r`t');$M=$_POST[ice];IF($M==NuLl)HeaDeR('St\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_ASP_aspydrv {\n\tmeta:\n\t\tdescription = \"Web Shell - file aspydrv.asp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"de0a58f7d1e200d0b2c801a94ebce330\"\n\tstrings:\n\t\t$s3 = \"<%=thingy.DriveLetter%> </td><td><tt> <%=thingy.DriveType%> </td><td><tt> <%=thi\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_jsp_web {\n\tmeta:\n\t\tdescription = \"Web Shell - file web.jsp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"4bc11e28f5dccd0c45a37f2b541b2e98\"\n\tstrings:\n\t\t$s0 = \"<%@page import=\\\"java.io.*\\\"%><%@page import=\\\"java.net.*\\\"%><%String t=request.\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_mysqlwebsh {\n\tmeta:\n\t\tdescription = \"Web Shell - file mysqlwebsh.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"babfa76d11943a22484b3837f105fada\"\n\tstrings:\n\t\t$s3 = \" <TR><TD bgcolor=\\\"<? echo (!$CONNECT && $action == \\\"chparam\\\")?\\\"#660000\\\":\\\"#\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_jspShell {\n\tmeta:\n\t\tdescription = \"Web Shell - file jspShell.jsp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"0d5b5a17552254be6c1c8f1eb3a5fdc1\"\n\tstrings:\n\t\t$s0 = \"<input type=\\\"checkbox\\\" name=\\\"autoUpdate\\\" value=\\\"AutoUpdate\\\" on\"\n\t\t$s1 = \"onblur=\\\"document.shell.autoUpdate.checked= this.oldValue;\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_Dx_Dx {\n\tmeta:\n\t\tdescription = \"Web Shell - file Dx.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"9cfe372d49fe8bf2fac8e1c534153d9b\"\n\tstrings:\n\t\t$s1 = \"print \\\"\\\\n\\\".'Tip: to view the file \\\"as is\\\" - open the page in <a href=\\\"'.Dx\"\n\t\t$s9 = \"class=linelisting><nobr>POST (php eval)</td><\"\n\tcondition:\n\t\t1 of them\n}\nrule webshell_asp_ntdaddy {\n\tmeta:\n\t\tdescription = \"Web Shell - file ntdaddy.asp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"c5e6baa5d140f73b4e16a6cfde671c68\"\n\tstrings:\n\t\t$s9 =  \"if  FP  =  \\\"RefreshFolder\\\"  or  \"\n\t\t$s10 = \"request.form(\\\"cmdOption\\\")=\\\"DeleteFolder\\\"  \"\n\tcondition:\n\t\t1 of them\n}\nrule webshell_MySQL_Web_Interface_Version_0_8 {\n\tmeta:\n\t\tdescription = \"Web Shell - file MySQL Web Interface Version 0.8.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"36d4f34d0a22080f47bb1cb94107c60f\"\n\tstrings:\n\t\t$s2 = \"href='$PHP_SELF?action=dumpTable&dbname=$dbname&tablename=$tablename'>Dump</a>\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_elmaliseker_2 {\n\tmeta:\n\t\tdescription = \"Web Shell - file elmaliseker.asp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"b32d1730d23a660fd6aa8e60c3dc549f\"\n\tstrings:\n\t\t$s1 = \"<td<%if (FSO.GetExtensionName(path & \\\"\\\\\\\" & oFile.Name)=\\\"lnk\\\") or (FSO.GetEx\"\n\t\t$s6 = \"<input type=button value=Save onclick=\\\"EditorCommand('Save')\\\"> <input type=but\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_ASP_RemExp {\n\tmeta:\n\t\tdescription = \"Web Shell - file RemExp.asp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"aa1d8491f4e2894dbdb91eec1abc2244\"\n\tstrings:\n\t\t$s0 = \"<td bgcolor=\\\"<%=BgColor%>\\\" title=\\\"<%=SubFolder.Name%>\\\"> <a href= \\\"<%=Reques\"\n\t\t$s1 = \"Private Function ConvertBinary(ByVal SourceNumber, ByVal MaxValuePerIndex, ByVal\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_jsp_list1 {\n\tmeta:\n\t\tdescription = \"Web Shell - file list1.jsp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"8d9e5afa77303c9c01ff34ea4e7f6ca6\"\n\tstrings:\n\t\t$s1 = \"case 's':ConnectionDBM(out,encodeChange(request.getParameter(\\\"drive\"\n\t\t$s9 = \"return \\\"<a href=\\\\\\\"javascript:delFile('\\\"+folderReplace(file)+\\\"')\\\\\\\"\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_phpkit_1_0_odd {\n\tmeta:\n\t\tdescription = \"Web Shell - file odd.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"594d1b1311bbef38a0eb3d6cbb1ab538\"\n\tstrings:\n\t\t$s0 = \"include('php://input');\" fullword\n\t\t$s1 = \"// No eval() calls, no system() calls, nothing normally seen as malicious.\" fullword\n\t\t$s2 = \"ini_set('allow_url_include, 1'); // Allow url inclusion in this script\" fullword\n\tcondition:\n\t\tall of them\n}\nrule webshell_jsp_123 {\n\tmeta:\n\t\tdescription = \"Web Shell - file 123.jsp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"c691f53e849676cac68a38d692467641\"\n\tstrings:\n\t\t$s0 = \"<font color=\\\"blue\\\">??????????????????:</font><input type=\\\"text\\\" size=\\\"7\"\n\t\t$s3 = \"String path=new String(request.getParameter(\\\"path\\\").getBytes(\\\"ISO-8859-1\\\"\"\n\t\t$s9 = \"<input type=\\\"submit\\\" name=\\\"btnSubmit\\\" value=\\\"Upload\\\">    \" fullword\n\tcondition:\n\t\tall of them\n}\nrule webshell_asp_1 {\n\tmeta:\n\t\tdescription = \"Web Shell - file 1.asp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"8991148adf5de3b8322ec5d78cb01bdb\"\n\tstrings:\n\t\t$s4 = \"!22222222222222222222222222222222222222222222222222\" fullword\n\t\t$s8 = \"<%eval request(\\\"pass\\\")%>\" fullword\n\tcondition:\n\t\tall of them\n}\nrule webshell_ASP_tool {\n\tmeta:\n\t\tdescription = \"Web Shell - file tool.asp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"4ab68d38527d5834e9c1ff64407b34fb\"\n\tstrings:\n\t\t$s0 = \"Response.Write \\\"<FORM action=\\\"\\\"\\\" & Request.ServerVariables(\\\"URL\\\") & \\\"\\\"\\\"\"\n\t\t$s3 = \"Response.Write \\\"<tr><td><font face='arial' size='2'><b>&lt;DIR&gt; <a href='\\\" \"\n\t\t$s9 = \"Response.Write \\\"<font face='arial' size='1'><a href=\\\"\\\"#\\\"\\\" onclick=\\\"\\\"javas\"\n\tcondition:\n\t\t2 of them\n}\nrule webshell_cmd_win32 {\n\tmeta:\n\t\tdescription = \"Web Shell - file cmd_win32.jsp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"cc4d4d6cc9a25984aa9a7583c7def174\"\n\tstrings:\n\t\t$s0 = \"Process p = Runtime.getRuntime().exec(\\\"cmd.exe /c \\\" + request.getParam\"\n\t\t$s1 = \"<FORM METHOD=\\\"POST\\\" NAME=\\\"myform\\\" ACTION=\\\"\\\">\" fullword\n\tcondition:\n\t\t2 of them\n}\nrule webshell_jsp_jshell {\n\tmeta:\n\t\tdescription = \"Web Shell - file jshell.jsp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"124b22f38aaaf064cef14711b2602c06\"\n\tstrings:\n\t\t$s0 = \"kXpeW[\\\"\" fullword\n\t\t$s4 = \"[7b:g0W@W<\" fullword\n\t\t$s5 = \"b:gHr,g<\" fullword\n\t\t$s8 = \"RhV0W@W<\" fullword\n\t\t$s9 = \"S_MR(u7b\" fullword\n\tcondition:\n\t\tall of them\n}\nrule webshell_ASP_zehir4 {\n\tmeta:\n\t\tdescription = \"Web Shell - file zehir4.asp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"7f4e12e159360743ec016273c3b9108c\"\n\tstrings:\n\t\t$s9 = \"Response.Write \\\"<a href='\\\"&dosyaPath&\\\"?status=7&Path=\\\"&Path&\\\"/\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_wsb_idc {\n\tmeta:\n\t\tdescription = \"Web Shell - file idc.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"7c5b1b30196c51f1accbffb80296395f\"\n\tstrings:\n\t\t$s1 = \"if (md5($_GET['usr'])==$user && md5($_GET['pass'])==$pass)\" fullword\n\t\t$s3 = \"{eval($_GET['idc']);}\" fullword\n\tcondition:\n\t\t1 of them\n}\nrule webshell_cpg_143_incl_xpl {\n\tmeta:\n\t\tdescription = \"Web Shell - file cpg_143_incl_xpl.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"5937b131b67d8e0afdbd589251a5e176\"\n\tstrings:\n\t\t$s3 = \"$data=\\\"username=\\\".urlencode($USER).\\\"&password=\\\".urlencode($PA\"\n\t\t$s5 = \"fputs($sun_tzu,\\\"<?php echo \\\\\\\"Hi Master!\\\\\\\";ini_set(\\\\\\\"max_execution_time\"\n\tcondition:\n\t\t1 of them\n}\nrule webshell_mumaasp_com {\n\tmeta:\n\t\tdescription = \"Web Shell - file mumaasp.com.asp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"cce32b2e18f5357c85b6d20f564ebd5d\"\n\tstrings:\n\t\t$s0 = \"&9K_)P82ai,A}I92]R\\\"q!C:RZ}S6]=PaTTR\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_php_404 {\n\tmeta:\n\t\tdescription = \"Web Shell - file 404.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"ced050df5ca42064056a7ad610a191b3\"\n\tstrings:\n\t\t$s0 = \"$pass = md5(md5(md5($pass)));\" fullword\n\tcondition:\n\t\tall of them\n}\nrule webshell_webshell_cnseay_x {\n\tmeta:\n\t\tdescription = \"Web Shell - file webshell-cnseay-x.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"a0f9f7f5cd405a514a7f3be329f380e5\"\n\tstrings:\n\t\t$s9 = \"$_F_F.='_'.$_P_P[5].$_P_P[20].$_P_P[13].$_P_P[2].$_P_P[19].$_P_P[8].$_P_\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_asp_up {\n\tmeta:\n\t\tdescription = \"Web Shell - file up.asp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"f775e721cfe85019fe41c34f47c0d67c\"\n\tstrings:\n\t\t$s0 = \"Pos = InstrB(BoundaryPos,RequestBin,getByteString(\\\"Content-Dispositio\"\n\t\t$s1 = \"ContentType = getString(MidB(RequestBin,PosBeg,PosEnd-PosBeg))\" fullword\n\tcondition:\n\t\t1 of them\n}\nrule webshell_phpkit_0_1a_odd {\n\tmeta:\n\t\tdescription = \"Web Shell - file odd.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"3c30399e7480c09276f412271f60ed01\"\n\tstrings:\n\t\t$s1 = \"include('php://input');\" fullword\n\t\t$s3 = \"ini_set('allow_url_include, 1'); // Allow url inclusion in this script\" fullword\n\t\t$s4 = \"// uses include('php://input') to execute arbritary code\" fullword\n\t\t$s5 = \"// php://input based backdoor\" fullword\n\tcondition:\n\t\t2 of them\n}\nrule webshell_ASP_cmd {\n\tmeta:\n\t\tdescription = \"Web Shell - file cmd.asp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"97af88b478422067f23b001dd06d56a9\"\n\tstrings:\n\t\t$s0 = \"<%= \\\"\\\\\\\\\\\" & oScriptNet.ComputerName & \\\"\\\\\\\" & oScriptNet.UserName %>\" fullword\n\tcondition:\n\t\tall of them\n}\nrule webshell_PHP_Shell_x3 {\n\tmeta:\n\t\tdescription = \"Web Shell - file PHP Shell.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"a2f8fa4cce578fc9c06f8e674b9e63fd\"\n\tstrings:\n\t\t$s4 = \"&nbsp;&nbsp;<?php echo buildUrl(\\\"<font color=\\\\\\\"navy\\\\\\\">[\"\n\t\t$s6 = \"echo \\\"</form><form action=\\\\\\\"$SFileName?$urlAdd\\\\\\\" method=\\\\\\\"post\\\\\\\"><input\"\n\t\t$s9 = \"if  ( ( (isset($http_auth_user) ) && (isset($http_auth_pass)) ) && ( !isset(\"\n\tcondition:\n\t\t2 of them\n}\nrule webshell_PHP_g00nv13 {\n\tmeta:\n\t\tdescription = \"Web Shell - file g00nv13.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"35ad2533192fe8a1a76c3276140db820\"\n\tstrings:\n\t\t$s1 = \"case \\\"zip\\\": case \\\"tar\\\": case \\\"rar\\\": case \\\"gz\\\": case \\\"cab\\\": cas\"\n\t\t$s4 = \"if(!($sqlcon = @mysql_connect($_SESSION['sql_host'] . ':' . $_SESSION['sql_p\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_php_h6ss {\n\tmeta:\n\t\tdescription = \"Web Shell - file h6ss.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"272dde9a4a7265d6c139287560328cd5\"\n\tstrings:\n\t\t$s0 = \"<?php eval(gzuncompress(base64_decode(\\\"\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_jsp_zx {\n\tmeta:\n\t\tdescription = \"Web Shell - file zx.jsp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"67627c264db1e54a4720bd6a64721674\"\n\tstrings:\n\t\t$s0 = \"if(request.getParameter(\\\"f\\\")!=null)(new java.io.FileOutputStream(application.g\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_Ani_Shell {\n\tmeta:\n\t\tdescription = \"Web Shell - file Ani-Shell.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"889bfc9fbb8ee7832044fc575324d01a\"\n\tstrings:\n\t\t$s0 = \"$Python_CODE = \\\"I\"\n\t\t$s6 = \"$passwordPrompt = \\\"\\\\n=================================================\"\n\t\t$s7 = \"fputs ($sockfd ,\\\"\\\\n===============================================\"\n\tcondition:\n\t\t1 of them\n}\nrule webshell_jsp_k8cmd {\n\tmeta:\n\t\tdescription = \"Web Shell - file k8cmd.jsp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"b39544415e692a567455ff033a97a682\"\n\tstrings:\n\t\t$s2 = \"if(request.getSession().getAttribute(\\\"hehe\\\").toString().equals(\\\"hehe\\\"))\" fullword\n\tcondition:\n\t\tall of them\n}\nrule webshell_jsp_cmd {\n\tmeta:\n\t\tdescription = \"Web Shell - file cmd.jsp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"5391c4a8af1ede757ba9d28865e75853\"\n\tstrings:\n\t\t$s6 = \"out.println(\\\"Command: \\\" + request.getParameter(\\\"cmd\\\") + \\\"<BR>\\\");\" fullword\n\tcondition:\n\t\tall of them\n}\nrule webshell_jsp_k81 {\n\tmeta:\n\t\tdescription = \"Web Shell - file k81.jsp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"41efc5c71b6885add9c1d516371bd6af\"\n\tstrings:\n\t\t$s1 = \"byte[] binary = BASE64Decoder.class.newInstance().decodeBuffer(cmd);\" fullword\n\t\t$s9 = \"if(cmd.equals(\\\"Szh0ZWFt\\\")){out.print(\\\"[S]\\\"+dir+\\\"[E]\\\");}\" fullword\n\tcondition:\n\t\t1 of them\n}\nrule webshell_ASP_zehir {\n\tmeta:\n\t\tdescription = \"Web Shell - file zehir.asp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"0061d800aee63ccaf41d2d62ec15985d\"\n\tstrings:\n\t\t$s9 = \"Response.Write \\\"<font face=wingdings size=3><a href='\\\"&dosyaPath&\\\"?status=18&\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_Worse_Linux_Shell {\n\tmeta:\n\t\tdescription = \"Web Shell - file Worse Linux Shell.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"8338c8d9eab10bd38a7116eb534b5fa2\"\n\tstrings:\n\t\t$s0 = \"system(\\\"mv \\\".$_FILES['_upl']['tmp_name'].\\\" \\\".$currentWD\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_zacosmall {\n\tmeta:\n\t\tdescription = \"Web Shell - file zacosmall.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"5295ee8dc2f5fd416be442548d68f7a6\"\n\tstrings:\n\t\t$s0 = \"if($cmd!==''){ echo('<strong>'.htmlspecialchars($cmd).\\\"</strong><hr>\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_Liz0ziM_Private_Safe_Mode_Command_Execuriton_Bypass_Exploit {\n\tmeta:\n\t\tdescription = \"Web Shell - file Liz0ziM Private Safe Mode Command Execuriton Bypass Exploit.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"c6eeacbe779518ea78b8f7ed5f63fc11\"\n\tstrings:\n\t\t$s1 = \"<option value=\\\"cat /etc/passwd\\\">/etc/passwd</option>\" fullword\n\tcondition:\n\t\tall of them\n}\nrule webshell_redirect {\n\tmeta:\n\t\tdescription = \"Web Shell - file redirect.asp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"97da83c6e3efbba98df270cc70beb8f8\"\n\tstrings:\n\t\t$s7 = \"var flag = \\\"?txt=\\\" + (document.getElementById(\\\"dl\\\").checked ? \\\"2\\\":\\\"1\\\" \"\n\tcondition:\n\t\tall of them\n}\nrule webshell_jsp_cmdjsp {\n\tmeta:\n\t\tdescription = \"Web Shell - file cmdjsp.jsp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"b815611cc39f17f05a73444d699341d4\"\n\tstrings:\n\t\t$s5 = \"<FORM METHOD=GET ACTION='cmdjsp.jsp'>\" fullword\n\tcondition:\n\t\tall of them\n}\nrule webshell_Java_Shell {\n\tmeta:\n\t\tdescription = \"Web Shell - file Java Shell.jsp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"36403bc776eb12e8b7cc0eb47c8aac83\"\n\tstrings:\n\t\t$s4 = \"public JythonShell(int columns, int rows, int scrollback) {\" fullword\n\t\t$s9 = \"this(null, Py.getSystemState(), columns, rows, scrollback);\" fullword\n\tcondition:\n\t\t1 of them\n}\nrule webshell_asp_1d {\n\tmeta:\n\t\tdescription = \"Web Shell - file 1d.asp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"fad7504ca8a55d4453e552621f81563c\"\n\tstrings:\n\t\t$s0 = \"+9JkskOfKhUxZJPL~\\\\(mD^W~[,{@#@&EO\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_jsp_IXRbE {\n\tmeta:\n\t\tdescription = \"Web Shell - file IXRbE.jsp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"e26e7e0ebc6e7662e1123452a939e2cd\"\n\tstrings:\n\t\t$s0 = \"<%if(request.getParameter(\\\"f\\\")!=null)(new java.io.FileOutputStream(application\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_PHP_G5 {\n\tmeta:\n\t\tdescription = \"Web Shell - file G5.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"95b4a56140a650c74ed2ec36f08d757f\"\n\tstrings:\n\t\t$s3 = \"echo \\\"Hacking Mode?<br><select name='htype'><option >--------SELECT--------</op\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_PHP_r57142 {\n\tmeta:\n\t\tdescription = \"Web Shell - file r57142.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"0911b6e6b8f4bcb05599b2885a7fe8a8\"\n\tstrings:\n\t\t$s0 = \"$downloaders = array('wget','fetch','lynx','links','curl','get','lwp-mirror');\" fullword\n\tcondition:\n\t\tall of them\n}\nrule webshell_jsp_tree {\n\tmeta:\n\t\tdescription = \"Web Shell - file tree.jsp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"bcdf7bbf7bbfa1ffa4f9a21957dbcdfa\"\n\tstrings:\n\t\t$s5 = \"$('#tt2').tree('options').url = \\\"selectChild.action?checki\"\n\t\t$s6 = \"String basePath = request.getScheme()+\\\"://\\\"+request.getServerName()+\\\":\\\"+requ\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_C99madShell_v_3_0_smowu {\n\tmeta:\n\t\tdescription = \"Web Shell - file smowu.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"74e1e7c7a6798f1663efb42882b85bee\"\n\tstrings:\n\t\t$s2 = \"<tr><td width=\\\"50%\\\" height=\\\"1\\\" valign=\\\"top\\\"><center><b>:: Enter ::</b><for\"\n\t\t$s8 = \"<p><font color=red>Wordpress Not Found! <input type=text id=\\\"wp_pat\\\"><input ty\"\n\tcondition:\n\t\t1 of them\n}\nrule webshell_simple_backdoor {\n\tmeta:\n\t\tdescription = \"Web Shell - file simple-backdoor.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"f091d1b9274c881f8e41b2f96e6b9936\"\n\tstrings:\n\t\t$s0 = \"$cmd = ($_REQUEST['cmd']);\" fullword\n\t\t$s1 = \"if(isset($_REQUEST['cmd'])){\" fullword\n\t\t$s4 = \"system($cmd);\" fullword\n\tcondition:\n\t\t2 of them\n}\nrule webshell_PHP_404 {\n\tmeta:\n\t\tdescription = \"Web Shell - file 404.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"078c55ac475ab9e028f94f879f548bca\"\n\tstrings:\n\t\t$s4 = \"<span>Posix_getpwuid (\\\"Read\\\" /etc/passwd)\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_Macker_s_Private_PHPShell {\n\tmeta:\n\t\tdescription = \"Web Shell - file Macker's Private PHPShell.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"e24cbf0e294da9ac2117dc660d890bb9\"\n\tstrings:\n\t\t$s3 = \"echo \\\"<tr><td class=\\\\\\\"silver border\\\\\\\">&nbsp;<strong>Server's PHP Version:&n\"\n\t\t$s4 = \"&nbsp;&nbsp;<?php echo buildUrl(\\\"<font color=\\\\\\\"navy\\\\\\\">[\"\n\t\t$s7 = \"echo \\\"<form action=\\\\\\\"$SFileName?$urlAdd\\\\\\\" method=\\\\\\\"POST\\\\\\\"><input type=\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_Antichat_Shell_v1_3_2 {\n\tmeta:\n\t\tdescription = \"Web Shell - file Antichat Shell v1.3.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"40d0abceba125868be7f3f990f031521\"\n\tstrings:\n\t\t$s3 = \"$header='<html><head><title>'.getenv(\\\"HTTP_HOST\\\").' - Antichat Shell</title><m\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_Safe_mode_breaker {\n\tmeta:\n\t\tdescription = \"Web Shell - file Safe mode breaker.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"5bd07ccb1111950a5b47327946bfa194\"\n\tstrings:\n\t\t$s5 = \"preg_match(\\\"/SAFE\\\\ MODE\\\\ Restriction\\\\ in\\\\ effect\\\\..*whose\\\\ uid\\\\ is(\"\n\t\t$s6 = \"$path =\\\"{$root}\\\".((substr($root,-1)!=\\\"/\\\") ? \\\"/\\\" : NULL).\"\n\tcondition:\n\t\t1 of them\n}\nrule webshell_Sst_Sheller {\n\tmeta:\n\t\tdescription = \"Web Shell - file Sst-Sheller.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"d93c62a0a042252f7531d8632511ca56\"\n\tstrings:\n\t\t$s2 = \"echo \\\"<a href='?page=filemanager&id=fm&fchmod=$dir$file'>\"\n\t\t$s3 = \"<? unlink($filename); unlink($filename1); unlink($filename2); unlink($filename3)\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_jsp_list {\n\tmeta:\n\t\tdescription = \"Web Shell - file list.jsp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"1ea290ff4259dcaeb680cec992738eda\"\n\tstrings:\n\t\t$s0 = \"<FORM METHOD=\\\"POST\\\" NAME=\\\"myform\\\" ACTION=\\\"\\\">\" fullword\n\t\t$s2 = \"out.print(\\\") <A Style='Color: \\\" + fcolor.toString() + \\\";' HRef='?file=\\\" + fn\"\n\t\t$s7 = \"if(flist[i].canRead() == true) out.print(\\\"r\\\" ); else out.print(\\\"-\\\");\" fullword\n\tcondition:\n\t\tall of them\n}\nrule webshell_PHPJackal_v1_5 {\n\tmeta:\n\t\tdescription = \"Web Shell - file PHPJackal v1.5.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"d76dc20a4017191216a0315b7286056f\"\n\tstrings:\n\t\t$s7 = \"echo \\\"<center>${t}MySQL cilent:</td><td bgcolor=\\\\\\\"#333333\\\\\\\"></td></tr><form\"\n\t\t$s8 = \"echo \\\"<center>${t}Wordlist generator:</td><td bgcolor=\\\\\\\"#333333\\\\\\\"></td></tr\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_customize {\n\tmeta:\n\t\tdescription = \"Web Shell - file customize.jsp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"d55578eccad090f30f5d735b8ec530b1\"\n\tstrings:\n\t\t$s4 = \"String cs = request.getParameter(\\\"z0\\\")==null?\\\"gbk\\\": request.getParameter(\\\"z\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_s72_Shell_v1_1_Coding {\n\tmeta:\n\t\tdescription = \"Web Shell - file s72 Shell v1.1 Coding.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"c2e8346a5515c81797af36e7e4a3828e\"\n\tstrings:\n\t\t$s5 = \"<font face=\\\"Verdana\\\" style=\\\"font-size: 8pt\\\" color=\\\"#800080\\\">Buradan Dosya \"\n\tcondition:\n\t\tall of them\n}\nrule webshell_jsp_sys3 {\n\tmeta:\n\t\tdescription = \"Web Shell - file sys3.jsp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"b3028a854d07674f4d8a9cf2fb6137ec\"\n\tstrings:\n\t\t$s1 = \"<input type=\\\"submit\\\" name=\\\"btnSubmit\\\" value=\\\"Upload\\\">\" fullword\n\t\t$s4 = \"String path=new String(request.getParameter(\\\"path\\\").getBytes(\\\"ISO-8859-1\\\"\"\n\t\t$s9 = \"<%@page contentType=\\\"text/html;charset=gb2312\\\"%>\" fullword\n\tcondition:\n\t\tall of them\n}\nrule webshell_jsp_guige02 {\n\tmeta:\n\t\tdescription = \"Web Shell - file guige02.jsp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"a3b8b2280c56eaab777d633535baf21d\"\n\tstrings:\n\t\t$s0 = \"????????????????%><html><head><title>hahahaha</title></head><body bgcolor=\\\"#fff\"\n\t\t$s1 = \"<%@page contentType=\\\"text/html; charset=GBK\\\" import=\\\"java.io.*;\\\"%><%!private\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_php_ghost {\n\tmeta:\n\t\tdescription = \"Web Shell - file ghost.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"38dc8383da0859dca82cf0c943dbf16d\"\n\tstrings:\n\t\t$s1 = \"<?php $OOO000000=urldecode('%61%68%36%73%62%65%68%71%6c%61%34%63%6f%5f%73%61%64'\"\n\t\t$s6 = \"//<img width=1 height=1 src=\\\"http://websafe.facaiok.com/just7z/sx.asp?u=***.***\"\n\t\t$s7 = \"preg_replace('\\\\'a\\\\'eis','e'.'v'.'a'.'l'.'(KmU(\\\"\" fullword\n\tcondition:\n\t\tall of them\n}\nrule webshell_WinX_Shell {\n\tmeta:\n\t\tdescription = \"Web Shell - file WinX Shell.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"17ab5086aef89d4951fe9b7c7a561dda\"\n\tstrings:\n\t\t$s5 = \"print \\\"<font face=\\\\\\\"Verdana\\\\\\\" size=\\\\\\\"1\\\\\\\" color=\\\\\\\"#990000\\\\\\\">Filenam\"\n\t\t$s8 = \"print \\\"<font face=\\\\\\\"Verdana\\\\\\\" size=\\\\\\\"1\\\\\\\" color=\\\\\\\"#990000\\\\\\\">File: </\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_Crystal_Crystal {\n\tmeta:\n\t\tdescription = \"Web Shell - file Crystal.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"fdbf54d5bf3264eb1c4bff1fac548879\"\n\tstrings:\n\t\t$s1 = \"show opened ports</option></select><input type=\\\"hidden\\\" name=\\\"cmd_txt\\\" value\"\n\t\t$s6 = \"\\\" href=\\\"?act=tools\\\"><font color=#CC0000 size=\\\"3\\\">Tools</font></a></span></f\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_r57_1_4_0 {\n\tmeta:\n\t\tdescription = \"Web Shell - file r57.1.4.0.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"574f3303e131242568b0caf3de42f325\"\n\tstrings:\n\t\t$s4 = \"@ini_set('error_log',NULL);\" fullword\n\t\t$s6 = \"$pass='abcdef1234567890abcdef1234567890';\" fullword\n\t\t$s7 = \"@ini_restore(\\\"disable_functions\\\");\" fullword\n\t\t$s9 = \"@ini_restore(\\\"safe_mode_exec_dir\\\");\" fullword\n\tcondition:\n\t\tall of them\n}\nrule webshell_jsp_hsxa1 {\n\tmeta:\n\t\tdescription = \"Web Shell - file hsxa1.jsp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"5686d5a38c6f5b8c55095af95c2b0244\"\n\tstrings:\n\t\t$s0 = \"<%@ page language=\\\"java\\\" pageEncoding=\\\"gbk\\\"%><jsp:directive.page import=\\\"ja\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_asp_ajn {\n\tmeta:\n\t\tdescription = \"Web Shell - file ajn.asp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"aaafafc5d286f0bff827a931f6378d04\"\n\tstrings:\n\t\t$s1 = \"seal.write \\\"Set WshShell = CreateObject(\\\"\\\"WScript.Shell\\\"\\\")\\\" & vbcrlf\" fullword\n\t\t$s6 = \"seal.write \\\"BinaryStream.SaveToFile \\\"\\\"c:\\\\downloaded.zip\\\"\\\", adSaveCreateOve\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_php_cmd {\n\tmeta:\n\t\tdescription = \"Web Shell - file cmd.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"c38ae5ba61fd84f6bbbab98d89d8a346\"\n\tstrings:\n\t\t$s0 = \"if($_GET['cmd']) {\" fullword\n\t\t$s1 = \"// cmd.php = Command Execution\" fullword\n\t\t$s7 = \"  system($_GET['cmd']);\" fullword\n\tcondition:\n\t\tall of them\n}\nrule webshell_asp_list {\n\tmeta:\n\t\tdescription = \"Web Shell - file list.asp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"1cfa493a165eb4b43e6d4cc0f2eab575\"\n\tstrings:\n\t\t$s0 = \"<INPUT TYPE=\\\"hidden\\\" NAME=\\\"type\\\" value=\\\"<%=tipo%>\\\">\" fullword\n\t\t$s4 = \"Response.Write(\\\"<h3>FILE: \\\" & file & \\\"</h3>\\\")\" fullword\n\tcondition:\n\t\tall of them\n}\nrule webshell_PHP_co {\n\tmeta:\n\t\tdescription = \"Web Shell - file co.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"62199f5ac721a0cb9b28f465a513874c\"\n\tstrings:\n\t\t$s0 = \"cGX6R9q733WvRRjISKHOp9neT7wa6ZAD8uthmVJV\" fullword\n\t\t$s11 = \"6Mk36lz/HOkFfoXX87MpPhZzBQH6OaYukNg1OE1j\" fullword\n\tcondition:\n\t\tall of them\n}\nrule webshell_PHP_150 {\n\tmeta:\n\t\tdescription = \"Web Shell - file 150.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"400c4b0bed5c90f048398e1d268ce4dc\"\n\tstrings:\n\t\t$s0 = \"HJ3HjqxclkZfp\"\n\t\t$s1 = \"<? eval(gzinflate(base64_decode('\" fullword\n\tcondition:\n\t\tall of them\n}\nrule webshell_jsp_cmdjsp_2 {\n\tmeta:\n\t\tdescription = \"Web Shell - file cmdjsp.jsp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"1b5ae3649f03784e2a5073fa4d160c8b\"\n\tstrings:\n\t\t$s0 = \"Process p = Runtime.getRuntime().exec(\\\"cmd.exe /C \\\" + cmd);\" fullword\n\t\t$s4 = \"<FORM METHOD=GET ACTION='cmdjsp.jsp'>\" fullword\n\tcondition:\n\t\tall of them\n}\nrule webshell_PHP_c37 {\n\tmeta:\n\t\tdescription = \"Web Shell - file c37.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"d01144c04e7a46870a8dd823eb2fe5c8\"\n\tstrings:\n\t\t$s3 = \"array('cpp','cxx','hxx','hpp','cc','jxx','c++','vcproj'),\"\n\t\t$s9 = \"++$F; $File = urlencode($dir[$dirFILE]); $eXT = '.:'; if (strpos($dir[$dirFILE],\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_PHP_b37 {\n\tmeta:\n\t\tdescription = \"Web Shell - file b37.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"0421445303cfd0ec6bc20b3846e30ff0\"\n\tstrings:\n\t\t$s0 = \"xmg2/G4MZ7KpNveRaLgOJvBcqa2A8/sKWp9W93NLXpTTUgRc\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_php_backdoor {\n\tmeta:\n\t\tdescription = \"Web Shell - file php-backdoor.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"2b5cb105c4ea9b5ebc64705b4bd86bf7\"\n\tstrings:\n\t\t$s1 = \"if(!move_uploaded_file($HTTP_POST_FILES['file_name']['tmp_name'], $dir.$fname))\" fullword\n\t\t$s2 = \"<pre><form action=\\\"<? echo $PHP_SELF; ?>\\\" METHOD=GET >execute command: <input \"\n\tcondition:\n\t\tall of them\n}\nrule webshell_asp_dabao {\n\tmeta:\n\t\tdescription = \"Web Shell - file dabao.asp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"3919b959e3fa7e86d52c2b0a91588d5d\"\n\tstrings:\n\t\t$s2 = \" Echo \\\"<input type=button name=Submit onclick=\\\"\\\"document.location =&#039;\\\" &\"\n\t\t$s8 = \" Echo \\\"document.Frm_Pack.FileName.value=\\\"\\\"\\\"\\\"+year+\\\"\\\"-\\\"\\\"+(month+1)+\\\"\\\"-\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_php_2 {\n\tmeta:\n\t\tdescription = \"Web Shell - file 2.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"267c37c3a285a84f541066fc5b3c1747\"\n\tstrings:\n\t\t$s0 = \"<?php assert($_REQUEST[\\\"c\\\"]);?> \" fullword\n\tcondition:\n\t\tall of them\n}\nrule webshell_asp_cmdasp {\n\tmeta:\n\t\tdescription = \"Web Shell - file cmdasp.asp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"57b51418a799d2d016be546f399c2e9b\"\n\tstrings:\n\t\t$s0 = \"<%= \\\"\\\\\\\\\\\" & oScriptNet.ComputerName & \\\"\\\\\\\" & oScriptNet.UserName %>\" fullword\n\t\t$s7 = \"Call oScript.Run (\\\"cmd.exe /c \\\" & szCMD & \\\" > \\\" & szTempFile, 0, True)\" fullword\n\tcondition:\n\t\tall of them\n}\nrule webshell_spjspshell {\n\tmeta:\n\t\tdescription = \"Web Shell - file spjspshell.jsp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"d39d51154aaad4ba89947c459a729971\"\n\tstrings:\n\t\t$s7 = \"Unix:/bin/sh -c tar vxf xxx.tar Windows:c:\\\\winnt\\\\system32\\\\cmd.exe /c type c:\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_jsp_action {\n\tmeta:\n\t\tdescription = \"Web Shell - file action.jsp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"5a7d931094f5570aaf5b7b3b06c3d8c0\"\n\tstrings:\n\t\t$s1 = \"String url=\\\"jdbc:oracle:thin:@localhost:1521:orcl\\\";\" fullword\n\t\t$s6 = \"<%@ page contentType=\\\"text/html;charset=gb2312\\\"%>\" fullword\n\tcondition:\n\t\tall of them\n}\nrule webshell_Inderxer {\n\tmeta:\n\t\tdescription = \"Web Shell - file Inderxer.asp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"9ea82afb8c7070817d4cdf686abe0300\"\n\tstrings:\n\t\t$s4 = \"<td>Nereye :<td><input type=\\\"text\\\" name=\\\"nereye\\\" size=25></td><td><input typ\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_asp_Rader {\n\tmeta:\n\t\tdescription = \"Web Shell - file Rader.asp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"ad1a362e0a24c4475335e3e891a01731\"\n\tstrings:\n\t\t$s1 = \"FONT-WEIGHT: bold; FONT-SIZE: 10px; BACKGROUND: none transparent scroll repeat 0\"\n\t\t$s3 = \"m\\\" target=inf onClick=\\\"window.open('?action=help','inf','width=450,height=400 \"\n\tcondition:\n\t\tall of them\n}\nrule webshell_c99_madnet_smowu {\n\tmeta:\n\t\tdescription = \"Web Shell - file smowu.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"3aaa8cad47055ba53190020311b0fb83\"\n\tstrings:\n\t\t$s0 = \"//Authentication\" fullword\n\t\t$s1 = \"$login = \\\"\" fullword\n\t\t$s2 = \"eval(gzinflate(base64_decode('\"\n\t\t$s4 = \"//Pass\"\n\t\t$s5 = \"$md5_pass = \\\"\"\n\t\t$s6 = \"//If no pass then hash\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_php_moon {\n\tmeta:\n\t\tdescription = \"Web Shell - file moon.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"2a2b1b783d3a2fa9a50b1496afa6e356\"\n\tstrings:\n\t\t$s2 = \"echo '<option value=\\\"create function backshell returns string soname\"\n\t\t$s3 = \"echo      \\\"<input name='p' type='text' size='27' value='\\\".dirname(_FILE_).\\\"\"\n\t\t$s8 = \"echo '<option value=\\\"select cmdshell(\\\\'net user \"\n\tcondition:\n\t\t2 of them\n}\nrule webshell_jsp_jdbc {\n\tmeta:\n\t\tdescription = \"Web Shell - file jdbc.jsp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"23b0e6f91a8f0d93b9c51a2a442119ce\"\n\tstrings:\n\t\t$s4 = \"String cs = request.getParameter(\\\"z0\\\")==null?\\\"gbk\\\": request.getParameter(\\\"z\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_minupload {\n\tmeta:\n\t\tdescription = \"Web Shell - file minupload.jsp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"ec905a1395d176c27f388d202375bdf9\"\n\tstrings:\n\t\t$s0 = \"<input type=\\\"submit\\\" name=\\\"btnSubmit\\\" value=\\\"Upload\\\">   \" fullword\n\t\t$s9 = \"String path=new String(request.getParameter(\\\"path\\\").getBytes(\\\"ISO-8859\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_ELMALISEKER_Backd00r {\n\tmeta:\n\t\tdescription = \"Web Shell - file ELMALISEKER Backd00r.asp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"3aa403e0a42badb2c23d4a54ef43e2f4\"\n\tstrings:\n\t\t$s0 = \"response.write(\\\"<tr><td bgcolor=#F8F8FF><input type=submit name=cmdtxtFileOptio\"\n\t\t$s2 = \"if FP = \\\"RefreshFolder\\\" or request.form(\\\"cmdOption\\\")=\\\"DeleteFolder\\\" or req\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_PHP_bug_1_ {\n\tmeta:\n\t\tdescription = \"Web Shell - file bug (1).php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"91c5fae02ab16d51fc5af9354ac2f015\"\n\tstrings:\n\t\t$s0 = \"@include($_GET['bug']);\" fullword\n\tcondition:\n\t\tall of them\n}\nrule webshell_caidao_shell_hkmjj {\n\tmeta:\n\t\tdescription = \"Web Shell - file hkmjj.asp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"e7b994fe9f878154ca18b7cde91ad2d0\"\n\tstrings:\n\t\t$s6 = \"codeds=\\\"Li#uhtxhvw+%{{%,#@%{%#wkhq#hydo#uhtxhvw+%knpmm%,#hqg#li\\\"  \" fullword\n\tcondition:\n\t\tall of them\n}\nrule webshell_jsp_asd {\n\tmeta:\n\t\tdescription = \"Web Shell - file asd.jsp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"a042c2ca64176410236fcc97484ec599\"\n\tstrings:\n\t\t$s3 = \"<%@ page language=\\\"java\\\" pageEncoding=\\\"gbk\\\"%>\" fullword\n\t\t$s6 = \"<input size=\\\"100\\\" value=\\\"<%=application.getRealPath(\\\"/\\\") %>\\\" name=\\\"url\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_jsp_inback3 {\n\tmeta:\n\t\tdescription = \"Web Shell - file inback3.jsp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"ea5612492780a26b8aa7e5cedd9b8f4e\"\n\tstrings:\n\t\t$s0 = \"<%if(request.getParameter(\\\"f\\\")!=null)(new java.io.FileOutputStream(application\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_metaslsoft {\n\tmeta:\n\t\tdescription = \"Web Shell - file metaslsoft.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"aa328ed1476f4a10c0bcc2dde4461789\"\n\tstrings:\n\t\t$s7 = \"$buff .= \\\"<tr><td><a href=\\\\\\\"?d=\\\".$pwd.\\\"\\\\\\\">[ $folder ]</a></td><td>LINK</t\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_asp_Ajan {\n\tmeta:\n\t\tdescription = \"Web Shell - file Ajan.asp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\thash = \"b6f468252407efc2318639da22b08af0\"\n\tstrings:\n\t\t$s3 = \"entrika.write \\\"BinaryStream.SaveToFile \\\"\\\"c:\\\\downloaded.zip\\\"\\\", adSaveCreate\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_config_myxx_zend {\n\tmeta:\n\t\tdescription = \"Web Shell - from files config.jsp, myxx.jsp, zend.jsp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\tsuper_rule = 1\n\t\thash0 = \"d44df8b1543b837e57cc8f25a0a68d92\"\n\t\thash1 = \"e0354099bee243702eb11df8d0e046df\"\n\t\thash2 = \"591ca89a25f06cf01e4345f98a22845c\"\n\tstrings:\n\t\t$s3 = \".println(\\\"<a href=\\\\\\\"javascript:alert('You Are In File Now ! Can Not Pack !');\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_browser_201_3_ma_download {\n\tmeta:\n\t\tdescription = \"Web Shell - from files browser.jsp, 201.jsp, 3.jsp, ma.jsp, download.jsp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\tsuper_rule = 1\n\t\thash0 = \"37603e44ee6dc1c359feb68a0d566f76\"\n\t\thash1 = \"a7e25b8ac605753ed0c438db93f6c498\"\n\t\thash2 = \"fb8c6c3a69b93e5e7193036fd31a958d\"\n\t\thash3 = \"4cc68fa572e88b669bce606c7ace0ae9\"\n\t\thash4 = \"fa87bbd7201021c1aefee6fcc5b8e25a\"\n\tstrings:\n\t\t$s2 = \"<small>jsp File Browser version <%= VERSION_NR%> by <a\"\n\t\t$s3 = \"else if (fName.endsWith(\\\".mpg\\\") || fName.endsWith(\\\".mpeg\\\") || fName.endsWith\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_itsec_itsecteam_shell_jHn {\n\tmeta:\n\t\tdescription = \"Web Shell - from files itsec.php, itsecteam_shell.php, jHn.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\tsuper_rule = 1\n\t\thash0 = \"8ae9d2b50dc382f0571cd7492f079836\"\n\t\thash1 = \"bd6d3b2763c705a01cc2b3f105a25fa4\"\n\t\thash2 = \"40c6ecf77253e805ace85f119fe1cebb\"\n\tstrings:\n\t\t$s4 = \"echo $head.\\\"<font face='Tahoma' size='2'>Operating System : \\\".php_uname().\\\"<b\"\n\t\t$s5 = \"echo \\\"<center><form name=client method='POST' action='$_SERVER[PHP_SELF]?do=db'\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_ghost_source_icesword_silic {\n\tmeta:\n\t\tdescription = \"Web Shell - from files ghost_source.php, icesword.php, silic.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\tsuper_rule = 1\n\t\thash0 = \"cbf64a56306c1b5d98898468fc1fdbd8\"\n\t\thash1 = \"6e20b41c040efb453d57780025a292ae\"\n\t\thash2 = \"437d30c94f8eef92dc2f064de4998695\"\n\tstrings:\n\t\t$s3 = \"if(eregi('WHERE|LIMIT',$_POST['nsql']) && eregi('SELECT|FROM',$_POST['nsql'])) $\"\n\t\t$s6 = \"if(!empty($_FILES['ufp']['name'])){if($_POST['ufn'] != '') $upfilename = $_POST[\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_JspSpy_JspSpyJDK5_JspSpyJDK51_luci_jsp_spy2009_m_ma3_xxx {\n\tmeta:\n\t\tdescription = \"Web Shell - from files 000.jsp, 403.jsp, 807.jsp, a.jsp, c5.jsp, css.jsp, dm.jsp, he1p.jsp, JspSpy.jsp, JspSpyJDK5.jsp, JspSpyJDK51.jsp, luci.jsp.spy2009.jsp, m.jsp, ma3.jsp, mmym520.jsp, nogfw.jsp, ok.jsp, queryDong.jsp, spyjsp2010.jsp, style.jsp, t00ls.jsp, u.jsp, xia.jsp, cofigrue.jsp, 1.jsp, jspspy.jsp, jspspy_k8.jsp, JspSpy.jsp, JspSpyJDK5.jsp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\tsuper_rule = 1\n\t\thash0 = \"2eeb8bf151221373ee3fd89d58ed4d38\"\n\t\thash1 = \"059058a27a7b0059e2c2f007ad4675ef\"\n\t\thash2 = \"ae76c77fb7a234380cd0ebb6fe1bcddf\"\n\t\thash3 = \"76037ebd781ad0eac363d56fc81f4b4f\"\n\t\thash4 = \"8b457934da3821ba58b06a113e0d53d9\"\n\t\thash5 = \"fc44f6b4387a2cb50e1a63c66a8cb81c\"\n\t\thash6 = \"14e9688c86b454ed48171a9d4f48ace8\"\n\t\thash7 = \"b330a6c2d49124ef0729539761d6ef0b\"\n\t\thash8 = \"d71716df5042880ef84427acee8b121e\"\n\t\thash9 = \"341298482cf90febebb8616426080d1d\"\n\t\thash10 = \"29aebe333d6332f0ebc2258def94d57e\"\n\t\thash11 = \"42654af68e5d4ea217e6ece5389eb302\"\n\t\thash12 = \"88fc87e7c58249a398efd5ceae636073\"\n\t\thash13 = \"4a812678308475c64132a9b56254edbc\"\n\t\thash14 = \"9626eef1a8b9b8d773a3b2af09306a10\"\n\t\thash15 = \"344f9073576a066142b2023629539ebd\"\n\t\thash16 = \"32dea47d9c13f9000c4c807561341bee\"\n\t\thash17 = \"90a5ba0c94199269ba33a58bc6a4ad99\"\n\t\thash18 = \"655722eaa6c646437c8ae93daac46ae0\"\n\t\thash19 = \"b9744f6876919c46a29ea05b1d95b1c3\"\n\t\thash20 = \"9c94637f76e68487fa33f7b0030dd932\"\n\t\thash21 = \"6acc82544be056580c3a1caaa4999956\"\n\t\thash22 = \"6aa32a6392840e161a018f3907a86968\"\n\t\thash23 = \"349ec229e3f8eda0f9eb918c74a8bf4c\"\n\t\thash24 = \"3ea688e3439a1f56b16694667938316d\"\n\t\thash25 = \"ab77e4d1006259d7cbc15884416ca88c\"\n\t\thash26 = \"71097537a91fac6b01f46f66ee2d7749\"\n\t\thash27 = \"2434a7a07cb47ce25b41d30bc291cacc\"\n\t\thash28 = \"7a4b090619ecce6f7bd838fe5c58554b\"\n\tstrings:\n\t\t$s8 = \"\\\"<form action=\\\\\\\"\\\"+SHELL_NAME+\\\"?o=upload\\\\\\\" method=\\\\\\\"POST\\\\\\\" enctype=\"\n\t\t$s9 = \"<option value='reg query \\\\\\\"HKLM\\\\\\\\System\\\\\\\\CurrentControlSet\\\\\\\\Control\\\\\\\\T\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_2_520_job_ma1_ma4_2 {\n\tmeta:\n\t\tdescription = \"Web Shell - from files 2.jsp, 520.jsp, job.jsp, ma1.jsp, ma4.jsp, 2.jsp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\tsuper_rule = 1\n\t\thash0 = \"64a3bf9142b045b9062b204db39d4d57\"\n\t\thash1 = \"9abd397c6498c41967b4dd327cf8b55a\"\n\t\thash2 = \"56c005690da2558690c4aa305a31ad37\"\n\t\thash3 = \"532b93e02cddfbb548ce5938fe2f5559\"\n\t\thash4 = \"6e0fa491d620d4af4b67bae9162844ae\"\n\t\thash5 = \"7eabe0f60975c0c73d625b7ddf7b9cbd\"\n\tstrings:\n\t\t$s4 = \"_url = \\\"jdbc:microsoft:sqlserver://\\\" + dbServer + \\\":\\\" + dbPort + \\\";User=\\\" \"\n\t\t$s9 = \"result += \\\"<meta http-equiv=\\\\\\\"refresh\\\\\\\" content=\\\\\\\"2;url=\\\" + request.getR\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_000_403_807_a_c5_config_css_dm_he1p_JspSpy_JspSpyJDK5_JspSpyJDK51_luci_jsp_xxx {\n\tmeta:\n\t\tdescription = \"Web Shell - from files 000.jsp, 403.jsp, 807.jsp, a.jsp, c5.jsp, config.jsp, css.jsp, dm.jsp, he1p.jsp, JspSpy.jsp, JspSpyJDK5.jsp, JspSpyJDK51.jsp, luci.jsp.spy2009.jsp, m.jsp, ma3.jsp, mmym520.jsp, myxx.jsp, nogfw.jsp, ok.jsp, queryDong.jsp, spyjsp2010.jsp, style.jsp, t00ls.jsp, u.jsp, xia.jsp, zend.jsp, cofigrue.jsp, 1.jsp, jspspy.jsp, jspspy_k8.jsp, JspSpy.jsp, JspSpyJDK5.jsp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\tsuper_rule = 1\n\t\thash0 = \"2eeb8bf151221373ee3fd89d58ed4d38\"\n\t\thash1 = \"059058a27a7b0059e2c2f007ad4675ef\"\n\t\thash2 = \"ae76c77fb7a234380cd0ebb6fe1bcddf\"\n\t\thash3 = \"76037ebd781ad0eac363d56fc81f4b4f\"\n\t\thash4 = \"8b457934da3821ba58b06a113e0d53d9\"\n\t\thash5 = \"d44df8b1543b837e57cc8f25a0a68d92\"\n\t\thash6 = \"fc44f6b4387a2cb50e1a63c66a8cb81c\"\n\t\thash7 = \"14e9688c86b454ed48171a9d4f48ace8\"\n\t\thash8 = \"b330a6c2d49124ef0729539761d6ef0b\"\n\t\thash9 = \"d71716df5042880ef84427acee8b121e\"\n\t\thash10 = \"341298482cf90febebb8616426080d1d\"\n\t\thash11 = \"29aebe333d6332f0ebc2258def94d57e\"\n\t\thash12 = \"42654af68e5d4ea217e6ece5389eb302\"\n\t\thash13 = \"88fc87e7c58249a398efd5ceae636073\"\n\t\thash14 = \"4a812678308475c64132a9b56254edbc\"\n\t\thash15 = \"9626eef1a8b9b8d773a3b2af09306a10\"\n\t\thash16 = \"e0354099bee243702eb11df8d0e046df\"\n\t\thash17 = \"344f9073576a066142b2023629539ebd\"\n\t\thash18 = \"32dea47d9c13f9000c4c807561341bee\"\n\t\thash19 = \"90a5ba0c94199269ba33a58bc6a4ad99\"\n\t\thash20 = \"655722eaa6c646437c8ae93daac46ae0\"\n\t\thash21 = \"b9744f6876919c46a29ea05b1d95b1c3\"\n\t\thash22 = \"9c94637f76e68487fa33f7b0030dd932\"\n\t\thash23 = \"6acc82544be056580c3a1caaa4999956\"\n\t\thash24 = \"6aa32a6392840e161a018f3907a86968\"\n\t\thash25 = \"591ca89a25f06cf01e4345f98a22845c\"\n\t\thash26 = \"349ec229e3f8eda0f9eb918c74a8bf4c\"\n\t\thash27 = \"3ea688e3439a1f56b16694667938316d\"\n\t\thash28 = \"ab77e4d1006259d7cbc15884416ca88c\"\n\t\thash29 = \"71097537a91fac6b01f46f66ee2d7749\"\n\t\thash30 = \"2434a7a07cb47ce25b41d30bc291cacc\"\n\t\thash31 = \"7a4b090619ecce6f7bd838fe5c58554b\"\n\tstrings:\n\t\t$s0 = \"ports = \\\"21,25,80,110,1433,1723,3306,3389,4899,5631,43958,65500\\\";\" fullword\n\t\t$s1 = \"private static class VEditPropertyInvoker extends DefaultInvoker {\" fullword\n\tcondition:\n\t\tall of them\n}\nrule webshell_wso2_5_1_wso2_5_wso2 {\n\tmeta:\n\t\tdescription = \"Web Shell - from files wso2.5.1.php, wso2.5.php, wso2.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\tsuper_rule = 1\n\t\thash0 = \"dbeecd555a2ef80615f0894027ad75dc\"\n\t\thash1 = \"7c8e5d31aad28eb1f0a9a53145551e05\"\n\t\thash2 = \"cbc44fb78220958f81b739b493024688\"\n\tstrings:\n\t\t$s7 = \"$opt_charsets .= '<option value=\\\"'.$item.'\\\" '.($_POST['charset']==$item?'selec\"\n\t\t$s8 = \".'</td><td><a href=\\\"#\\\" onclick=\\\"g(\\\\'FilesTools\\\\',null,\\\\''.urlencode($f['na\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_000_403_c5_queryDong_spyjsp2010_t00ls {\n\tmeta:\n\t\tdescription = \"Web Shell - from files 000.jsp, 403.jsp, c5.jsp, queryDong.jsp, spyjsp2010.jsp, t00ls.jsp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\tsuper_rule = 1\n\t\thash0 = \"2eeb8bf151221373ee3fd89d58ed4d38\"\n\t\thash1 = \"059058a27a7b0059e2c2f007ad4675ef\"\n\t\thash2 = \"8b457934da3821ba58b06a113e0d53d9\"\n\t\thash3 = \"90a5ba0c94199269ba33a58bc6a4ad99\"\n\t\thash4 = \"655722eaa6c646437c8ae93daac46ae0\"\n\t\thash5 = \"9c94637f76e68487fa33f7b0030dd932\"\n\tstrings:\n\t\t$s8 = \"table.append(\\\"<td nowrap> <a href=\\\\\\\"#\\\\\\\" onclick=\\\\\\\"view('\\\"+tbName+\\\"')\"\n\t\t$s9 = \"\\\"<p><input type=\\\\\\\"hidden\\\\\\\" name=\\\\\\\"selectDb\\\\\\\" value=\\\\\\\"\\\"+selectDb+\\\"\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_404_data_suiyue {\n\tmeta:\n\t\tdescription = \"Web Shell - from files 404.jsp, data.jsp, suiyue.jsp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\tsuper_rule = 1\n\t\thash0 = \"7066f4469c3ec20f4890535b5f299122\"\n\t\thash1 = \"9f54aa7b43797be9bab7d094f238b4ff\"\n\t\thash2 = \"c93d5bdf5cf62fe22e299d0f2b865ea7\"\n\tstrings:\n\t\t$s3 = \" sbCopy.append(\\\"<input type=button name=goback value=' \\\"+strBack[languageNo]+\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_r57shell_r57shell127_SnIpEr_SA_Shell_EgY_SpIdEr_ShElL_V2_r57_xxx {\n\tmeta:\n\t\tdescription = \"Web Shell - from files r57shell.php, r57shell127.php, SnIpEr_SA Shell.php, EgY_SpIdEr ShElL V2.php, r57_iFX.php, r57_kartal.php, r57_Mohajer22.php, r57.php, r57.php, Backdoor.PHP.Agent.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\tsuper_rule = 1\n\t\thash0 = \"ef43fef943e9df90ddb6257950b3538f\"\n\t\thash1 = \"ae025c886fbe7f9ed159f49593674832\"\n\t\thash2 = \"911195a9b7c010f61b66439d9048f400\"\n\t\thash3 = \"697dae78c040150daff7db751fc0c03c\"\n\t\thash4 = \"513b7be8bd0595c377283a7c87b44b2e\"\n\t\thash5 = \"1d912c55b96e2efe8ca873d6040e3b30\"\n\t\thash6 = \"e5b2131dd1db0dbdb43b53c5ce99016a\"\n\t\thash7 = \"4108f28a9792b50d95f95b9e5314fa1e\"\n\t\thash8 = \"41af6fd253648885c7ad2ed524e0692d\"\n\t\thash9 = \"6fcc283470465eed4870bcc3e2d7f14d\"\n\tstrings:\n\t\t$s2 = \"echo sr(15,\\\"<b>\\\".$lang[$language.'_text58'].$arrow.\\\"</b>\\\",in('text','mk_name\"\n\t\t$s3 = \"echo sr(15,\\\"<b>\\\".$lang[$language.'_text21'].$arrow.\\\"</b>\\\",in('checkbox','nf1\"\n\t\t$s9 = \"echo sr(40,\\\"<b>\\\".$lang[$language.'_text26'].$arrow.\\\"</b>\\\",\\\"<select size=\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_807_a_css_dm_he1p_JspSpy_xxx {\n\tmeta:\n\t\tdescription = \"Web Shell - from files 807.jsp, a.jsp, css.jsp, dm.jsp, he1p.jsp, JspSpy.jsp, JspSpyJDK5.jsp, JspSpyJDK51.jsp, luci.jsp.spy2009.jsp, m.jsp, ma3.jsp, mmym520.jsp, nogfw.jsp, ok.jsp, style.jsp, u.jsp, xia.jsp, cofigrue.jsp, 1.jsp, jspspy.jsp, jspspy_k8.jsp, JspSpy.jsp, JspSpyJDK5.jsp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\tsuper_rule = 1\n\t\thash0 = \"ae76c77fb7a234380cd0ebb6fe1bcddf\"\n\t\thash1 = \"76037ebd781ad0eac363d56fc81f4b4f\"\n\t\thash2 = \"fc44f6b4387a2cb50e1a63c66a8cb81c\"\n\t\thash3 = \"14e9688c86b454ed48171a9d4f48ace8\"\n\t\thash4 = \"b330a6c2d49124ef0729539761d6ef0b\"\n\t\thash5 = \"d71716df5042880ef84427acee8b121e\"\n\t\thash6 = \"341298482cf90febebb8616426080d1d\"\n\t\thash7 = \"29aebe333d6332f0ebc2258def94d57e\"\n\t\thash8 = \"42654af68e5d4ea217e6ece5389eb302\"\n\t\thash9 = \"88fc87e7c58249a398efd5ceae636073\"\n\t\thash10 = \"4a812678308475c64132a9b56254edbc\"\n\t\thash11 = \"9626eef1a8b9b8d773a3b2af09306a10\"\n\t\thash12 = \"344f9073576a066142b2023629539ebd\"\n\t\thash13 = \"32dea47d9c13f9000c4c807561341bee\"\n\t\thash14 = \"b9744f6876919c46a29ea05b1d95b1c3\"\n\t\thash15 = \"6acc82544be056580c3a1caaa4999956\"\n\t\thash16 = \"6aa32a6392840e161a018f3907a86968\"\n\t\thash17 = \"349ec229e3f8eda0f9eb918c74a8bf4c\"\n\t\thash18 = \"3ea688e3439a1f56b16694667938316d\"\n\t\thash19 = \"ab77e4d1006259d7cbc15884416ca88c\"\n\t\thash20 = \"71097537a91fac6b01f46f66ee2d7749\"\n\t\thash21 = \"2434a7a07cb47ce25b41d30bc291cacc\"\n\t\thash22 = \"7a4b090619ecce6f7bd838fe5c58554b\"\n\tstrings:\n\t\t$s1 = \"\\\"<h2>Remote Control &raquo;</h2><input class=\\\\\\\"bt\\\\\\\" onclick=\\\\\\\"var\"\n\t\t$s2 = \"\\\"<p>Current File (import new file name and new file)<br /><input class=\\\\\\\"inpu\"\n\t\t$s3 = \"\\\"<p>Current file (fullpath)<br /><input class=\\\\\\\"input\\\\\\\" name=\\\\\\\"file\\\\\\\" i\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_201_3_ma_download {\n\tmeta:\n\t\tdescription = \"Web Shell - from files 201.jsp, 3.jsp, ma.jsp, download.jsp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\tsuper_rule = 1\n\t\thash0 = \"a7e25b8ac605753ed0c438db93f6c498\"\n\t\thash1 = \"fb8c6c3a69b93e5e7193036fd31a958d\"\n\t\thash2 = \"4cc68fa572e88b669bce606c7ace0ae9\"\n\t\thash3 = \"fa87bbd7201021c1aefee6fcc5b8e25a\"\n\tstrings:\n\t\t$s0 = \"<input title=\\\"Upload selected file to the current working directory\\\" type=\\\"Su\"\n\t\t$s5 = \"<input title=\\\"Launch command in current directory\\\" type=\\\"Submit\\\" class=\\\"but\"\n\t\t$s6 = \"<input title=\\\"Delete all selected files and directories incl. subdirs\\\" class=\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_browser_201_3_400_in_JFolder_jfolder01_jsp_leo_ma_warn_webshell_nc_download {\n\tmeta:\n\t\tdescription = \"Web Shell - from files browser.jsp, 201.jsp, 3.jsp, 400.jsp, in.jsp, JFolder.jsp, jfolder01.jsp, jsp.jsp, leo.jsp, ma.jsp, warn.jsp, webshell-nc.jsp, download.jsp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\tsuper_rule = 1\n\t\thash0 = \"37603e44ee6dc1c359feb68a0d566f76\"\n\t\thash1 = \"a7e25b8ac605753ed0c438db93f6c498\"\n\t\thash2 = \"fb8c6c3a69b93e5e7193036fd31a958d\"\n\t\thash3 = \"36331f2c81bad763528d0ae00edf55be\"\n\t\thash4 = \"793b3d0a740dbf355df3e6f68b8217a4\"\n\t\thash5 = \"8979594423b68489024447474d113894\"\n\t\thash6 = \"ec482fc969d182e5440521c913bab9bd\"\n\t\thash7 = \"f98d2b33cd777e160d1489afed96de39\"\n\t\thash8 = \"4b4c12b3002fad88ca6346a873855209\"\n\t\thash9 = \"4cc68fa572e88b669bce606c7ace0ae9\"\n\t\thash10 = \"e9a5280f77537e23da2545306f6a19ad\"\n\t\thash11 = \"598eef7544935cf2139d1eada4375bb5\"\n\t\thash12 = \"fa87bbd7201021c1aefee6fcc5b8e25a\"\n\tstrings:\n\t\t$s4 = \"UplInfo info = UploadMonitor.getInfo(fi.clientFileName);\" fullword\n\t\t$s5 = \"long time = (System.currentTimeMillis() - starttime) / 1000l;\" fullword\n\tcondition:\n\t\tall of them\n}\nrule webshell_shell_phpspy_2006_arabicspy {\n\tmeta:\n\t\tdescription = \"Web Shell - from files shell.php, phpspy_2006.php, arabicspy.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\tsuper_rule = 1\n\t\thash0 = \"791708057d8b429d91357d38edf43cc0\"\n\t\thash1 = \"40a1f840111996ff7200d18968e42cfe\"\n\t\thash2 = \"e0202adff532b28ef1ba206cf95962f2\"\n\tstrings:\n\t\t$s0 = \"elseif(($regwrite) AND !empty($_POST['writeregname']) AND !empty($_POST['regtype\"\n\t\t$s8 = \"echo \\\"<form action=\\\\\\\"?action=shell&dir=\\\".urlencode($dir).\\\"\\\\\\\" method=\\\\\\\"P\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_in_JFolder_jfolder01_jsp_leo_warn {\n\tmeta:\n\t\tdescription = \"Web Shell - from files in.jsp, JFolder.jsp, jfolder01.jsp, jsp.jsp, leo.jsp, warn.jsp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\tsuper_rule = 1\n\t\thash0 = \"793b3d0a740dbf355df3e6f68b8217a4\"\n\t\thash1 = \"8979594423b68489024447474d113894\"\n\t\thash2 = \"ec482fc969d182e5440521c913bab9bd\"\n\t\thash3 = \"f98d2b33cd777e160d1489afed96de39\"\n\t\thash4 = \"4b4c12b3002fad88ca6346a873855209\"\n\t\thash5 = \"e9a5280f77537e23da2545306f6a19ad\"\n\tstrings:\n\t\t$s4 = \"sbFile.append(\\\"  &nbsp;<a href=\\\\\\\"javascript:doForm('down','\\\"+formatPath(strD\"\n\t\t$s9 = \"sbFile.append(\\\" &nbsp;<a href=\\\\\\\"javascript:doForm('edit','\\\"+formatPath(strDi\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_2_520_icesword_job_ma1_ma4_2 {\n\tmeta:\n\t\tdescription = \"Web Shell - from files 2.jsp, 520.jsp, icesword.jsp, job.jsp, ma1.jsp, ma4.jsp, 2.jsp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\tsuper_rule = 1\n\t\thash0 = \"64a3bf9142b045b9062b204db39d4d57\"\n\t\thash1 = \"9abd397c6498c41967b4dd327cf8b55a\"\n\t\thash2 = \"077f4b1b6d705d223b6d644a4f3eebae\"\n\t\thash3 = \"56c005690da2558690c4aa305a31ad37\"\n\t\thash4 = \"532b93e02cddfbb548ce5938fe2f5559\"\n\t\thash5 = \"6e0fa491d620d4af4b67bae9162844ae\"\n\t\thash6 = \"7eabe0f60975c0c73d625b7ddf7b9cbd\"\n\tstrings:\n\t\t$s2 = \"private String[] _textFileTypes = {\\\"txt\\\", \\\"htm\\\", \\\"html\\\", \\\"asp\\\", \\\"jsp\\\",\"\n\t\t$s3 = \"\\\\\\\" name=\\\\\\\"upFile\\\\\\\" size=\\\\\\\"8\\\\\\\" class=\\\\\\\"textbox\\\\\\\" />&nbsp;<input typ\"\n\t\t$s9 = \"if (request.getParameter(\\\"password\\\") == null && session.getAttribute(\\\"passwor\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_phpspy_2005_full_phpspy_2005_lite_PHPSPY {\n\tmeta:\n\t\tdescription = \"Web Shell - from files phpspy_2005_full.php, phpspy_2005_lite.php, PHPSPY.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\tsuper_rule = 1\n\t\thash0 = \"b68bfafc6059fd26732fa07fb6f7f640\"\n\t\thash1 = \"42f211cec8032eb0881e87ebdb3d7224\"\n\t\thash2 = \"0712e3dc262b4e1f98ed25760b206836\"\n\tstrings:\n\t\t$s6 = \"<input type=\\\"text\\\" name=\\\"command\\\" size=\\\"60\\\" value=\\\"<?=$_POST['comma\"\n\t\t$s7 = \"echo $msg=@copy($_FILES['uploadmyfile']['tmp_name'],\\\"\\\".$uploaddir.\\\"/\\\".$_FILE\"\n\t\t$s8 = \"<option value=\\\"passthru\\\" <? if ($execfunc==\\\"passthru\\\") { echo \\\"selected\\\"; \"\n\tcondition:\n\t\t2 of them\n}\nrule webshell_shell_phpspy_2006_arabicspy_hkrkoz {\n\tmeta:\n\t\tdescription = \"Web Shell - from files shell.php, phpspy_2006.php, arabicspy.php, hkrkoz.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\tsuper_rule = 1\n\t\thash0 = \"791708057d8b429d91357d38edf43cc0\"\n\t\thash1 = \"40a1f840111996ff7200d18968e42cfe\"\n\t\thash2 = \"e0202adff532b28ef1ba206cf95962f2\"\n\t\thash3 = \"802f5cae46d394b297482fd0c27cb2fc\"\n\tstrings:\n\t\t$s5 = \"$prog = isset($_POST['prog']) ? $_POST['prog'] : \\\"/c net start > \\\".$pathname.\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_c99_Shell_ci_Biz_was_here_c100_v_xxx {\n\tmeta:\n\t\tdescription = \"Web Shell - from files c99.php, Shell [ci] .Biz was here.php, c100 v. 777shell v. Undetectable #18a Modded by 777 - Don.php, c66.php, c99-shadows-mod.php, c99shell.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\tsuper_rule = 1\n\t\thash0 = \"61a92ce63369e2fa4919ef0ff7c51167\"\n\t\thash1 = \"f2fa878de03732fbf5c86d656467ff50\"\n\t\thash2 = \"27786d1e0b1046a1a7f67ee41c64bf4c\"\n\t\thash3 = \"0f5b9238d281bc6ac13406bb24ac2a5b\"\n\t\thash4 = \"68c0629d08b1664f5bcce7d7f5f71d22\"\n\t\thash5 = \"048ccc01b873b40d57ce25a4c56ea717\"\n\tstrings:\n\t\t$s8 = \"else {echo \\\"Running datapipe... ok! Connect to <b>\\\".getenv(\\\"SERVER_ADDR\\\"\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_2008_2009lite_2009mssql {\n\tmeta:\n\t\tdescription = \"Web Shell - from files 2008.php, 2009lite.php, 2009mssql.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\tsuper_rule = 1\n\t\thash0 = \"3e4ba470d4c38765e4b16ed930facf2c\"\n\t\thash1 = \"3f4d454d27ecc0013e783ed921eeecde\"\n\t\thash2 = \"aa17b71bb93c6789911bd1c9df834ff9\"\n\tstrings:\n\t\t$s0 = \"<a href=\\\"javascript:godir(\\\\''.$drive->Path.'/\\\\');\"\n\t\t$s7 = \"p('<h2>File Manager - Current disk free '.sizecount($free).' of '.sizecount($all\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_shell_phpspy_2005_full_phpspy_2005_lite_phpspy_2006_arabicspy_PHPSPY_hkrkoz {\n\tmeta:\n\t\tdescription = \"Web Shell - from files shell.php, phpspy_2005_full.php, phpspy_2005_lite.php, phpspy_2006.php, arabicspy.php, PHPSPY.php, hkrkoz.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\tsuper_rule = 1\n\t\thash0 = \"791708057d8b429d91357d38edf43cc0\"\n\t\thash1 = \"b68bfafc6059fd26732fa07fb6f7f640\"\n\t\thash2 = \"42f211cec8032eb0881e87ebdb3d7224\"\n\t\thash3 = \"40a1f840111996ff7200d18968e42cfe\"\n\t\thash4 = \"e0202adff532b28ef1ba206cf95962f2\"\n\t\thash5 = \"0712e3dc262b4e1f98ed25760b206836\"\n\t\thash6 = \"802f5cae46d394b297482fd0c27cb2fc\"\n\tstrings:\n\t\t$s0 = \"$mainpath_info           = explode('/', $mainpath);\" fullword\n\t\t$s6 = \"if (!isset($_GET['action']) OR empty($_GET['action']) OR ($_GET['action'] == \\\"d\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_807_dm_JspSpyJDK5_m_cofigrue {\n\tmeta:\n\t\tdescription = \"Web Shell - from files 807.jsp, dm.jsp, JspSpyJDK5.jsp, m.jsp, cofigrue.jsp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\tsuper_rule = 1\n\t\thash0 = \"ae76c77fb7a234380cd0ebb6fe1bcddf\"\n\t\thash1 = \"14e9688c86b454ed48171a9d4f48ace8\"\n\t\thash2 = \"341298482cf90febebb8616426080d1d\"\n\t\thash3 = \"88fc87e7c58249a398efd5ceae636073\"\n\t\thash4 = \"349ec229e3f8eda0f9eb918c74a8bf4c\"\n\tstrings:\n\t\t$s1 = \"url_con.setRequestProperty(\\\"REFERER\\\", \\\"\\\"+fckal+\\\"\\\");\" fullword\n\t\t$s9 = \"FileLocalUpload(uc(dx())+sxm,request.getRequestURL().toString(),  \\\"GBK\\\");\" fullword\n\tcondition:\n\t\t1 of them\n}\nrule webshell_Dive_Shell_1_0_Emperor_Hacking_Team_xxx {\n\tmeta:\n\t\tdescription = \"Web Shell - from files Dive Shell 1.0 - Emperor Hacking Team.php, phpshell.php, SimShell 1.0 - Simorgh Security MGZ.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\tsuper_rule = 1\n\t\thash0 = \"1b5102bdc41a7bc439eea8f0010310a5\"\n\t\thash1 = \"f8a6d5306fb37414c5c772315a27832f\"\n\t\thash2 = \"37cb1db26b1b0161a4bf678a6b4565bd\"\n\tstrings:\n\t\t$s1 = \"if (($i = array_search($_REQUEST['command'], $_SESSION['history'])) !== fals\"\n\t\t$s9 = \"if (ereg('^[[:blank:]]*cd[[:blank:]]*$', $_REQUEST['command'])) {\" fullword\n\tcondition:\n\t\tall of them\n}\nrule webshell_404_data_in_JFolder_jfolder01_xxx {\n\tmeta:\n\t\tdescription = \"Web Shell - from files 404.jsp, data.jsp, in.jsp, JFolder.jsp, jfolder01.jsp, jsp.jsp, leo.jsp, suiyue.jsp, warn.jsp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\tsuper_rule = 1\n\t\thash0 = \"7066f4469c3ec20f4890535b5f299122\"\n\t\thash1 = \"9f54aa7b43797be9bab7d094f238b4ff\"\n\t\thash2 = \"793b3d0a740dbf355df3e6f68b8217a4\"\n\t\thash3 = \"8979594423b68489024447474d113894\"\n\t\thash4 = \"ec482fc969d182e5440521c913bab9bd\"\n\t\thash5 = \"f98d2b33cd777e160d1489afed96de39\"\n\t\thash6 = \"4b4c12b3002fad88ca6346a873855209\"\n\t\thash7 = \"c93d5bdf5cf62fe22e299d0f2b865ea7\"\n\t\thash8 = \"e9a5280f77537e23da2545306f6a19ad\"\n\tstrings:\n\t\t$s4 = \"&nbsp;<TEXTAREA NAME=\\\"cqq\\\" ROWS=\\\"20\\\" COLS=\\\"100%\\\"><%=sbCmd.toString()%></TE\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_jsp_reverse_jsp_reverse_jspbd {\n\tmeta:\n\t\tdescription = \"Web Shell - from files jsp-reverse.jsp, jsp-reverse.jsp, jspbd.jsp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tsuper_rule = 1\n\t\thash0 = \"8b0e6779f25a17f0ffb3df14122ba594\"\n\t\thash1 = \"ea87f0c1f0535610becadf5a98aca2fc\"\n\t\thash2 = \"7d5e9732766cf5b8edca9b7ae2b6028f\"\n\t\tscore = 50\n\tstrings:\n\t\t$s0 = \"osw = new BufferedWriter(new OutputStreamWriter(os));\" fullword\n\t\t$s7 = \"sock = new Socket(ipAddress, (new Integer(ipPort)).intValue());\" fullword\n\t\t$s9 = \"isr = new BufferedReader(new InputStreamReader(is));\" fullword\n\tcondition:\n\t\tall of them\n}\nrule webshell_400_in_JFolder_jfolder01_jsp_leo_warn_webshell_nc {\n\tmeta:\n\t\tdescription = \"Web Shell - from files 400.jsp, in.jsp, JFolder.jsp, jfolder01.jsp, jsp.jsp, leo.jsp, warn.jsp, webshell-nc.jsp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\tsuper_rule = 1\n\t\thash0 = \"36331f2c81bad763528d0ae00edf55be\"\n\t\thash1 = \"793b3d0a740dbf355df3e6f68b8217a4\"\n\t\thash2 = \"8979594423b68489024447474d113894\"\n\t\thash3 = \"ec482fc969d182e5440521c913bab9bd\"\n\t\thash4 = \"f98d2b33cd777e160d1489afed96de39\"\n\t\thash5 = \"4b4c12b3002fad88ca6346a873855209\"\n\t\thash6 = \"e9a5280f77537e23da2545306f6a19ad\"\n\t\thash7 = \"598eef7544935cf2139d1eada4375bb5\"\n\tstrings:\n\t\t$s0 = \"sbFolder.append(\\\"<tr><td >&nbsp;</td><td>\\\");\" fullword\n\t\t$s1 = \"return filesize / intDivisor + \\\".\\\" + strAfterComma + \\\" \\\" + strUnit;\" fullword\n\t\t$s5 = \"FileInfo fi = (FileInfo) ht.get(\\\"cqqUploadFile\\\");\" fullword\n\t\t$s6 = \"<input type=\\\"hidden\\\" name=\\\"cmd\\\" value=\\\"<%=strCmd%>\\\">\" fullword\n\tcondition:\n\t\t2 of them\n}\nrule webshell_2_520_job_JspWebshell_1_2_ma1_ma4_2 {\n\tmeta:\n\t\tdescription = \"Web Shell - from files 2.jsp, 520.jsp, job.jsp, JspWebshell 1.2.jsp, ma1.jsp, ma4.jsp, 2.jsp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\tsuper_rule = 1\n\t\thash0 = \"64a3bf9142b045b9062b204db39d4d57\"\n\t\thash1 = \"9abd397c6498c41967b4dd327cf8b55a\"\n\t\thash2 = \"56c005690da2558690c4aa305a31ad37\"\n\t\thash3 = \"70a0ee2624e5bbe5525ccadc467519f6\"\n\t\thash4 = \"532b93e02cddfbb548ce5938fe2f5559\"\n\t\thash5 = \"6e0fa491d620d4af4b67bae9162844ae\"\n\t\thash6 = \"7eabe0f60975c0c73d625b7ddf7b9cbd\"\n\tstrings:\n\t\t$s1 = \"while ((nRet = insReader.read(tmpBuffer, 0, 1024)) != -1) {\" fullword\n\t\t$s6 = \"password = (String)session.getAttribute(\\\"password\\\");\" fullword\n\t\t$s7 = \"insReader = new InputStreamReader(proc.getInputStream(), Charset.forName(\\\"GB231\"\n\tcondition:\n\t\t2 of them\n}\nrule webshell_shell_2008_2009mssql_phpspy_2005_full_phpspy_2006_arabicspy_hkrkoz {\n\tmeta:\n\t\tdescription = \"Web Shell - from files shell.php, 2008.php, 2009mssql.php, phpspy_2005_full.php, phpspy_2006.php, arabicspy.php, hkrkoz.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 60\n\t\tsuper_rule = 1\n\t\thash0 = \"791708057d8b429d91357d38edf43cc0\"\n\t\thash1 = \"3e4ba470d4c38765e4b16ed930facf2c\"\n\t\thash2 = \"aa17b71bb93c6789911bd1c9df834ff9\"\n\t\thash3 = \"b68bfafc6059fd26732fa07fb6f7f640\"\n\t\thash4 = \"40a1f840111996ff7200d18968e42cfe\"\n\t\thash5 = \"e0202adff532b28ef1ba206cf95962f2\"\n\t\thash6 = \"802f5cae46d394b297482fd0c27cb2fc\"\n\tstrings:\n\t\t$s0 = \"$tabledump .= \\\"'\\\".mysql_escape_string($row[$fieldcounter]).\\\"'\\\";\" fullword\n\t\t$s5 = \"while(list($kname, $columns) = @each($index)) {\" fullword\n\t\t$s6 = \"$tabledump = \\\"DROP TABLE IF EXISTS $table;\\\\n\\\";\" fullword\n\t\t$s9 = \"$tabledump .= \\\"   PRIMARY KEY ($colnames)\\\";\" fullword\n\t\t$fn = \"filename: backup\"\n\tcondition:\n\t\t2 of ($s*) and not $fn\n}\nrule webshell_gfs_sh_r57shell_r57shell127_SnIpEr_SA_xxx {\n\tmeta:\n\t\tdescription = \"Web Shell - from files gfs_sh.php, r57shell.php, r57shell127.php, SnIpEr_SA Shell.php, EgY_SpIdEr ShElL V2.php, r57_iFX.php, r57_kartal.php, r57_Mohajer22.php, r57.php, r57.php, Backdoor.PHP.Agent.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\tsuper_rule = 1\n\t\thash0 = \"a2516ac6ee41a7cf931cbaef1134a9e4\"\n\t\thash1 = \"ef43fef943e9df90ddb6257950b3538f\"\n\t\thash2 = \"ae025c886fbe7f9ed159f49593674832\"\n\t\thash3 = \"911195a9b7c010f61b66439d9048f400\"\n\t\thash4 = \"697dae78c040150daff7db751fc0c03c\"\n\t\thash5 = \"513b7be8bd0595c377283a7c87b44b2e\"\n\t\thash6 = \"1d912c55b96e2efe8ca873d6040e3b30\"\n\t\thash7 = \"e5b2131dd1db0dbdb43b53c5ce99016a\"\n\t\thash8 = \"4108f28a9792b50d95f95b9e5314fa1e\"\n\t\thash9 = \"41af6fd253648885c7ad2ed524e0692d\"\n\t\thash10 = \"6fcc283470465eed4870bcc3e2d7f14d\"\n\tstrings:\n\t\t$s0 = \"kVycm9yOiAkIVxuIik7DQpjb25uZWN0KFNPQ0tFVCwgJHBhZGRyKSB8fCBkaWUoIkVycm9yOiAkIVxuI\"\n\t\t$s11 = \"Aoc3RydWN0IHNvY2thZGRyICopICZzaW4sIHNpemVvZihzdHJ1Y3Qgc29ja2FkZHIpKSk8MCkgew0KIC\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_itsec_PHPJackal_itsecteam_shell_jHn {\n\tmeta:\n\t\tdescription = \"Web Shell - from files itsec.php, PHPJackal.php, itsecteam_shell.php, jHn.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\tsuper_rule = 1\n\t\thash0 = \"8ae9d2b50dc382f0571cd7492f079836\"\n\t\thash1 = \"e2830d3286001d1455479849aacbbb38\"\n\t\thash2 = \"bd6d3b2763c705a01cc2b3f105a25fa4\"\n\t\thash3 = \"40c6ecf77253e805ace85f119fe1cebb\"\n\tstrings:\n\t\t$s0 = \"$link=pg_connect(\\\"host=$host dbname=$db user=$user password=$pass\\\");\" fullword\n\t\t$s6 = \"while($data=ocifetchinto($stm,$data,OCI_ASSOC+OCI_RETURN_NULLS))$res.=implode('|\"\n\t\t$s9 = \"while($data=pg_fetch_row($result))$res.=implode('|-|-|-|-|-|',$data).'|+|+|+|+|+\"\n\tcondition:\n\t\t2 of them\n}\nrule webshell_Shell_ci_Biz_was_here_c100_v_xxx {\n\tmeta:\n\t\tdescription = \"Web Shell - from files Shell [ci] .Biz was here.php, c100 v. 777shell v. Undetectable #18a Modded by 777 - Don.php, c99-shadows-mod.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\tsuper_rule = 1\n\t\thash0 = \"f2fa878de03732fbf5c86d656467ff50\"\n\t\thash1 = \"27786d1e0b1046a1a7f67ee41c64bf4c\"\n\t\thash2 = \"68c0629d08b1664f5bcce7d7f5f71d22\"\n\tstrings:\n\t\t$s2 = \"if ($data{0} == \\\"\\\\x99\\\" and $data{1} == \\\"\\\\x01\\\") {return \\\"Error: \\\".$stri\"\n\t\t$s3 = \"<OPTION VALUE=\\\"find /etc/ -type f -perm -o+w 2> /dev/null\\\"\"\n\t\t$s4 = \"<OPTION VALUE=\\\"cat /proc/version /proc/cpuinfo\\\">CPUINFO\" fullword\n\t\t$s7 = \"<OPTION VALUE=\\\"wget http://ftp.powernet.com.tr/supermail/de\"\n\t\t$s9 = \"<OPTION VALUE=\\\"cut -d: -f1,2,3 /etc/passwd | grep ::\\\">USER\"\n\tcondition:\n\t\t2 of them\n}\nrule webshell_NIX_REMOTE_WEB_SHELL_NIX_REMOTE_WEB_xxx1 {\n\tmeta:\n\t\tdescription = \"Web Shell - from files NIX REMOTE WEB-SHELL.php, NIX REMOTE WEB-SHELL v.0.5 alpha Lite Public Version.php, KAdot Universal Shell v0.1.6.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\tsuper_rule = 1\n\t\thash0 = \"0b19e9de790cd2f4325f8c24b22af540\"\n\t\thash1 = \"f3ca29b7999643507081caab926e2e74\"\n\t\thash2 = \"527cf81f9272919bf872007e21c4bdda\"\n\tstrings:\n\t\t$s1 = \"<td><input size=\\\"48\\\" value=\\\"$docr/\\\" name=\\\"path\\\" type=\\\"text\\\"><input type=\"\n\t\t$s2 = \"$uploadfile = $_POST['path'].$_FILES['file']['name'];\" fullword\n\t\t$s6 = \"elseif (!empty($_POST['ac'])) {$ac = $_POST['ac'];}\" fullword\n\t\t$s7 = \"if ($_POST['path']==\\\"\\\"){$uploadfile = $_FILES['file']['name'];}\" fullword\n\tcondition:\n\t\t2 of them\n}\nrule webshell_c99_c99shell_c99_w4cking_Shell_xxx {\n\tmeta:\n\t\tdescription = \"Web Shell - from files c99.php, c99shell.php, c99_w4cking.php, Shell [ci] .Biz was here.php, acid.php, c100 v. 777shell v. Undetectable #18a Modded by 777 - Don.php, c66.php, c99-shadows-mod.php, c99.php, c99shell.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\tsuper_rule = 1\n\t\thash0 = \"61a92ce63369e2fa4919ef0ff7c51167\"\n\t\thash1 = \"d3f38a6dc54a73d304932d9227a739ec\"\n\t\thash2 = \"9c34adbc8fd8d908cbb341734830f971\"\n\t\thash3 = \"f2fa878de03732fbf5c86d656467ff50\"\n\t\thash4 = \"b8f261a3cdf23398d573aaf55eaf63b5\"\n\t\thash5 = \"27786d1e0b1046a1a7f67ee41c64bf4c\"\n\t\thash6 = \"0f5b9238d281bc6ac13406bb24ac2a5b\"\n\t\thash7 = \"68c0629d08b1664f5bcce7d7f5f71d22\"\n\t\thash8 = \"157b4ac3c7ba3a36e546e81e9279eab5\"\n\t\thash9 = \"048ccc01b873b40d57ce25a4c56ea717\"\n\tstrings:\n\t\t$s0 = \"echo \\\"<b>HEXDUMP:</b><nobr>\"\n\t\t$s4 = \"if ($filestealth) {$stat = stat($d.$f);}\" fullword\n\t\t$s5 = \"while ($row = mysql_fetch_array($result, MYSQL_NUM)) { echo \\\"<tr><td>\\\".$r\"\n\t\t$s6 = \"if ((mysql_create_db ($sql_newdb)) and (!empty($sql_newdb))) {echo \\\"DB \"\n\t\t$s8 = \"echo \\\"<center><b>Server-status variables:</b><br><br>\\\";\" fullword\n\t\t$s9 = \"echo \\\"<textarea cols=80 rows=10>\\\".htmlspecialchars($encoded).\\\"</textarea>\"\n\tcondition:\n\t\t2 of them\n}\nrule webshell_2008_2009mssql_phpspy_2005_full_phpspy_2006_arabicspy_hkrkoz {\n\tmeta:\n\t\tdescription = \"Web Shell - from files 2008.php, 2009mssql.php, phpspy_2005_full.php, phpspy_2006.php, arabicspy.php, hkrkoz.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\tsuper_rule = 1\n\t\thash0 = \"3e4ba470d4c38765e4b16ed930facf2c\"\n\t\thash1 = \"aa17b71bb93c6789911bd1c9df834ff9\"\n\t\thash2 = \"b68bfafc6059fd26732fa07fb6f7f640\"\n\t\thash3 = \"40a1f840111996ff7200d18968e42cfe\"\n\t\thash4 = \"e0202adff532b28ef1ba206cf95962f2\"\n\t\thash5 = \"802f5cae46d394b297482fd0c27cb2fc\"\n\tstrings:\n\t\t$s0 = \"$this -> addFile($content, $filename);\" fullword\n\t\t$s3 = \"function addFile($data, $name, $time = 0) {\" fullword\n\t\t$s8 = \"function unix2DosTime($unixtime = 0) {\" fullword\n\t\t$s9 = \"foreach($filelist as $filename){\" fullword\n\tcondition:\n\t\tall of them\n}\nrule webshell_c99_c66_c99_shadows_mod_c99shell {\n\tmeta:\n\t\tdescription = \"Web Shell - from files c99.php, c66.php, c99-shadows-mod.php, c99shell.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\tsuper_rule = 1\n\t\thash0 = \"61a92ce63369e2fa4919ef0ff7c51167\"\n\t\thash1 = \"0f5b9238d281bc6ac13406bb24ac2a5b\"\n\t\thash2 = \"68c0629d08b1664f5bcce7d7f5f71d22\"\n\t\thash3 = \"048ccc01b873b40d57ce25a4c56ea717\"\n\tstrings:\n\t\t$s2 = \"  if (unlink(_FILE_)) {@ob_clean(); echo \\\"Thanks for using c99shell v.\\\".$shv\"\n\t\t$s3 = \"  \\\"c99sh_backconn.pl\\\"=>array(\\\"Using PERL\\\",\\\"perl %path %host %port\\\"),\" fullword\n\t\t$s4 = \"<br><TABLE style=\\\"BORDER-COLLAPSE: collapse\\\" cellSpacing=0 borderColorDark=#66\"\n\t\t$s7 = \"   elseif (!$data = c99getsource($bind[\\\"src\\\"])) {echo \\\"Can't download sources\"\n\t\t$s8 = \"  \\\"c99sh_datapipe.pl\\\"=>array(\\\"Using PERL\\\",\\\"perl %path %localport %remotehos\"\n\t\t$s9 = \"   elseif (!$data = c99getsource($bc[\\\"src\\\"])) {echo \\\"Can't download sources!\"\n\tcondition:\n\t\t2 of them\n}\nrule webshell_he1p_JspSpy_nogfw_ok_style_1_JspSpy1 {\n\tmeta:\n\t\tdescription = \"Web Shell - from files he1p.jsp, JspSpy.jsp, nogfw.jsp, ok.jsp, style.jsp, 1.jsp, JspSpy.jsp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\tsuper_rule = 1\n\t\thash0 = \"b330a6c2d49124ef0729539761d6ef0b\"\n\t\thash1 = \"d71716df5042880ef84427acee8b121e\"\n\t\thash2 = \"344f9073576a066142b2023629539ebd\"\n\t\thash3 = \"32dea47d9c13f9000c4c807561341bee\"\n\t\thash4 = \"b9744f6876919c46a29ea05b1d95b1c3\"\n\t\thash5 = \"3ea688e3439a1f56b16694667938316d\"\n\t\thash6 = \"2434a7a07cb47ce25b41d30bc291cacc\"\n\tstrings:\n\t\t$s0 = \"\\\"\\\"+f.canRead()+\\\" / \\\"+f.canWrite()+\\\" / \\\"+f.canExecute()+\\\"</td>\\\"+\" fullword\n\t\t$s4 = \"out.println(\\\"<h2>File Manager - Current disk &quot;\\\"+(cr.indexOf(\\\"/\\\") == 0?\"\n\t\t$s7 = \"String execute = f.canExecute() ? \\\"checked=\\\\\\\"checked\\\\\\\"\\\" : \\\"\\\";\" fullword\n\t\t$s8 = \"\\\"<td nowrap>\\\"+f.canRead()+\\\" / \\\"+f.canWrite()+\\\" / \\\"+f.canExecute()+\\\"</td>\"\n\tcondition:\n\t\t2 of them\n}\nrule webshell_000_403_c5_config_myxx_queryDong_spyjsp2010_zend {\n\tmeta:\n\t\tdescription = \"Web Shell - from files 000.jsp, 403.jsp, c5.jsp, config.jsp, myxx.jsp, queryDong.jsp, spyjsp2010.jsp, zend.jsp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\tsuper_rule = 1\n\t\thash0 = \"2eeb8bf151221373ee3fd89d58ed4d38\"\n\t\thash1 = \"059058a27a7b0059e2c2f007ad4675ef\"\n\t\thash2 = \"8b457934da3821ba58b06a113e0d53d9\"\n\t\thash3 = \"d44df8b1543b837e57cc8f25a0a68d92\"\n\t\thash4 = \"e0354099bee243702eb11df8d0e046df\"\n\t\thash5 = \"90a5ba0c94199269ba33a58bc6a4ad99\"\n\t\thash6 = \"655722eaa6c646437c8ae93daac46ae0\"\n\t\thash7 = \"591ca89a25f06cf01e4345f98a22845c\"\n\tstrings:\n\t\t$s0 = \"return new Double(format.format(value)).doubleValue();\" fullword\n\t\t$s5 = \"File tempF = new File(savePath);\" fullword\n\t\t$s9 = \"if (tempF.isDirectory()) {\" fullword\n\tcondition:\n\t\t2 of them\n}\nrule webshell_c99_c99shell_c99_c99shell {\n\tmeta:\n\t\tdescription = \"Web Shell - from files c99.php, c99shell.php, c99.php, c99shell.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\tsuper_rule = 1\n\t\thash0 = \"61a92ce63369e2fa4919ef0ff7c51167\"\n\t\thash1 = \"d3f38a6dc54a73d304932d9227a739ec\"\n\t\thash2 = \"157b4ac3c7ba3a36e546e81e9279eab5\"\n\t\thash3 = \"048ccc01b873b40d57ce25a4c56ea717\"\n\tstrings:\n\t\t$s2 = \"$bindport_pass = \\\"c99\\\";\" fullword\n\t\t$s5 = \" else {echo \\\"<b>Execution PHP-code</b>\\\"; if (empty($eval_txt)) {$eval_txt = tr\"\n\tcondition:\n\t\t1 of them\n}\nrule webshell_r57shell127_r57_iFX_r57_kartal_r57_antichat {\n\tmeta:\n\t\tdescription = \"Web Shell - from files r57shell127.php, r57_iFX.php, r57_kartal.php, r57.php, antichat.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\tsuper_rule = 1\n\t\thash0 = \"ae025c886fbe7f9ed159f49593674832\"\n\t\thash1 = \"513b7be8bd0595c377283a7c87b44b2e\"\n\t\thash2 = \"1d912c55b96e2efe8ca873d6040e3b30\"\n\t\thash3 = \"4108f28a9792b50d95f95b9e5314fa1e\"\n\t\thash4 = \"3f71175985848ee46cc13282fbed2269\"\n\tstrings:\n\t\t$s6 = \"$res   = @mysql_query(\\\"SHOW CREATE TABLE `\\\".$_POST['mysql_tbl'].\\\"`\\\", $d\"\n\t\t$s7 = \"$sql1 .= $row[1].\\\"\\\\r\\\\n\\\\r\\\\n\\\";\" fullword\n\t\t$s8 = \"if(!empty($_POST['dif'])&&$fp) { @fputs($fp,$sql1.$sql2); }\" fullword\n\t\t$s9 = \"foreach($values as $k=>$v) {$values[$k] = addslashes($v);}\" fullword\n\tcondition:\n\t\t2 of them\n}\nrule webshell_NIX_REMOTE_WEB_SHELL_nstview_xxx {\n\tmeta:\n\t\tdescription = \"Web Shell - from files NIX REMOTE WEB-SHELL.php, nstview.php, NIX REMOTE WEB-SHELL v.0.5 alpha Lite Public Version.php, Cyber Shell (v 1.0).php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\tsuper_rule = 1\n\t\thash0 = \"0b19e9de790cd2f4325f8c24b22af540\"\n\t\thash1 = \"4745d510fed4378e4b1730f56f25e569\"\n\t\thash2 = \"f3ca29b7999643507081caab926e2e74\"\n\t\thash3 = \"46a18979750fa458a04343cf58faa9bd\"\n\tstrings:\n\t\t$s3 = \"BODY, TD, TR {\" fullword\n\t\t$s5 = \"$d=str_replace(\\\"\\\\\\\\\\\",\\\"/\\\",$d);\" fullword\n\t\t$s6 = \"if ($file==\\\".\\\" || $file==\\\"..\\\") continue;\" fullword\n\tcondition:\n\t\t2 of them\n}\nrule webshell_000_403_807_a_c5_config_css_dm_he1p_xxx {\n\tmeta:\n\t\tdescription = \"Web Shell - from files 000.jsp, 403.jsp, 807.jsp, a.jsp, c5.jsp, config.jsp, css.jsp, dm.jsp, he1p.jsp, JspSpy.jsp, JspSpyJDK5.jsp, JspSpyJDK51.jsp, luci.jsp.spy2009.jsp, m.jsp, ma3.jsp, mmym520.jsp, myxx.jsp, nogfw.jsp, ok.jsp, queryDong.jsp, spyjsp2010.jsp, style.jsp, u.jsp, xia.jsp, zend.jsp, cofigrue.jsp, 1.jsp, jspspy.jsp, jspspy_k8.jsp, JspSpy.jsp, JspSpyJDK5.jsp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\tsuper_rule = 1\n\t\thash0 = \"2eeb8bf151221373ee3fd89d58ed4d38\"\n\t\thash1 = \"059058a27a7b0059e2c2f007ad4675ef\"\n\t\thash2 = \"ae76c77fb7a234380cd0ebb6fe1bcddf\"\n\t\thash3 = \"76037ebd781ad0eac363d56fc81f4b4f\"\n\t\thash4 = \"8b457934da3821ba58b06a113e0d53d9\"\n\t\thash5 = \"d44df8b1543b837e57cc8f25a0a68d92\"\n\t\thash6 = \"fc44f6b4387a2cb50e1a63c66a8cb81c\"\n\t\thash7 = \"14e9688c86b454ed48171a9d4f48ace8\"\n\t\thash8 = \"b330a6c2d49124ef0729539761d6ef0b\"\n\t\thash9 = \"d71716df5042880ef84427acee8b121e\"\n\t\thash10 = \"341298482cf90febebb8616426080d1d\"\n\t\thash11 = \"29aebe333d6332f0ebc2258def94d57e\"\n\t\thash12 = \"42654af68e5d4ea217e6ece5389eb302\"\n\t\thash13 = \"88fc87e7c58249a398efd5ceae636073\"\n\t\thash14 = \"4a812678308475c64132a9b56254edbc\"\n\t\thash15 = \"9626eef1a8b9b8d773a3b2af09306a10\"\n\t\thash16 = \"e0354099bee243702eb11df8d0e046df\"\n\t\thash17 = \"344f9073576a066142b2023629539ebd\"\n\t\thash18 = \"32dea47d9c13f9000c4c807561341bee\"\n\t\thash19 = \"90a5ba0c94199269ba33a58bc6a4ad99\"\n\t\thash20 = \"655722eaa6c646437c8ae93daac46ae0\"\n\t\thash21 = \"b9744f6876919c46a29ea05b1d95b1c3\"\n\t\thash22 = \"6acc82544be056580c3a1caaa4999956\"\n\t\thash23 = \"6aa32a6392840e161a018f3907a86968\"\n\t\thash24 = \"591ca89a25f06cf01e4345f98a22845c\"\n\t\thash25 = \"349ec229e3f8eda0f9eb918c74a8bf4c\"\n\t\thash26 = \"3ea688e3439a1f56b16694667938316d\"\n\t\thash27 = \"ab77e4d1006259d7cbc15884416ca88c\"\n\t\thash28 = \"71097537a91fac6b01f46f66ee2d7749\"\n\t\thash29 = \"2434a7a07cb47ce25b41d30bc291cacc\"\n\t\thash30 = \"7a4b090619ecce6f7bd838fe5c58554b\"\n\tstrings:\n\t\t$s3 = \"String savePath = request.getParameter(\\\"savepath\\\");\" fullword\n\t\t$s4 = \"URL downUrl = new URL(downFileUrl);\" fullword\n\t\t$s5 = \"if (Util.isEmpty(downFileUrl) || Util.isEmpty(savePath))\" fullword\n\t\t$s6 = \"String downFileUrl = request.getParameter(\\\"url\\\");\" fullword\n\t\t$s7 = \"FileInputStream fInput = new FileInputStream(f);\" fullword\n\t\t$s8 = \"URLConnection conn = downUrl.openConnection();\" fullword\n\t\t$s9 = \"sis = request.getInputStream();\" fullword\n\tcondition:\n\t\t4 of them\n}\nrule webshell_2_520_icesword_job_ma1 {\n\tmeta:\n\t\tdescription = \"Web Shell - from files 2.jsp, 520.jsp, icesword.jsp, job.jsp, ma1.jsp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\tsuper_rule = 1\n\t\thash0 = \"64a3bf9142b045b9062b204db39d4d57\"\n\t\thash1 = \"9abd397c6498c41967b4dd327cf8b55a\"\n\t\thash2 = \"077f4b1b6d705d223b6d644a4f3eebae\"\n\t\thash3 = \"56c005690da2558690c4aa305a31ad37\"\n\t\thash4 = \"532b93e02cddfbb548ce5938fe2f5559\"\n\tstrings:\n\t\t$s1 = \"<meta http-equiv=\\\"Content-Type\\\" content=\\\"text/html; charset=gb2312\\\"></head>\" fullword\n\t\t$s3 = \"<input type=\\\"hidden\\\" name=\\\"_EVENTTARGET\\\" value=\\\"\\\" />\" fullword\n\t\t$s8 = \"<input type=\\\"hidden\\\" name=\\\"_EVENTARGUMENT\\\" value=\\\"\\\" />\" fullword\n\tcondition:\n\t\t2 of them\n}\nrule webshell_404_data_in_JFolder_jfolder01_jsp_suiyue_warn {\n\tmeta:\n\t\tdescription = \"Web Shell - from files 404.jsp, data.jsp, in.jsp, JFolder.jsp, jfolder01.jsp, jsp.jsp, suiyue.jsp, warn.jsp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\tsuper_rule = 1\n\t\thash0 = \"7066f4469c3ec20f4890535b5f299122\"\n\t\thash1 = \"9f54aa7b43797be9bab7d094f238b4ff\"\n\t\thash2 = \"793b3d0a740dbf355df3e6f68b8217a4\"\n\t\thash3 = \"8979594423b68489024447474d113894\"\n\t\thash4 = \"ec482fc969d182e5440521c913bab9bd\"\n\t\thash5 = \"f98d2b33cd777e160d1489afed96de39\"\n\t\thash6 = \"c93d5bdf5cf62fe22e299d0f2b865ea7\"\n\t\thash7 = \"e9a5280f77537e23da2545306f6a19ad\"\n\tstrings:\n\t\t$s0 = \"<table width=\\\"100%\\\" border=\\\"1\\\" cellspacing=\\\"0\\\" cellpadding=\\\"5\\\" bordercol\"\n\t\t$s2 = \" KB </td>\" fullword\n\t\t$s3 = \"<table width=\\\"98%\\\" border=\\\"0\\\" cellspacing=\\\"0\\\" cellpadding=\\\"\"\n\t\t$s4 = \"<!-- <tr align=\\\"center\\\"> \" fullword\n\tcondition:\n\t\tall of them\n}\n\nrule webshell_phpspy_2005_full_phpspy_2005_lite_phpspy_2006_PHPSPY {\n\tmeta:\n\t\tdescription = \"Web Shell - from files phpspy_2005_full.php, phpspy_2005_lite.php, phpspy_2006.php, PHPSPY.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\tsuper_rule = 1\n\t\thash0 = \"b68bfafc6059fd26732fa07fb6f7f640\"\n\t\thash1 = \"42f211cec8032eb0881e87ebdb3d7224\"\n\t\thash2 = \"40a1f840111996ff7200d18968e42cfe\"\n\t\thash3 = \"0712e3dc262b4e1f98ed25760b206836\"\n\tstrings:\n\t\t$s4 = \"http://www.4ngel.net\" fullword\n\t\t$s5 = \"</a> | <a href=\\\"?action=phpenv\\\">PHP\" fullword\n\t\t$s8 = \"echo $msg=@fwrite($fp,$_POST['filecontent']) ? \\\"\" fullword\n\t\t$s9 = \"Codz by Angel\" fullword\n\tcondition:\n\t\t2 of them\n}\nrule webshell_c99_locus7s_c99_w4cking_xxx {\n\tmeta:\n\t\tdescription = \"Web Shell - from files c99_locus7s.php, c99_w4cking.php, r57shell.php, r57shell127.php, SnIpEr_SA Shell.php, EgY_SpIdEr ShElL V2.php, r57_iFX.php, r57_kartal.php, r57_Mohajer22.php, r57.php, acid.php, newsh.php, r57.php, Backdoor.PHP.Agent.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\tsuper_rule = 1\n\t\thash0 = \"38fd7e45f9c11a37463c3ded1c76af4c\"\n\t\thash1 = \"9c34adbc8fd8d908cbb341734830f971\"\n\t\thash2 = \"ef43fef943e9df90ddb6257950b3538f\"\n\t\thash3 = \"ae025c886fbe7f9ed159f49593674832\"\n\t\thash4 = \"911195a9b7c010f61b66439d9048f400\"\n\t\thash5 = \"697dae78c040150daff7db751fc0c03c\"\n\t\thash6 = \"513b7be8bd0595c377283a7c87b44b2e\"\n\t\thash7 = \"1d912c55b96e2efe8ca873d6040e3b30\"\n\t\thash8 = \"e5b2131dd1db0dbdb43b53c5ce99016a\"\n\t\thash9 = \"4108f28a9792b50d95f95b9e5314fa1e\"\n\t\thash10 = \"b8f261a3cdf23398d573aaf55eaf63b5\"\n\t\thash11 = \"0d2c2c151ed839e6bafc7aa9c69be715\"\n\t\thash12 = \"41af6fd253648885c7ad2ed524e0692d\"\n\t\thash13 = \"6fcc283470465eed4870bcc3e2d7f14d\"\n\tstrings:\n\t\t$s1 = \"$res = @shell_exec($cfe);\" fullword\n\t\t$s8 = \"$res = @ob_get_contents();\" fullword\n\t\t$s9 = \"@exec($cfe,$res);\" fullword\n\tcondition:\n\t\t2 of them\n}\nrule webshell_browser_201_3_ma_ma2_download {\n\tmeta:\n\t\tdescription = \"Web Shell - from files browser.jsp, 201.jsp, 3.jsp, ma.jsp, ma2.jsp, download.jsp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\tsuper_rule = 1\n\t\thash0 = \"37603e44ee6dc1c359feb68a0d566f76\"\n\t\thash1 = \"a7e25b8ac605753ed0c438db93f6c498\"\n\t\thash2 = \"fb8c6c3a69b93e5e7193036fd31a958d\"\n\t\thash3 = \"4cc68fa572e88b669bce606c7ace0ae9\"\n\t\thash4 = \"4b45715fa3fa5473640e17f49ef5513d\"\n\t\thash5 = \"fa87bbd7201021c1aefee6fcc5b8e25a\"\n\tstrings:\n\t\t$s1 = \"private static final int EDITFIELD_ROWS = 30;\" fullword\n\t\t$s2 = \"private static String tempdir = \\\".\\\";\" fullword\n\t\t$s6 = \"<input type=\\\"hidden\\\" name=\\\"dir\\\" value=\\\"<%=request.getAttribute(\\\"dir\\\")%>\\\"\"\n\tcondition:\n\t\t2 of them\n}\nrule webshell_000_403_c5_queryDong_spyjsp2010 {\n\tmeta:\n\t\tdescription = \"Web Shell - from files 000.jsp, 403.jsp, c5.jsp, queryDong.jsp, spyjsp2010.jsp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\tsuper_rule = 1\n\t\thash0 = \"2eeb8bf151221373ee3fd89d58ed4d38\"\n\t\thash1 = \"059058a27a7b0059e2c2f007ad4675ef\"\n\t\thash2 = \"8b457934da3821ba58b06a113e0d53d9\"\n\t\thash3 = \"90a5ba0c94199269ba33a58bc6a4ad99\"\n\t\thash4 = \"655722eaa6c646437c8ae93daac46ae0\"\n\tstrings:\n\t\t$s2 = \"\\\" <select name='encode' class='input'><option value=''>ANSI</option><option val\"\n\t\t$s7 = \"JSession.setAttribute(\\\"MSG\\\",\\\"<span style='color:red'>Upload File Failed!</spa\"\n\t\t$s8 = \"File f = new File(JSession.getAttribute(CURRENT_DIR)+\\\"/\\\"+fileBean.getFileName(\"\n\t\t$s9 = \"((Invoker)ins.get(\\\"vd\\\")).invoke(request,response,JSession);\" fullword\n\tcondition:\n\t\t2 of them\n}\nrule webshell_r57shell127_r57_kartal_r57 {\n\tmeta:\n\t\tdescription = \"Web Shell - from files r57shell127.php, r57_kartal.php, r57.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/01/28\"\n\t\tscore = 70\n\t\tsuper_rule = 1\n\t\thash0 = \"ae025c886fbe7f9ed159f49593674832\"\n\t\thash1 = \"1d912c55b96e2efe8ca873d6040e3b30\"\n\t\thash2 = \"4108f28a9792b50d95f95b9e5314fa1e\"\n\tstrings:\n\t\t$s2 = \"$handle = @opendir($dir) or die(\\\"Can't open directory $dir\\\");\" fullword\n\t\t$s3 = \"if(!empty($_POST['mysql_db'])) { @mssql_select_db($_POST['mysql_db'],$db); }\" fullword\n\t\t$s5 = \"if (!isset($_SERVER['PHP_AUTH_USER']) || $_SERVER['PHP_AUTH_USER']!==$name || $_\"\n\tcondition:\n\t\t2 of them\n}\n\nrule webshell_webshells_new_con2 {\n\tmeta:\n\t\tdescription = \"Web shells - generated from file con2.asp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/03/28\"\n\t\tscore = 70\n\t\thash = \"d3584159ab299d546bd77c9654932ae3\"\n\tstrings:\n\t\t$s7 = \",htaPrewoP(ecalper=htaPrewoP:fI dnE:0=KOtidE:1 - eulaVtni = eulaVtni:nehT 1 => e\"\n\t\t$s10 = \"j \\\"<Form action='\\\"&URL&\\\"?Action2=Post' method='post' name='EditForm'><input n\"\n\tcondition:\n\t\t1 of them\n}\nrule webshell_webshells_new_make2 {\n\tmeta:\n\t\tdescription = \"Web shells - generated from file make2.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/03/28\"\n\t\thash = \"9af195491101e0816a263c106e4c145e\"\n\t\tscore = 50\n\tstrings:\n\t\t$s1 = \"error_reporting(0);session_start();header(\\\"Content-type:text/html;charset=utf-8\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_webshells_new_aaa {\n\tmeta:\n\t\tdescription = \"Web shells - generated from file aaa.asp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/03/28\"\n\t\tscore = 70\n\t\thash = \"68483788ab171a155db5266310c852b2\"\n\tstrings:\n\t\t$s0 = \"Function fvm(jwv):If jwv=\\\"\\\"Then:fvm=jwv:Exit Function:End If:Dim tt,sru:tt=\\\"\"\n\t\t$s5 = \"<option value=\\\"\\\"DROP TABLE [jnc];exec mast\\\"&kvp&\\\"er..xp_regwrite 'HKEY_LOCAL\"\n\t\t$s17 = \"if qpv=\\\"\\\" then qpv=\\\"x:\\\\Program Files\\\\MySQL\\\\MySQL Server 5.0\\\\my.ini\\\"&br&\"\n\tcondition:\n\t\t1 of them\n}\nrule webshell_Expdoor_com_ASP {\n\tmeta:\n\t\tdescription = \"Web shells - generated from file Expdoor.com ASP.asp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/03/28\"\n\t\tscore = 70\n\t\thash = \"caef01bb8906d909f24d1fa109ea18a7\"\n\tstrings:\n\t\t$s4 = \"\\\">www.Expdoor.com</a>\" fullword\n\t\t$s5 = \"    <input name=\\\"FileName\\\" type=\\\"text\\\" value=\\\"Asp_ver.Asp\\\" size=\\\"20\\\" max\"\n\t\t$s10 = \"set file=fs.OpenTextFile(server.MapPath(FileName),8,True)  '\" fullword\n\t\t$s14 = \"set fs=server.CreateObject(\\\"Scripting.FileSystemObject\\\")   '\" fullword\n\t\t$s16 = \"<TITLE>Expdoor.com ASP\" fullword\n\tcondition:\n\t\t2 of them\n}\nrule webshell_webshells_new_php2 {\n\tmeta:\n\t\tdescription = \"Web shells - generated from file php2.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/03/28\"\n\t\tscore = 70\n\t\thash = \"fbf2e76e6f897f6f42b896c855069276\"\n\tstrings:\n\t\t$s0 = \"<?php $s=@$_GET[2];if(md5($s.$s)==\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_bypass_iisuser_p {\n\tmeta:\n\t\tdescription = \"Web shells - generated from file bypass-iisuser-p.asp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/03/28\"\n\t\tscore = 70\n\t\thash = \"924d294400a64fa888a79316fb3ccd90\"\n\tstrings:\n\t\t$s0 = \"<%Eval(Request(chr(112))):Set fso=CreateObject\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_sig_404super {\n\tmeta:\n\t\tdescription = \"Web shells - generated from file 404super.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/03/28\"\n\t\tscore = 70\n\t\thash = \"7ed63176226f83d36dce47ce82507b28\"\n\tstrings:\n\t\t$s4 = \"$i = pack('c*', 0x70, 0x61, 99, 107);\" fullword\n\t\t$s6 = \"    'h' => $i('H*', '687474703a2f2f626c616b696e2e64756170702e636f6d2f7631'),\" fullword\n\t\t$s7 = \"//http://require.duapp.com/session.php\" fullword\n\t\t$s8 = \"if(!isset($_SESSION['t'])){$_SESSION['t'] = $GLOBALS['f']($GLOBALS['h']);}\" fullword\n\t\t$s12 = \"//define('pass','123456');\" fullword\n\t\t$s13 = \"$GLOBALS['c']($GLOBALS['e'](null, $GLOBALS['s']('%s',$GLOBALS['p']('H*',$_SESSIO\"\n\tcondition:\n\t\t1 of them\n}\nrule webshell_webshells_new_JSP {\n\tmeta:\n\t\tdescription = \"Web shells - generated from file JSP.jsp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/03/28\"\n\t\tscore = 70\n\t\thash = \"495f1a0a4c82f986f4bdf51ae1898ee7\"\n\tstrings:\n\t\t$s1 = \"void AA(StringBuffer sb)throws Exception{File r[]=File.listRoots();for(int i=0;i\"\n\t\t$s5 = \"bw.write(z2);bw.close();sb.append(\\\"1\\\");}else if(Z.equals(\\\"E\\\")){EE(z1);sb.app\"\n\t\t$s11 = \"if(Z.equals(\\\"A\\\")){String s=new File(application.getRealPath(request.getRequest\"\n\tcondition:\n\t\t1 of them\n}\nrule webshell_webshell_123 {\n\tmeta:\n\t\tdescription = \"Web shells - generated from file webshell-123.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/03/28\"\n\t\tscore = 70\n\t\thash = \"2782bb170acaed3829ea9a04f0ac7218\"\n\tstrings:\n\t\t$s0 = \"// Web Shell!!\" fullword\n\t\t$s1 = \"@preg_replace(\\\"/.*/e\\\",\\\"\\\\x65\\\\x76\\\\x61\\\\x6C\\\\x28\\\\x67\\\\x7A\\\\x69\\\\x6E\\\\x66\\\\x6\"\n\t\t$s3 = \"$default_charset = \\\"UTF-8\\\";\" fullword\n\t\t$s4 = \"// url:http://www.weigongkai.com/shell/\" fullword\n\tcondition:\n\t\t2 of them\n}\nrule webshell_dev_core {\n\tmeta:\n\t\tdescription = \"Web shells - generated from file dev_core.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/03/28\"\n\t\tscore = 70\n\t\thash = \"55ad9309b006884f660c41e53150fc2e\"\n\tstrings:\n\t\t$s1 = \"if (strpos($_SERVER['HTTP_USER_AGENT'], 'EBSD') == false) {\" fullword\n\t\t$s9 = \"setcookie('key', $_POST['pwd'], time() + 3600 * 24 * 30);\" fullword\n\t\t$s10 = \"$_SESSION['code'] = _REQUEST(sprintf(\\\"%s?%s\\\",pack(\\\"H*\\\",'6874\"\n\t\t$s11 = \"if (preg_match(\\\"/^HTTP\\\\/\\\\d\\\\.\\\\d\\\\s([\\\\d]+)\\\\s.*$/\\\", $status, $matches))\"\n\t\t$s12 = \"eval(gzuncompress(gzuncompress(Crypt::decrypt($_SESSION['code'], $_C\"\n\t\t$s15 = \"if (($fsock = fsockopen($url2['host'], 80, $errno, $errstr, $fsock_timeout))\"\n\tcondition:\n\t\t1 of them\n}\nrule webshell_webshells_new_pHp {\n\tmeta:\n\t\tdescription = \"Web shells - generated from file pHp.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/03/28\"\n\t\tscore = 70\n\t\thash = \"b0e842bdf83396c3ef8c71ff94e64167\"\n\tstrings:\n\t\t$s0 = \"if(is_readable($path)) antivirus($path.'/',$exs,$matches);\" fullword\n\t\t$s1 = \"'/(eval|assert|include|require|include\\\\_once|require\\\\_once|array\\\\_map|arr\"\n\t\t$s13 = \"'/(exec|shell\\\\_exec|system|passthru)+\\\\s*\\\\(\\\\s*\\\\$\\\\_(\\\\w+)\\\\[(.*)\\\\]\\\\s*\"\n\t\t$s14 = \"'/(include|require|include\\\\_once|require\\\\_once)+\\\\s*\\\\(\\\\s*[\\\\'|\\\\\\\"](\\\\w+\"\n\t\t$s19 = \"'/\\\\$\\\\_(\\\\w+)(.*)(eval|assert|include|require|include\\\\_once|require\\\\_once\"\n\tcondition:\n\t\t1 of them\n}\nrule webshell_webshells_new_pppp {\n\tmeta:\n\t\tdescription = \"Web shells - generated from file pppp.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/03/28\"\n\t\tscore = 70\n\t\thash = \"cf01cb6e09ee594545693c5d327bdd50\"\n\tstrings:\n\t\t$s0 = \"Mail: chinese@hackermail.com\" fullword\n\t\t$s3 = \"if($_GET[\\\"hackers\\\"]==\\\"2b\\\"){if ($_SERVER['REQUEST_METHOD'] == 'POST') { echo \"\n\t\t$s6 = \"Site: http://blog.weili.me\" fullword\n\tcondition:\n\t\t1 of them\n}\nrule webshell_webshells_new_code {\n\tmeta:\n\t\tdescription = \"Web shells - generated from file code.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/03/28\"\n\t\tscore = 70\n\t\thash = \"a444014c134ff24c0be5a05c02b81a79\"\n\tstrings:\n\t\t$s1 = \"<a class=\\\"high2\\\" href=\\\"javascript:;;;\\\" name=\\\"action=show&dir=$_ipage_fi\"\n\t\t$s7 = \"$file = !empty($_POST[\\\"dir\\\"]) ? urldecode(self::convert_to_utf8(rtrim($_PO\"\n\t\t$s10 = \"if (true==@move_uploaded_file($_FILES['userfile']['tmp_name'],self::convert_\"\n\t\t$s14 = \"Processed in <span id=\\\"runtime\\\"></span> second(s) {gzip} usage:\"\n\t\t$s17 = \"<a href=\\\"javascript:;;;\\\" name=\\\"{return_link}\\\" onclick=\\\"fileperm\"\n\tcondition:\n\t\t1 of them\n}\nrule webshell_webshells_new_jspyyy {\n\tmeta:\n\t\tdescription = \"Web shells - generated from file jspyyy.jsp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/03/28\"\n\t\tscore = 70\n\t\thash = \"b291bf3ccc9dac8b5c7e1739b8fa742e\"\n\tstrings:\n\t\t$s0 = \"<%@page import=\\\"java.io.*\\\"%><%if(request.getParameter(\\\"f\\\")\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_webshells_new_xxxx {\n\tmeta:\n\t\tdescription = \"Web shells - generated from file xxxx.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/03/28\"\n\t\tscore = 70\n\t\thash = \"5bcba70b2137375225d8eedcde2c0ebb\"\n\tstrings:\n\t\t$s0 = \"<?php eval($_POST[1]);?>  \" fullword\n\tcondition:\n\t\tall of them\n}\nrule webshell_webshells_new_JJjsp3 {\n\tmeta:\n\t\tdescription = \"Web shells - generated from file JJjsp3.jsp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/03/28\"\n\t\tscore = 70\n\t\thash = \"949ffee1e07a1269df7c69b9722d293e\"\n\tstrings:\n\t\t$s0 = \"<%@page import=\\\"java.io.*,java.util.*,java.net.*,java.sql.*,java.text.*\\\"%><%!S\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_webshells_new_PHP1 {\n\tmeta:\n\t\tdescription = \"Web shells - generated from file PHP1.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/03/28\"\n\t\tscore = 70\n\t\thash = \"14c7281fdaf2ae004ca5fec8753ce3cb\"\n\tstrings:\n\t\t$s0 = \"<[url=mailto:?@array_map($_GET[]?@array_map($_GET['f'],$_GET[/url]);?>\" fullword\n\t\t$s2 = \":https://forum.90sec.org/forum.php?mod=viewthread&tid=7316\" fullword\n\t\t$s3 = \"@preg_replace(\\\"/f/e\\\",$_GET['u'],\\\"fengjiao\\\"); \" fullword\n\tcondition:\n\t\t1 of them\n}\nrule webshell_webshells_new_JJJsp2 {\n\tmeta:\n\t\tdescription = \"Web shells - generated from file JJJsp2.jsp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/03/28\"\n\t\tscore = 70\n\t\thash = \"5a9fec45236768069c99f0bfd566d754\"\n\tstrings:\n\t\t$s2 = \"QQ(cs, z1, z2, sb,z2.indexOf(\\\"-to:\\\")!=-1?z2.substring(z2.indexOf(\\\"-to:\\\")+4,z\"\n\t\t$s8 = \"sb.append(l[i].getName() + \\\"/\\\\t\\\" + sT + \\\"\\\\t\\\" + l[i].length()+ \\\"\\\\t\\\" + sQ\"\n\t\t$s10 = \"ResultSet r = s.indexOf(\\\"jdbc:oracle\\\")!=-1?c.getMetaData()\"\n\t\t$s11 = \"return DriverManager.getConnection(x[1].trim()+\\\":\\\"+x[4],x[2].equalsIgnoreCase(\"\n\tcondition:\n\t\t1 of them\n}\nrule webshell_webshells_new_radhat {\n\tmeta:\n\t\tdescription = \"Web shells - generated from file radhat.asp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/03/28\"\n\t\tscore = 70\n\t\thash = \"72cb5ef226834ed791144abaa0acdfd4\"\n\tstrings:\n\t\t$s1 = \"sod=Array(\\\"D\\\",\\\"7\\\",\\\"S\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_webshells_new_asp1 {\n\tmeta:\n\t\tdescription = \"Web shells - generated from file asp1.asp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/03/28\"\n\t\tscore = 70\n\t\thash = \"b63e708cd58ae1ec85cf784060b69cad\"\n\tstrings:\n\t\t$s0 = \" http://www.baidu.com/fuck.asp?a=)0(tseuqer%20lave \" fullword\n\t\t$s2 = \" <% a=request(chr(97)) ExecuteGlobal(StrReverse(a)) %>\" fullword\n\tcondition:\n\t\t1 of them\n}\nrule webshell_webshells_new_php6 {\n\tmeta:\n\t\tdescription = \"Web shells - generated from file php6.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/03/28\"\n\t\tscore = 70\n\t\thash = \"ea75280224a735f1e445d244acdfeb7b\"\n\tstrings:\n\t\t$s1 = \"array_map(\\\"asx73ert\\\",(ar\"\n\t\t$s3 = \"preg_replace(\\\"/[errorpage]/e\\\",$page,\\\"saft\\\");\" fullword\n\t\t$s4 = \"shell.php?qid=zxexp  \" fullword\n\tcondition:\n\t\t1 of them\n}\nrule webshell_webshells_new_xxx {\n\tmeta:\n\t\tdescription = \"Web shells - generated from file xxx.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/03/28\"\n\t\tscore = 70\n\t\thash = \"0e71428fe68b39b70adb6aeedf260ca0\"\n\tstrings:\n\t\t$s3 = \"<?php array_map(\\\"ass\\\\x65rt\\\",(array)$_REQUEST['expdoor']);?>\" fullword\n\tcondition:\n\t\tall of them\n}\nrule webshell_GetPostpHp {\n\tmeta:\n\t\tdescription = \"Web shells - generated from file GetPostpHp.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/03/28\"\n\t\tscore = 70\n\t\thash = \"20ede5b8182d952728d594e6f2bb5c76\"\n\tstrings:\n\t\t$s0 = \"<?php eval(str_rot13('riny($_CBFG[cntr]);'));?>\" fullword\n\tcondition:\n\t\tall of them\n}\nrule webshell_webshells_new_php5 {\n\tmeta:\n\t\tdescription = \"Web shells - generated from file php5.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/03/28\"\n\t\tscore = 70\n\t\thash = \"cf2ab009cbd2576a806bfefb74906fdf\"\n\tstrings:\n\t\t$s0 = \"<?$_uU=chr(99).chr(104).chr(114);$_cC=$_uU(101).$_uU(118).$_uU(97).$_uU(108).$_u\"\n\tcondition:\n\t\tall of them\n}\nrule webshell_webshells_new_PHP {\n\tmeta:\n\t\tdescription = \"Web shells - generated from file PHP.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/03/28\"\n\t\tscore = 70\n\t\thash = \"a524e7ae8d71e37d2fd3e5fbdab405ea\"\n\tstrings:\n\t\t$s1 = \"echo \\\"<font color=blue>Error!</font>\\\";\" fullword\n\t\t$s2 = \"<input type=\\\"text\\\" size=61 name=\\\"f\\\" value='<?php echo $_SERVER[\\\"SCRIPT_FILE\"\n\t\t$s5 = \" - ExpDoor.com</title>\" fullword\n\t\t$s10 = \"$f=fopen($_POST[\\\"f\\\"],\\\"w\\\");\" fullword\n\t\t$s12 = \"<textarea name=\\\"c\\\" cols=60 rows=15></textarea><br>\" fullword\n\tcondition:\n\t\t1 of them\n}\nrule webshell_webshells_new_Asp {\n\tmeta:\n\t\tdescription = \"Web shells - generated from file Asp.asp\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/03/28\"\n\t\tscore = 70\n\t\thash = \"32c87744ea404d0ea0debd55915010b7\"\n\tstrings:\n\t\t$s1 = \"Execute MorfiCoder(\\\")/*/z/*/(tseuqer lave\\\")\" fullword\n\t\t$s2 = \"Function MorfiCoder(Code)\" fullword\n\t\t$s3 = \"MorfiCoder=Replace(Replace(StrReverse(Code),\\\"/*/\\\",\\\"\\\"\\\"\\\"),\\\"\\\\*\\\\\\\",vbCrlf)\" fullword\n\tcondition:\n\t\t1 of them\n}\n\n/* Update from hackers tool pack */\n\nrule perlbot_pl {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file perlbot.pl.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"7e4deb9884ffffa5d82c22f8dc533a45\"\n\tstrings:\n\t\t$s0 = \"my @adms=(\\\"Kelserific\\\",\\\"Puna\\\",\\\"nod32\\\")\"\n\t\t$s1 = \"#Acesso a Shel - 1 ON 0 OFF\"\n\tcondition:\n\t\t1 of them\n}\nrule php_backdoor_php {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file php-backdoor.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"2b5cb105c4ea9b5ebc64705b4bd86bf7\"\n\tstrings:\n\t\t$s0 = \"http://michaeldaw.org   2006\"\n\t\t$s1 = \"or http://<? echo $SERVER_NAME.$REQUEST_URI; ?>?d=c:/windows on win\"\n\t\t$s3 = \"coded by z0mbie\"\n\tcondition:\n\t\t1 of them\n}\nrule Liz0ziM_Private_Safe_Mode_Command_Execuriton_Bypass_Exploit_php {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file Liz0ziM Private Safe Mode Command Execuriton Bypass Exploit.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"c6eeacbe779518ea78b8f7ed5f63fc11\"\n\tstrings:\n\t\t$s0 = \"<option value=\\\"cat /var/cpanel/accounting.log\\\">/var/cpanel/accounting.log</opt\"\n\t\t$s1 = \"Liz0ziM Private Safe Mode Command Execuriton Bypass\"\n\t\t$s2 = \"echo \\\"<b><font color=red>Kimim Ben :=)</font></b>:$uid<br>\\\";\" fullword\n\tcondition:\n\t\t1 of them\n}\nrule Nshell__1__php_php {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file Nshell (1).php.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"973fc89694097a41e684b43a21b1b099\"\n\tstrings:\n\t\t$s0 = \"echo \\\"Command : <INPUT TYPE=text NAME=cmd value=\\\".@stripslashes(htmlentities($\"\n\t\t$s1 = \"if(!$whoami)$whoami=exec(\\\"whoami\\\"); echo \\\"whoami :\\\".$whoami.\\\"<br>\\\";\" fullword\n\tcondition:\n\t\t1 of them\n}\nrule shankar_php_php {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file shankar.php.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"6eb9db6a3974e511b7951b8f7e7136bb\"\n\tstrings:\n\t\t$sAuthor = \"ShAnKaR\"\n\t\t$s0 = \"<input type=checkbox name='dd' \\\".(isset($_POST['dd'])?'checked':'').\\\">DB<input\"\n\t\t$s3 = \"Show<input type=text size=5 value=\\\".((isset($_POST['br_st']) && isset($_POST['b\"\n\tcondition:\n\t\t1 of ($s*) and $sAuthor\n}\nrule Casus15_php_php {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file Casus15.php.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"5e2ede2d1c4fa1fcc3cbfe0c005d7b13\"\n\tstrings:\n\t\t$s0 = \"copy ( $dosya_gonder2, \\\"$dir/$dosya_gonder2_name\\\") ? print(\\\"$dosya_gonder2_na\"\n\t\t$s2 = \"echo \\\"<center><font size='$sayi' color='#FFFFFF'>HACKLERIN<font color='#008000'\"\n\t\t$s3 = \"value='Calistirmak istediginiz \"\n\tcondition:\n\t\t1 of them\n}\nrule small_php_php {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file small.php.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"fcee6226d09d150bfa5f103bee61fbde\"\n\tstrings:\n\t\t$s1 = \"$pass='abcdef1234567890abcdef1234567890';\" fullword\n\t\t$s2 = \"eval(gzinflate(base64_decode('FJzHkqPatkU/550IGnjXxHvv6bzAe0iE5+svFVGtKqXMZq05x1\"\n\t\t$s4 = \"@ini_set('error_log',NULL);\" fullword\n\tcondition:\n\t\t2 of them\n}\nrule shellbot_pl {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file shellbot.pl.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"b2a883bc3c03a35cfd020dd2ace4bab8\"\n\tstrings:\n\t\t$s0 = \"ShellBOT\"\n\t\t$s1 = \"PacktsGr0up\"\n\t\t$s2 = \"CoRpOrAtIoN\"\n\t\t$s3 = \"# Servidor de irc que vai ser usado \"\n\t\t$s4 = \"/^ctcpflood\\\\s+(\\\\d+)\\\\s+(\\\\S+)\"\n\tcondition:\n\t\t2 of them\n}\nrule fuckphpshell_php {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file fuckphpshell.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"554e50c1265bb0934fcc8247ec3b9052\"\n\tstrings:\n\t\t$s0 = \"$succ = \\\"Warning! \"\n\t\t$s1 = \"Don`t be stupid .. this is a priv3 server, so take extra care!\"\n\t\t$s2 = \"\\\\*=-- MEMBERS AREA --=*/\"\n\t\t$s3 = \"preg_match('/(\\\\n[^\\\\n]*){' . $cache_lines . '}$/', $_SESSION['o\"\n\tcondition:\n\t\t2 of them\n}\nrule ngh_php_php {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file ngh.php.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"c372b725419cdfd3f8a6371cfeebc2fd\"\n\tstrings:\n\t\t$s0 = \"Cr4sh_aka_RKL\"\n\t\t$s1 = \"NGH edition\"\n\t\t$s2 = \"/* connectback-backdoor on perl\"\n\t\t$s3 = \"<form action=<?=$script?>?act=bindshell method=POST>\"\n\t\t$s4 = \"$logo = \\\"R0lGODlhMAAwAOYAAAAAAP////r\"\n\tcondition:\n\t\t1 of them\n}\nrule jsp_reverse_jsp {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file jsp-reverse.jsp.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"8b0e6779f25a17f0ffb3df14122ba594\"\n\tstrings:\n\t\t$s0 = \"// backdoor.jsp\"\n\t\t$s1 = \"JSP Backdoor Reverse Shell\"\n\t\t$s2 = \"http://michaeldaw.org\"\n\tcondition:\n\t\t2 of them\n}\nrule Tool_asp {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file Tool.asp.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"8febea6ca6051ae5e2ad4c78f4b9c1f2\"\n\tstrings:\n\t\t$s0 = \"mailto:rhfactor@antisocial.com\"\n\t\t$s2 = \"?raiz=root\"\n\t\t$s3 = \"DIGO CORROMPIDO<BR>CORRUPT CODE\"\n\t\t$s4 = \"key = \\\"5DCADAC1902E59F7273E1902E5AD8414B1902E5ABF3E661902E5B554FC41902E53205CA0\"\n\tcondition:\n\t\t2 of them\n}\nrule NT_Addy_asp {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file NT Addy.asp.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"2e0d1bae844c9a8e6e351297d77a1fec\"\n\tstrings:\n\t\t$s0 = \"NTDaddy v1.9 by obzerve of fux0r inc\"\n\t\t$s2 = \"<ERROR: THIS IS NOT A TEXT FILE>\"\n\t\t$s4 = \"RAW D.O.S. COMMAND INTERFACE\"\n\tcondition:\n\t\t1 of them\n}\nrule SimAttacker___Vrsion_1_0_0___priv8_4_My_friend_php {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file SimAttacker - Vrsion 1.0.0 - priv8 4 My friend.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"089ff24d978aeff2b4b2869f0c7d38a3\"\n\tstrings:\n\t\t$s0 = \"SimAttacker - Vrsion : 1.0.0 - priv8 4 My friend\"\n\t\t$s3 = \" fputs ($fp ,\\\"\\\\n*********************************************\\\\nWelcome T0 Sim\"\n\t\t$s4 = \"echo \\\"<a target='_blank' href='?id=fm&fedit=$dir$file'><span style='text-decora\"\n\tcondition:\n\t\t1 of them\n}\nrule RemExp_asp {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file RemExp.asp.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"aa1d8491f4e2894dbdb91eec1abc2244\"\n\tstrings:\n\t\t$s0 = \"<title>Remote Explorer</title>\"\n\t\t$s3 = \" FSO.CopyFile Request.QueryString(\\\"FolderPath\\\") & Request.QueryString(\\\"CopyFi\"\n\t\t$s4 = \"<td bgcolor=\\\"<%=BgColor%>\\\" title=\\\"<%=File.Name%>\\\"> <a href= \\\"showcode.asp?f\"\n\tcondition:\n\t\t2 of them\n}\nrule phvayvv_php_php {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file phvayvv.php.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"35fb37f3c806718545d97c6559abd262\"\n\tstrings:\n\t\t$s0 = \"{mkdir(\\\"$dizin/$duzenx2\\\",777)\"\n\t\t$s1 = \"$baglan=fopen($duzkaydet,'w');\"\n\t\t$s2 = \"PHVayv 1.0\"\n\tcondition:\n\t\t1 of them\n}\nrule klasvayv_asp {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file klasvayv.asp.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"2b3e64bf8462fc3d008a3d1012da64ef\"\n\tstrings:\n\t\t$s1 = \"set aktifklas=request.querystring(\\\"aktifklas\\\")\"\n\t\t$s2 = \"action=\\\"klasvayv.asp?klasorac=1&aktifklas=<%=aktifklas%>&klas=<%=aktifklas%>\"\n\t\t$s3 = \"<font color=\\\"#858585\\\">www.aventgrup.net\"\n\t\t$s4 = \"style=\\\"BACKGROUND-COLOR: #95B4CC; BORDER-BOTTOM: #000000 1px inset; BORDER-LEFT\"\n\tcondition:\n\t\t1 of them\n}\nrule r57shell_php_php {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file r57shell.php.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"d28445de424594a5f14d0fe2a7c4e94f\"\n\tstrings:\n\t\t$s0 = \"r57shell\" fullword\n\t\t$s1 = \" else if ($HTTP_POST_VARS['with'] == \\\"lynx\\\") { $HTTP_POST_VARS['cmd']= \\\"lynx \"\n\t\t$s2 = \"RusH security team\"\n\t\t$s3 = \"'ru_text12' => 'back-connect\"\n\tcondition:\n\t\t1 of them\n}\nrule rst_sql_php_php {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file rst_sql.php.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"0961641a4ab2b8cb4d2beca593a92010\"\n\tstrings:\n\t\t$s0 = \"C:\\\\tmp\\\\dump_\"\n\t\t$s1 = \"RST MySQL\"\n\t\t$s2 = \"http://rst.void.ru\"\n\t\t$s3 = \"$st_form_bg='R0lGODlhCQAJAIAAAOfo6u7w8yH5BAAAAAAALAAAAAAJAAkAAAIPjAOnuJfNHJh0qtfw0lcVADs=';\"\n\tcondition:\n\t\t2 of them\n}\nrule wh_bindshell_py {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file wh_bindshell.py.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"fab20902862736e24aaae275af5e049c\"\n\tstrings:\n\t\t$s0 = \"#Use: python wh_bindshell.py [port] [password]\"\n\t\t$s2 = \"python -c\\\"import md5;x=md5.new('you_password');print x.hexdigest()\\\"\" fullword\n\t\t$s3 = \"#bugz: ctrl+c etc =script stoped=\" fullword\n\tcondition:\n\t\t1 of them\n}\nrule lurm_safemod_on_cgi {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file lurm_safemod_on.cgi.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"5ea4f901ce1abdf20870c214b3231db3\"\n\tstrings:\n\t\t$s0 = \"Network security team :: CGI Shell\" fullword\n\t\t$s1 = \"#########################<<KONEC>>#####################################\" fullword\n\t\t$s2 = \"##if (!defined$param{pwd}){$param{pwd}='Enter_Password'};##\" fullword\n\tcondition:\n\t\t1 of them\n}\nrule c99madshell_v2_0_php_php {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file c99madshell_v2.0.php.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"d27292895da9afa5b60b9d3014f39294\"\n\tstrings:\n\t\t$s2 = \"eval(gzinflate(base64_decode('HJ3HkqNQEkU/ZzqCBd4t8V4YAQI2E3jvPV8/1Gw6orsVFLyXef\"\n\tcondition:\n\t\tall of them\n}\nrule backupsql_php_often_with_c99shell {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file backupsql.php.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"ab1a06ab1a1fe94e3f3b7f80eedbc12f\"\n\tstrings:\n\t\t$s2 = \"//$message.= \\\"--{$mime_boundary}\\\\n\\\" .\\\"Content-Type: {$fileatt_type};\\\\n\\\" .\"\n\t\t$s4 = \"$ftpconnect = \\\"ncftpput -u $ftp_user_name -p $ftp_user_pass -d debsender_ftplog\"\n\tcondition:\n\t\tall of them\n}\nrule uploader_php_php {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file uploader.php.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"0b53b67bb3b004a8681e1458dd1895d0\"\n\tstrings:\n\t\t$s2 = \"move_uploaded_file($userfile, \\\"entrika.php\\\"); \" fullword\n\t\t$s3 = \"Send this file: <INPUT NAME=\\\"userfile\\\" TYPE=\\\"file\\\">\" fullword\n\t\t$s4 = \"<INPUT TYPE=\\\"hidden\\\" name=\\\"MAX_FILE_SIZE\\\" value=\\\"100000\\\">\" fullword\n\tcondition:\n\t\t2 of them\n}\nrule telnet_pl {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file telnet.pl.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"dd9dba14383064e219e29396e242c1ec\"\n\tstrings:\n\t\t$s0 = \"W A R N I N G: Private Server\"\n\t\t$s2 = \"$Message = q$<pre><font color=\\\"#669999\\\"> _____  _____  _____          _____   \"\n\tcondition:\n\t\tall of them\n}\nrule w3d_php_php {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file w3d.php.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"987f66b29bfb209a0b4f097f84f57c3b\"\n\tstrings:\n\t\t$s0 = \"W3D Shell\"\n\t\t$s1 = \"By: Warpboy\"\n\t\t$s2 = \"No Query Executed\"\n\tcondition:\n\t\t2 of them\n}\nrule WebShell_cgi {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file WebShell.cgi.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"bc486c2e00b5fc3e4e783557a2441e6f\"\n\tstrings:\n\t\t$s0 = \"WebShell.cgi\"\n\t\t$s2 = \"<td><code class=\\\"entry-[% if entry.all_rights %]mine[% else\"\n\tcondition:\n\t\tall of them\n}\nrule WinX_Shell_html {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file WinX Shell.html.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"17ab5086aef89d4951fe9b7c7a561dda\"\n\tstrings:\n\t\t$s0 = \"WinX Shell\"\n\t\t$s1 = \"Created by greenwood from n57\"\n\t\t$s2 = \"<td><font color=\\\\\\\"#990000\\\\\\\">Win Dir:</font></td>\"\n\tcondition:\n\t\t2 of them\n}\nrule Dx_php_php {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file Dx.php.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"9cfe372d49fe8bf2fac8e1c534153d9b\"\n\tstrings:\n\t\t$s0 = \"print \\\"\\\\n\\\".'Tip: to view the file \\\"as is\\\" - open the page in <a href=\\\"'.Dx\"\n\t\t$s2 = \"$DEF_PORTS=array (1=>'tcpmux (TCP Port Service Multiplexer)',2=>'Management Util\"\n\t\t$s3 = \"$ra44  = rand(1,99999);$sj98 = \\\"sh-$ra44\\\";$ml = \\\"$sd98\\\";$a5 = $_SERVER['HTTP\"\n\tcondition:\n\t\t1 of them\n}\nrule csh_php_php {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file csh.php.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"194a9d3f3eac8bc56d9a7c55c016af96\"\n\tstrings:\n\t\t$s0 = \".::[c0derz]::. web-shell\"\n\t\t$s1 = \"http://c0derz.org.ua\"\n\t\t$s2 = \"vint21h@c0derz.org.ua\"\n\t\t$s3 = \"$name='63a9f0ea7bb98050796b649e85481845';//root\"\n\tcondition:\n\t\t1 of them\n}\nrule pHpINJ_php_php {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file pHpINJ.php.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"d7a4b0df45d34888d5a09f745e85733f\"\n\tstrings:\n\t\t$s1 = \"News Remote PHP Shell Injection\"\n\t\t$s3 = \"Php Shell <br />\" fullword\n\t\t$s4 = \"<input type = \\\"text\\\" name = \\\"url\\\" value = \\\"\"\n\tcondition:\n\t\t2 of them\n}\nrule sig_2008_php_php {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file 2008.php.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"3e4ba470d4c38765e4b16ed930facf2c\"\n\tstrings:\n\t\t$s0 = \"Codz by angel(4ngel)\"\n\t\t$s1 = \"Web: http://www.4ngel.net\"\n\t\t$s2 = \"$admin['cookielife'] = 86400;\"\n\t\t$s3 = \"$errmsg = 'The file you want Downloadable was nonexistent';\"\n\tcondition:\n\t\t1 of them\n}\nrule ak74shell_php_php {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file ak74shell.php.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"7f83adcb4c1111653d30c6427a94f66f\"\n\tstrings:\n\t\t$s1 = \"$res .= '<td align=\\\"center\\\"><a href=\\\"'.$xshell.'?act=chmod&file='.$_SESSION[\"\n\t\t$s2 = \"AK-74 Security Team Web Site: www.ak74-team.net\"\n\t\t$s3 = \"$xshell\"\n\tcondition:\n\t\t2 of them\n}\nrule Rem_View_php_php {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file Rem View.php.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"29420106d9a81553ef0d1ca72b9934d9\"\n\tstrings:\n\t\t$s0 = \"$php=\\\"/* line 1 */\\\\n\\\\n// \\\".mm(\\\"for example, uncomment next line\\\").\\\"\"\n\t\t$s2 = \"<input type=submit value='\\\".mm(\\\"Delete all dir/files recursive\\\").\\\" (rm -fr)'\"\n\t\t$s4 =\"Welcome to phpRemoteView (RemView)\"\n\tcondition:\n\t\t1 of them\n}\nrule Java_Shell_js {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file Java Shell.js.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"36403bc776eb12e8b7cc0eb47c8aac83\"\n\tstrings:\n\t\t$s2 = \"PySystemState.initialize(System.getProperties(), null, argv);\" fullword\n\t\t$s3 = \"public class JythonShell extends JPanel implements Runnable {\" fullword\n\t\t$s4 = \"public static int DEFAULT_SCROLLBACK = 100\"\n\tcondition:\n\t\t2 of them\n}\nrule STNC_php_php {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file STNC.php.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"2e56cfd5b5014cbbf1c1e3f082531815\"\n\tstrings:\n\t\t$s0 = \"drmist.ru\" fullword\n\t\t$s1 = \"hidden(\\\"action\\\",\\\"download\\\").hidden_pwd().\\\"<center><table><tr><td width=80\"\n\t\t$s2 = \"STNC WebShell\"\n\t\t$s3 = \"http://www.security-teams.net/index.php?showtopic=\"\n\tcondition:\n\t\t1 of them\n}\nrule aZRaiLPhp_v1_0_php {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file aZRaiLPhp v1.0.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"26b2d3943395682e36da06ed493a3715\"\n\tstrings:\n\t\t$s0 = \"azrailphp\"\n\t\t$s1 = \"<br><center><INPUT TYPE='SUBMIT' NAME='dy' VALUE='Dosya Yolla!'></center>\"\n\t\t$s3 = \"<center><INPUT TYPE='submit' name='okmf' value='TAMAM'></center>\"\n\tcondition:\n\t\t2 of them\n}\nrule Moroccan_Spamers_Ma_EditioN_By_GhOsT_php {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file Moroccan Spamers Ma-EditioN By GhOsT.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"d1b7b311a7ffffebf51437d7cd97dc65\"\n\tstrings:\n\t\t$s0 = \";$sd98=\\\"john.barker446@gmail.com\\\"\"\n\t\t$s1 = \"print \\\"Sending mail to $to....... \\\";\"\n\t\t$s2 = \"<td colspan=\\\"2\\\" width=\\\"715\\\" background=\\\"/simparts/images/cellpic1.gif\\\" hei\"\n\tcondition:\n\t\t1 of them\n}\nrule zacosmall_php {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file zacosmall.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"5295ee8dc2f5fd416be442548d68f7a6\"\n\tstrings:\n\t\t$s0 = \"rand(1,99999);$sj98\"\n\t\t$s1 = \"$dump_file.='`'.$rows2[0].'`\"\n\t\t$s3 = \"filename=\\\\\\\"dump_{$db_dump}_${table_d\"\n\tcondition:\n\t\t2 of them\n}\nrule CmdAsp_asp {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file CmdAsp.asp.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"64f24f09ec6efaa904e2492dffc518b9\"\n\tstrings:\n\t\t$s0 = \"CmdAsp.asp\"\n\t\t$s1 = \"Set oFileSys = Server.CreateObject(\\\"Scripting.FileSystemObject\\\")\" fullword\n\t\t$s2 = \"-- Use a poor man's pipe ... a temp file --\"\n\t\t$s3 = \"maceo @ dogmile.com\"\n\tcondition:\n\t\t2 of them\n}\nrule simple_backdoor_php {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file simple-backdoor.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"f091d1b9274c881f8e41b2f96e6b9936\"\n\tstrings:\n\t\t$s0 = \"$cmd = ($_REQUEST['cmd']);\" fullword\n\t\t$s1 = \"<!-- Simple PHP backdoor by DK (http://michaeldaw.org) -->\"\n\t\t$s2 = \"Usage: http://target.com/simple-backdoor.php?cmd=cat+/etc/passwd\" fullword\n\tcondition:\n\t\t2 of them\n}\nrule mysql_shell_php {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file mysql_shell.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"d42aec2891214cace99b3eb9f3e21a63\"\n\tstrings:\n\t\t$s0 = \"SooMin Kim\"\n\t\t$s1 = \"smkim@popeye.snu.ac.kr\"\n\t\t$s2 = \"echo \\\"<td><a href='$PHP_SELF?action=deleteData&dbname=$dbname&tablename=$tablen\"\n\tcondition:\n\t\t1 of them\n}\nrule Dive_Shell_1_0___Emperor_Hacking_Team_php {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file Dive Shell 1.0 - Emperor Hacking Team.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"1b5102bdc41a7bc439eea8f0010310a5\"\n\tstrings:\n\t\t$s0 = \"Emperor Hacking TEAM\"\n\t\t$s1 = \"Simshell\" fullword\n\t\t$s2 = \"ereg('^[[:blank:]]*cd[[:blank:]]\"\n\t\t$s3 = \"<form name=\\\"shell\\\" action=\\\"<?php echo $_SERVER['PHP_SELF'] ?>\\\" method=\\\"POST\"\n\tcondition:\n\t\t2 of them\n}\nrule Asmodeus_v0_1_pl {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file Asmodeus v0.1.pl.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"0978b672db0657103c79505df69cb4bb\"\n\tstrings:\n\t\t$s0 = \"[url=http://www.governmentsecurity.org\"\n\t\t$s1 = \"perl asmodeus.pl client 6666 127.0.0.1\"\n\t\t$s2 = \"print \\\"Asmodeus Perl Remote Shell\"\n\t\t$s4 = \"$internet_addr = inet_aton(\\\"$host\\\") or die \\\"ALOA:$!\\\\n\\\";\" fullword\n\tcondition:\n\t\t2 of them\n}\nrule backup_php_often_with_c99shell {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file backup.php.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"aeee3bae226ad57baf4be8745c3f6094\"\n\tstrings:\n\t\t$s0 = \"#phpMyAdmin MySQL-Dump\" fullword\n\t\t$s2 = \";db_connect();header('Content-Type: application/octetstr\"\n\t\t$s4 = \"$data .= \\\"#Database: $database\" fullword\n\tcondition:\n\t\tall of them\n}\nrule Reader_asp {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file Reader.asp.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"ad1a362e0a24c4475335e3e891a01731\"\n\tstrings:\n\t\t$s1 = \"Mehdi & HolyDemon\"\n\t\t$s2 = \"www.infilak.\"\n\t\t$s3 = \"'*T@*r@#@&mms^PdbYbVuBcAAA==^#~@%><form method=post name=inf><table width=\\\"75%\"\n\tcondition:\n\t\t2 of them\n}\nrule phpshell17_php {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file phpshell17.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"9a928d741d12ea08a624ee9ed5a8c39d\"\n\tstrings:\n\t\t$s0 = \"<input name=\\\"submit_btn\\\" type=\\\"submit\\\" value=\\\"Execute Command\\\"></p>\" fullword\n\t\t$s1 = \"<title>[ADDITINAL TITTLE]-phpShell by:[YOURNAME]<?php echo PHPSHELL_VERSION ?></\"\n\t\t$s2 = \"href=\\\"mailto: [YOU CAN ENTER YOUR MAIL HERE]- [ADDITIONAL TEXT]</a></i>\" fullword\n\tcondition:\n\t\t1 of them\n}\nrule myshell_php_php {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file myshell.php.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"62783d1db52d05b1b6ae2403a7044490\"\n\tstrings:\n\t\t$s0 = \"@chdir($work_dir) or ($shellOutput = \\\"MyShell: can't change directory.\"\n\t\t$s1 = \"echo \\\"<font color=$linkColor><b>MyShell file editor</font> File:<font color\"\n\t\t$s2 = \" $fileEditInfo = \\\"&nbsp;&nbsp;:::::::&nbsp;&nbsp;Owner: <font color=$\"\n\tcondition:\n\t\t2 of them\n}\nrule SimShell_1_0___Simorgh_Security_MGZ_php {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file SimShell 1.0 - Simorgh Security MGZ.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"37cb1db26b1b0161a4bf678a6b4565bd\"\n\tstrings:\n\t\t$s0 = \"Simorgh Security Magazine \"\n\t\t$s1 = \"Simshell.css\"\n\t\t$s2 = \"} elseif (ereg('^[[:blank:]]*cd[[:blank:]]+([^;]+)$', $_REQUEST['command'], \"\n\t\t$s3 = \"www.simorgh-ev.com\"\n\tcondition:\n\t\t2 of them\n}\nrule jspshall_jsp {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file jspshall.jsp.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"efe0f6edaa512c4e1fdca4eeda77b7ee\"\n\tstrings:\n\t\t$s0 = \"kj021320\"\n\t\t$s1 = \"case 'T':systemTools(out);break;\"\n\t\t$s2 = \"out.println(\\\"<tr><td>\\\"+ico(50)+f[i].getName()+\\\"</td><td> file\"\n\tcondition:\n\t\t2 of them\n}\nrule webshell_php {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file webshell.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"e425241b928e992bde43dd65180a4894\"\n\tstrings:\n\t\t$s2 = \"<die(\\\"Couldn't Read directory, Blocked!!!\\\");\"\n\t\t$s3 = \"PHP Web Shell\"\n\tcondition:\n\t\tall of them\n}\nrule rootshell_php {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file rootshell.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"265f3319075536030e59ba2f9ef3eac6\"\n\tstrings:\n\t\t$s0 = \"shells.dl.am\"\n\t\t$s1 = \"This server has been infected by $owner\"\n\t\t$s2 = \"<input type=\\\"submit\\\" value=\\\"Include!\\\" name=\\\"inc\\\"></p>\"\n\t\t$s4 = \"Could not write to file! (Maybe you didn't enter any text?)\"\n\tcondition:\n\t\t2 of them\n}\nrule connectback2_pl {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file connectback2.pl.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"473b7d226ea6ebaacc24504bd740822e\"\n\tstrings:\n\t\t$s0 = \"#We Are: MasterKid, AleXutz, FatMan & MiKuTuL                                   \"\n\t\t$s1 = \"echo --==Userinfo==-- ; id;echo;echo --==Directory==-- ; pwd;echo; echo --==Shel\"\n\t\t$s2 = \"ConnectBack Backdoor\"\n\tcondition:\n\t\t1 of them\n}\nrule DefaceKeeper_0_2_php {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file DefaceKeeper_0.2.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"713c54c3da3031bc614a8a55dccd7e7f\"\n\tstrings:\n\t\t$s0 = \"target fi1e:<br><input type=\\\"text\\\" name=\\\"target\\\" value=\\\"index.php\\\"></br>\" fullword\n\t\t$s1 = \"eval(base64_decode(\\\"ZXZhbChiYXNlNjRfZGVjb2RlKCJhV2R1YjNKbFgzVnpaWEpmWVdKdmNuUW9\"\n\t\t$s2 = \"<img src=\\\"http://s43.radikal.ru/i101/1004/d8/ced1f6b2f5a9.png\\\" align=\\\"center\"\n\tcondition:\n\t\t1 of them\n}\nrule shells_PHP_wso {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file wso.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"33e2891c13b78328da9062fbfcf898b6\"\n\tstrings:\n\t\t$s0 = \"$back_connect_p=\\\"IyEvdXNyL2Jpbi9wZXJsDQp1c2UgU29ja2V0Ow0KJGlhZGRyPWluZXRfYXRvbi\"\n\t\t$s3 = \"echo '<h1>Execution PHP-code</h1><div class=content><form name=pf method=pos\"\n\tcondition:\n\t\t1 of them\n}\nrule backdoor1_php {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file backdoor1.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"e1adda1f866367f52de001257b4d6c98\"\n\tstrings:\n\t\t$s1 = \"echo \\\"[DIR] <A HREF=\\\\\\\"\\\".$_SERVER['PHP_SELF'].\\\"?rep=\\\".realpath($rep.\\\"..\"\n\t\t$s2 = \"class backdoor {\"\n\t\t$s4 = \"echo \\\"<a href=\\\\\\\"\\\".$_SERVER['PHP_SELF'].\\\"?copy=1\\\\\\\">Copier un fichier</a> <\"\n\tcondition:\n\t\t1 of them\n}\nrule elmaliseker_asp {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file elmaliseker.asp.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"b32d1730d23a660fd6aa8e60c3dc549f\"\n\tstrings:\n\t\t$s0 = \"if Int((1-0+1)*Rnd+0)=0 then makeEmail=makeText(8) & \\\"@\\\" & makeText(8) & \\\".\\\"\"\n\t\t$s1 = \"<form name=frmCMD method=post action=\\\"<%=gURL%>\\\">\"\n\t\t$s2 = \"dim zombie_array,special_array\"\n\t\t$s3 = \"http://vnhacker.org\"\n\tcondition:\n\t\t1 of them\n}\nrule indexer_asp {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file indexer.asp.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"9ea82afb8c7070817d4cdf686abe0300\"\n\tstrings:\n\t\t$s0 = \"<td>Nereye :<td><input type=\\\"text\\\" name=\\\"nereye\\\" size=25></td><td><input typ\"\n\t\t$s2 = \"D7nD7l.km4snk`JzKnd{n_ejq;bd{KbPur#kQ8AAA==^#~@%>></td><td><input type=\\\"submit\"\n\tcondition:\n\t\t1 of them\n}\nrule DxShell_php_php {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file DxShell.php.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"33a2b31810178f4c2e71fbdeb4899244\"\n\tstrings:\n\t\t$s0 = \"print \\\"\\\\n\\\".'Tip: to view the file \\\"as is\\\" - open the page in <a href=\\\"'.Dx\"\n\t\t$s2 = \"print \\\"\\\\n\\\".'<tr><td width=100pt class=linelisting><nobr>POST (php eval)</td><\"\n\tcondition:\n\t\t1 of them\n}\nrule s72_Shell_v1_1_Coding_html {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file s72 Shell v1.1 Coding.html.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"c2e8346a5515c81797af36e7e4a3828e\"\n\tstrings:\n\t\t$s0 = \"Dizin</font></b></font><font face=\\\"Verdana\\\" style=\\\"font-size: 8pt\\\"><\"\n\t\t$s1 = \"s72 Shell v1.0 Codinf by Cr@zy_King\"\n\t\t$s3 = \"echo \\\"<p align=center>Dosya Zaten Bulunuyor</p>\\\"\"\n\tcondition:\n\t\t1 of them\n}\nrule hidshell_php_php {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file hidshell.php.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"c2f3327d60884561970c63ffa09439a4\"\n\tstrings:\n\t\t$s0 = \"<?$d='G7mHWQ9vvXiL/QX2oZ2VTDpo6g3FYAa6X+8DMIzcD0eHZaBZH7jFpZzUz7XNenxSYvBP2Wy36U\"\n\tcondition:\n\t\tall of them\n}\nrule kacak_asp {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file kacak.asp.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"907d95d46785db21331a0324972dda8c\"\n\tstrings:\n\t\t$s0 = \"Kacak FSO 1.0\"\n\t\t$s1 = \"if request.querystring(\\\"TGH\\\") = \\\"1\\\" then\"\n\t\t$s3 = \"<font color=\\\"#858585\\\">BuqX</font></a></font><font face=\\\"Verdana\\\" style=\"\n\t\t$s4 = \"mailto:BuqX@hotmail.com\"\n\tcondition:\n\t\t1 of them\n}\nrule PHP_Backdoor_Connect_pl_php {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file PHP Backdoor Connect.pl.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"57fcd9560dac244aeaf95fd606621900\"\n\tstrings:\n\t\t$s0 = \"LorD of IRAN HACKERS SABOTAGE\"\n\t\t$s1 = \"LorD-C0d3r-NT\"\n\t\t$s2 = \"echo --==Userinfo==-- ;\"\n\tcondition:\n\t\t1 of them\n}\nrule Antichat_Socks5_Server_php_php {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file Antichat Socks5 Server.php.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"cbe9eafbc4d86842a61a54d98e5b61f1\"\n\tstrings:\n\t\t$s0 = \"$port = base_convert(bin2hex(substr($reqmessage[$id], 3+$reqlen+1, 2)), 16, 10);\" fullword\n\t\t$s3 = \"#   [+] Domain name address type\"\n\t\t$s4 = \"www.antichat.ru\"\n\tcondition:\n\t\t1 of them\n}\nrule Antichat_Shell_v1_3_php {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file Antichat Shell v1.3.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"40d0abceba125868be7f3f990f031521\"\n\tstrings:\n\t\t$s0 = \"Antichat\"\n\t\t$s1 = \"Can't open file, permission denide\"\n\t\t$s2 = \"$ra44\"\n\tcondition:\n\t\t2 of them\n}\nrule Safe_Mode_Bypass_PHP_4_4_2_and_PHP_5_1_2_php {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file Safe_Mode Bypass PHP 4.4.2 and PHP 5.1.2.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"49ad9117c96419c35987aaa7e2230f63\"\n\tstrings:\n\t\t$s0 = \"Welcome.. By This script you can jump in the (Safe Mode=ON) .. Enjoy\"\n\t\t$s1 = \"Mode Shell v1.0</font></span>\"\n\t\t$s2 = \"has been already loaded. PHP Emperor <xb5@hotmail.\"\n\tcondition:\n\t\t1 of them\n}\nrule mysql_php_php {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file mysql.php.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"12bbdf6ef403720442a47a3cc730d034\"\n\tstrings:\n\t\t$s0 = \"action=mysqlread&mass=loadmass\\\">load all defaults\"\n\t\t$s2 = \"if (@passthru($cmd)) { echo \\\" -->\\\"; $this->output_state(1, \\\"passthru\"\n\t\t$s3 = \"$ra44  = rand(1,99999);$sj98 = \\\"sh-$ra44\\\";$ml = \\\"$sd98\\\";$a5 = \"\n\tcondition:\n\t\t1 of them\n}\nrule Worse_Linux_Shell_php {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file Worse Linux Shell.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"8338c8d9eab10bd38a7116eb534b5fa2\"\n\tstrings:\n\t\t$s1 = \"print \\\"<tr><td><b>Server is:</b></td><td>\\\".$_SERVER['SERVER_SIGNATURE'].\\\"</td\"\n\t\t$s2 = \"print \\\"<tr><td><b>Execute command:</b></td><td><input size=100 name=\\\\\\\"_cmd\"\n\tcondition:\n\t\t1 of them\n}\nrule cyberlords_sql_php_php {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file cyberlords_sql.php.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"03b06b4183cb9947ccda2c3d636406d4\"\n\tstrings:\n\t\t$s0 = \"Coded by n0 [nZer0]\"\n\t\t$s1 = \" www.cyberlords.net\"\n\t\t$s2 = \"U29mdHdhcmUAQWRvYmUgSW1hZ2VSZWFkeXHJZTwAAAAMUExURf///wAAAJmZzAAAACJoURkAAAAE\"\n\t\t$s3 = \"return \\\"<BR>Dump error! Can't write to \\\".htmlspecialchars($file);\"\n\tcondition:\n\t\t1 of them\n}\nrule cmd_asp_5_1_asp {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file cmd-asp-5.1.asp.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"8baa99666bf3734cbdfdd10088e0cd9f\"\n\tstrings:\n\t\t$s0 = \"Call oS.Run(\\\"win.com cmd.exe /c del \\\"& szTF,0,True)\" fullword\n\t\t$s3 = \"Call oS.Run(\\\"win.com cmd.exe /c \\\"\\\"\\\" & szCMD & \\\" > \\\" & szTF &\" fullword\n\tcondition:\n\t\t1 of them\n}\nrule pws_php_php {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file pws.php.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"ecdc6c20f62f99fa265ec9257b7bf2ce\"\n\tstrings:\n\t\t$s0 = \"<div align=\\\"left\\\"><font size=\\\"1\\\">Input command :</font></div>\" fullword\n\t\t$s1 = \"<input type=\\\"text\\\" name=\\\"cmd\\\" size=\\\"30\\\" class=\\\"input\\\"><br>\" fullword\n\t\t$s4 = \"<input type=\\\"text\\\" name=\\\"dir\\\" size=\\\"30\\\" value=\\\"<? passthru(\\\"pwd\\\"); ?>\"\n\tcondition:\n\t\t2 of them\n}\nrule PHP_Shell_php_php {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file PHP Shell.php.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"a2f8fa4cce578fc9c06f8e674b9e63fd\"\n\tstrings:\n\t\t$s0 = \"echo \\\"</form><form action=\\\\\\\"$SFileName?$urlAdd\\\\\\\" method=\\\\\\\"post\\\\\\\"><input\"\n\t\t$s1 = \"echo \\\"<form action=\\\\\\\"$SFileName?$urlAdd\\\\\\\" method=\\\\\\\"POST\\\\\\\"><input type=\"\n\tcondition:\n\t\tall of them\n}\nrule Ayyildiz_Tim___AYT__Shell_v_2_1_Biz_html {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file Ayyildiz Tim  -AYT- Shell v 2.1 Biz.html.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"8a8c8bb153bd1ee097559041f2e5cf0a\"\n\tstrings:\n\t\t$s0 = \"Ayyildiz\"\n\t\t$s1 = \"TouCh By iJOo\"\n\t\t$s2 = \"First we check if there has been asked for a working directory\"\n\t\t$s3 = \"http://ayyildiz.org/images/whosonline2.gif\"\n\tcondition:\n\t\t2 of them\n}\nrule EFSO_2_asp {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file EFSO_2.asp.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"b5fde9682fd63415ae211d53c6bfaa4d\"\n\tstrings:\n\t\t$s0 = \"Ejder was HERE\"\n\t\t$s1 = \"*~PU*&BP[_)f!8c2F*@#@&~,P~P,~P&q~8BPmS~9~~lB~X`V,_,F&*~,jcW~~[_c3TRFFzq@#@&PP,~~\"\n\tcondition:\n\t\t2 of them\n}\nrule lamashell_php {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file lamashell.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"de9abc2e38420cad729648e93dfc6687\"\n\tstrings:\n\t\t$s0 = \"lama's'hell\" fullword\n\t\t$s1 = \"if($_POST['king'] == \\\"\\\") {\"\n\t\t$s2 = \"if (move_uploaded_file($_FILES['fila']['tmp_name'], $curdir.\\\"/\\\".$_FILES['f\"\n\tcondition:\n\t\t1 of them\n}\nrule Ajax_PHP_Command_Shell_php {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file Ajax_PHP Command Shell.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"93d1a2e13a3368a2472043bd6331afe9\"\n\tstrings:\n\t\t$s1 = \"newhtml = '<b>File browser is under construction! Use at your own risk!</b> <br>\"\n\t\t$s2 = \"Empty Command..type \\\\\\\"shellhelp\\\\\\\" for some ehh...help\"\n\t\t$s3 = \"newhtml = '<font size=0><b>This will reload the page... :(</b><br><br><form enct\"\n\tcondition:\n\t\t1 of them\n}\nrule JspWebshell_1_2_jsp {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file JspWebshell 1.2.jsp.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"70a0ee2624e5bbe5525ccadc467519f6\"\n\tstrings:\n\t\t$s0 = \"JspWebshell\"\n\t\t$s1 = \"CreateAndDeleteFolder is error:\"\n\t\t$s2 = \"<td width=\\\"70%\\\" height=\\\"22\\\">&nbsp;<%=env.queryHashtable(\\\"java.c\"\n\t\t$s3 = \"String _password =\\\"111\\\";\"\n\tcondition:\n\t\t2 of them\n}\nrule Sincap_php_php {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file Sincap.php.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"b68b90ff6012a103e57d141ed38a7ee9\"\n\tstrings:\n\t\t$s0 = \"$baglan=fopen(\\\"/tmp/$ekinci\\\",'r');\"\n\t\t$s2 = \"$tampon4=$tampon3-1\"\n\t\t$s3 = \"@aventgrup.net\"\n\tcondition:\n\t\t2 of them\n}\nrule Test_php_php {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file Test.php.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"77e331abd03b6915c6c6c7fe999fcb50\"\n\tstrings:\n\t\t$s0 = \"$yazi = \\\"test\\\" . \\\"\\\\r\\\\n\\\";\" fullword\n\t\t$s2 = \"fwrite ($fp, \\\"$yazi\\\");\" fullword\n\t\t$s3 = \"$entry_line=\\\"HACKed by EntriKa\\\";\" fullword\n\tcondition:\n\t\t1 of them\n}\nrule Phyton_Shell_py {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file Phyton Shell.py.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"92b3c897090867c65cc169ab037a0f55\"\n\tstrings:\n\t\t$s1 = \"sh_out=os.popen(SHELL+\\\" \\\"+cmd).readlines()\" fullword\n\t\t$s2 = \"#   d00r.py 0.3a (reverse|bind)-shell in python by fQ\" fullword\n\t\t$s3 = \"print \\\"error; help: head -n 16 d00r.py\\\"\" fullword\n\t\t$s4 = \"print \\\"PW:\\\",PW,\\\"PORT:\\\",PORT,\\\"HOST:\\\",HOST\" fullword\n\tcondition:\n\t\t1 of them\n}\nrule mysql_tool_php_php {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file mysql_tool.php.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"5fbe4d8edeb2769eda5f4add9bab901e\"\n\tstrings:\n\t\t$s0 = \"$error_text = '<strong>Failed selecting database \\\"'.$this->db['\"\n\t\t$s1 = \"$ra44  = rand(1,99999);$sj98 = \\\"sh-$ra44\\\";$ml = \\\"$sd98\\\";$a5 = $_SERV\"\n\t\t$s4 = \"<div align=\\\"center\\\">The backup process has now started<br \"\n\tcondition:\n\t\t1 of them\n}\nrule Zehir_4_asp {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file Zehir 4.asp.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"7f4e12e159360743ec016273c3b9108c\"\n\tstrings:\n\t\t$s2 = \"</a><a href='\\\"&dosyapath&\\\"?status=10&dPath=\\\"&f1.path&\\\"&path=\\\"&path&\\\"&Time=\"\n\t\t$s4 = \"<input type=submit value=\\\"Test Et!\\\" onclick=\\\"\"\n\tcondition:\n\t\t1 of them\n}\nrule sh_php_php {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file sh.php.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"330af9337ae51d0bac175ba7076d6299\"\n\tstrings:\n\t\t$s1 = \"$ar_file=array('/etc/passwd','/etc/shadow','/etc/master.passwd','/etc/fstab','/e\"\n\t\t$s2 = \"Show <input type=text size=5 value=\\\".((isset($_POST['br_st']))?$_POST['br_st']:\"\n\tcondition:\n\t\t1 of them\n}\nrule phpbackdoor15_php {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file phpbackdoor15.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"0fdb401a49fc2e481e3dfd697078334b\"\n\tstrings:\n\t\t$s1 = \"echo \\\"fichier telecharge dans \\\".good_link(\\\"./\\\".$_FILES[\\\"fic\\\"][\\\"na\"\n\t\t$s2 = \"if(move_uploaded_file($_FILES[\\\"fic\\\"][\\\"tmp_name\\\"],good_link(\\\"./\\\".$_FI\"\n\t\t$s3 = \"echo \\\"Cliquez sur un nom de fichier pour lancer son telechargement. Cliquez s\"\n\tcondition:\n\t\t1 of them\n}\nrule phpjackal_php {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file phpjackal.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"ab230817bcc99acb9bdc0ec6d264d76f\"\n\tstrings:\n\t\t$s3 = \"$dl=$_REQUEST['downloaD'];\"\n\t\t$s4 = \"else shelL(\\\"perl.exe $name $port\\\");\"\n\tcondition:\n\t\t1 of them\n}\nrule sql_php_php {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file sql.php.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"8334249cbb969f2d33d678fec2b680c5\"\n\tstrings:\n\t\t$s1 = \"fputs ($fp, \\\"# RST MySQL tools\\\\r\\\\n# Home page: http://rst.void.ru\\\\r\\\\n#\"\n\t\t$s2 = \"http://rst.void.ru\"\n\t\t$s3 = \"print \\\"<a href=\\\\\\\"$_SERVER[PHP_SELF]?s=$s&login=$login&passwd=$passwd&\"\n\tcondition:\n\t\t1 of them\n}\nrule cgi_python_py {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file cgi-python.py.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"0a15f473e2232b89dae1075e1afdac97\"\n\tstrings:\n\t\t$s0 = \"a CGI by Fuzzyman\"\n\t\t$s1 = \"\\\"\\\"\\\"+fontline +\\\"Version : \\\" + versionstring + \\\"\\\"\\\", Running on : \\\"\\\"\\\" + \"\n\t\t$s2 = \"values = map(lambda x: x.value, theform[field])     # allows for\"\n\tcondition:\n\t\t1 of them\n}\nrule ru24_post_sh_php_php {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file ru24_post_sh.php.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"5b334d494564393f419af745dc1eeec7\"\n\tstrings:\n\t\t$s1 = \"<title>Ru24PostWebShell - \\\".$_POST['cmd'].\\\"</title>\" fullword\n\t\t$s3 = \"if ((!$_POST['cmd']) || ($_POST['cmd']==\\\"\\\")) { $_POST['cmd']=\\\"id;pwd;uname -a\"\n\t\t$s4 = \"Writed by DreAmeRz\" fullword\n\tcondition:\n\t\t1 of them\n}\nrule DTool_Pro_php {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file DTool Pro.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"366ad973a3f327dfbfb915b0faaea5a6\"\n\tstrings:\n\t\t$s0 = \"r3v3ng4ns\\\\nDigite\"\n\t\t$s1 = \"if(!@opendir($chdir)) $ch_msg=\\\"dtool: line 1: chdir: It seems that the permissi\"\n\t\t$s3 = \"if (empty($cmd) and $ch_msg==\\\"\\\") echo (\\\"Comandos Exclusivos do DTool Pro\\\\n\"\n\tcondition:\n\t\t1 of them\n}\nrule telnetd_pl {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file telnetd.pl.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"5f61136afd17eb025109304bd8d6d414\"\n\tstrings:\n\t\t$s0 = \"0ldW0lf\" fullword\n\t\t$s1 = \"However you are lucky :P\"\n\t\t$s2 = \"I'm FuCKeD\"\n\t\t$s3 = \"ioctl($CLIENT{$client}->{shell}, &TIOCSWINSZ, $winsize);#\"\n\t\t$s4 = \"atrix@irc.brasnet.org\"\n\tcondition:\n\t\t1 of them\n}\nrule php_include_w_shell_php {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file php-include-w-shell.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"4e913f159e33867be729631a7ca46850\"\n\tstrings:\n\t\t$s0 = \"$dataout .= \\\"<td><a href='$MyLoc?$SREQ&incdbhost=$myhost&incdbuser=$myuser&incd\"\n\t\t$s1 = \"if($run == 1 && $phpshellapp && $phpshellhost && $phpshellport) $strOutput .= DB\"\n\tcondition:\n\t\t1 of them\n}\nrule Safe0ver_Shell__Safe_Mod_Bypass_By_Evilc0der_php {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file Safe0ver Shell -Safe Mod Bypass By Evilc0der.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"6163b30600f1e80d2bb5afaa753490b6\"\n\tstrings:\n\t\t$s0 = \"Safe0ver\" fullword\n\t\t$s1 = \"Script Gecisi Tamamlayamadi!\"\n\t\t$s2 = \"document.write(unescape('%3C%68%74%6D%6C%3E%3C%62%6F%64%79%3E%3C%53%43%52%49%50%\"\n\tcondition:\n\t\t1 of them\n}\nrule shell_php_php {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file shell.php.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"1a95f0163b6dea771da1694de13a3d8d\"\n\tstrings:\n\t\t$s1 = \"/* We have found the parent dir. We must be carefull if the parent \" fullword\n\t\t$s2 = \"$tmpfile = tempnam('/tmp', 'phpshell');\"\n\t\t$s3 = \"if (ereg('^[[:blank:]]*cd[[:blank:]]+([^;]+)$', $command, $regs)) {\" fullword\n\tcondition:\n\t\t1 of them\n}\nrule telnet_cgi {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file telnet.cgi.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"dee697481383052980c20c48de1598d1\"\n\tstrings:\n\t\t$s0 = \"www.rohitab.com\"\n\t\t$s1 = \"W A R N I N G: Private Server\"\n\t\t$s2 = \"print \\\"Set-Cookie: SAVEDPWD=;\\\\n\\\"; # remove password cookie\"\n\t\t$s3 = \"$Prompt = $WinNT ? \\\"$CurrentDir> \\\" : \\\"[admin\\\\@$ServerName $C\"\n\tcondition:\n\t\t1 of them\n}\nrule ironshell_php {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file ironshell.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"8bfa2eeb8a3ff6afc619258e39fded56\"\n\tstrings:\n\t\t$s0 = \"www.ironwarez.info\"\n\t\t$s1 = \"$cookiename = \\\"wieeeee\\\";\"\n\t\t$s2 = \"~ Shell I\"\n\t\t$s3 = \"www.rootshell-team.info\"\n\t\t$s4 = \"setcookie($cookiename, $_POST['pass'], time()+3600);\"\n\tcondition:\n\t\t1 of them\n}\nrule backdoorfr_php {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file backdoorfr.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"91e4afc7444ed258640e85bcaf0fecfc\"\n\tstrings:\n\t\t$s1 = \"www.victime.com/index.php?page=http://emplacement_de_la_backdoor.php , ou en tan\"\n\t\t$s2 = \"print(\\\"<br>Provenance du mail : <input type=\\\\\\\"text\\\\\\\" name=\\\\\\\"provenanc\"\n\tcondition:\n\t\t1 of them\n}\nrule aspydrv_asp {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file aspydrv.asp.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"1c01f8a88baee39aa1cebec644bbcb99\"\n\t\tscore = 60\n\tstrings:\n\t\t$s0 = \"If mcolFormElem.Exists(LCase(sIndex)) Then Form = mcolFormElem.Item(LCase(sIndex))\"\n\t\t$s1 = \"password\"\n\t\t$s2 = \"session(\\\"shagman\\\")=\"\n\tcondition:\n\t\t2 of them\n}\nrule cmdjsp_jsp {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file cmdjsp.jsp.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"b815611cc39f17f05a73444d699341d4\"\n\tstrings:\n\t\t$s0 = \"// note that linux = cmd and windows = \\\"cmd.exe /c + cmd\\\" \" fullword\n\t\t$s1 = \"Process p = Runtime.getRuntime().exec(\\\"cmd.exe /C \\\" + cmd);\" fullword\n\t\t$s2 = \"cmdjsp.jsp\"\n\t\t$s3 = \"michaeldaw.org\" fullword\n\tcondition:\n\t\t2 of them\n}\nrule h4ntu_shell__powered_by_tsoi_ {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file h4ntu shell [powered by tsoi].txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"06ed0b2398f8096f1bebf092d0526137\"\n\tstrings:\n\t\t$s0 = \"h4ntu shell\"\n\t\t$s1 = \"system(\\\"$cmd 1> /tmp/cmdtemp 2>&1; cat /tmp/cmdtemp; rm /tmp/cmdtemp\\\");\"\n\tcondition:\n\t\t1 of them\n}\nrule Ajan_asp {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file Ajan.asp.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"b6f468252407efc2318639da22b08af0\"\n\tstrings:\n\t\t$s1 = \"c:\\\\downloaded.zip\"\n\t\t$s2 = \"Set entrika = entrika.CreateTextFile(\\\"c:\\\\net.vbs\\\", True)\" fullword\n\t\t$s3 = \"http://www35.websamba.com/cybervurgun/\"\n\tcondition:\n\t\t1 of them\n}\nrule PHANTASMA_php {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file PHANTASMA.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"52779a27fa377ae404761a7ce76a5da7\"\n\tstrings:\n\t\t$s0 = \">[*] Safemode Mode Run</DIV>\"\n\t\t$s1 = \"$file1 - $file2 - <a href=$SCRIPT_NAME?$QUERY_STRING&see=$file>$file</a><br>\"\n\t\t$s2 = \"[*] Spawning Shell\"\n\t\t$s3 = \"Cha0s\"\n\tcondition:\n\t\t2 of them\n}\nrule MySQL_Web_Interface_Version_0_8_php {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file MySQL Web Interface Version 0.8.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"36d4f34d0a22080f47bb1cb94107c60f\"\n\tstrings:\n\t\t$s0 = \"SooMin Kim\"\n\t\t$s1 = \"http://popeye.snu.ac.kr/~smkim/mysql\"\n\t\t$s2 = \"href='$PHP_SELF?action=dropField&dbname=$dbname&tablename=$tablename\"\n\t\t$s3 = \"<th>Type</th><th>&nbspM&nbsp</th><th>&nbspD&nbsp</th><th>unsigned</th><th>zerofi\"\n\tcondition:\n\t\t2 of them\n}\nrule simple_cmd_html {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - file simple_cmd.html.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\thash = \"c6381412df74dbf3bcd5a2b31522b544\"\n\tstrings:\n\t\t$s1 = \"<title>G-Security Webshell</title>\" fullword\n\t\t$s2 = \"<input type=TEXT name=\\\"-cmd\\\" size=64 value=\\\"<?=$cmd?>\\\" \" fullword\n\t\t$s3 = \"<? if($cmd != \\\"\\\") print Shell_Exec($cmd);?>\" fullword\n\t\t$s4 = \"<? $cmd = $_REQUEST[\\\"-cmd\\\"];?>\" fullword\n\tcondition:\n\t\tall of them\n}\nrule multiple_webshells_0001 {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - from files 1.txt, c2007.php.php.txt, c100.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\tsuper_rule = 1\n\t\twas = \"_1_c2007_php_php_c100_php\"\n\t\thash0 = \"44542e5c3e9790815c49d5f9beffbbf2\"\n\t\thash1 = \"d089e7168373a0634e1ac18c0ee00085\"\n\t\thash2 = \"38fd7e45f9c11a37463c3ded1c76af4c\"\n\tstrings:\n\t\t$s0 = \"echo \\\"<b>Changing file-mode (\\\".$d.$f.\\\"), \\\".view_perms_color($d.$f).\\\" (\\\"\"\n\t\t$s3 = \"echo \\\"<td>&nbsp;<a href=\\\\\\\"\\\".$sql_surl.\\\"sql_act=query&sql_query=\\\".ur\"\n\tcondition:\n\t\t1 of them\n}\nrule multiple_webshells_0002 {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - from files nst.php.php.txt, img.php.php.txt, nstview.php.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\tsuper_rule = 1\n\t\twas = \"_nst_php_php_img_php_php_nstview_php_php\"\n\t\thash0 = \"ddaf9f1986d17284de83a17fe5f9fd94\"\n\t\thash1 = \"17a07bb84e137b8aa60f87cd6bfab748\"\n\t\thash2 = \"4745d510fed4378e4b1730f56f25e569\"\n\tstrings:\n\t\t$s0 = \"<tr><form method=post><td><font color=red><b>Back connect:</b></font></td><td><i\"\n\t\t$s1 = \"$perl_proxy_scp = \\\"IyEvdXNyL2Jpbi9wZXJsICANCiMhL3Vzci91c2MvcGVybC81LjAwNC9iaW4v\"\n\t\t$s2 = \"<tr><form method=post><td><font color=red><b>Backdoor:</b></font></td><td><input\"\n\tcondition:\n\t\t1 of them\n}\nrule multiple_webshells_0003 {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - from files network.php.php.txt, xinfo.php.php.txt, nfm.php.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\tsuper_rule = 1\n\t\twas = \"_network_php_php_xinfo_php_php_nfm_php_php\"\n\t\thash0 = \"acdbba993a5a4186fd864c5e4ea0ba4f\"\n\t\thash1 = \"2601b6fc1579f263d2f3960ce775df70\"\n\t\thash2 = \"401fbae5f10283051c39e640b77e4c26\"\n\tstrings:\n\t\t$s0 = \".textbox { background: White; border: 1px #000000 solid; color: #000099; font-fa\"\n\t\t$s2 = \"<input class='inputbox' type='text' name='pass_de' size=50 onclick=this.value=''\"\n\tcondition:\n\t\tall of them\n}\nrule multiple_webshells_0004 {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - from files w.php.php.txt, c99madshell_v2.1.php.php.txt, wacking.php.php.txt, SpecialShell_99.php.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\tsuper_rule = 1\n\t\twas = \"_w_php_php_c99madshell_v2_1_php_php_wacking_php_php_SpecialShell_99_php_php\"\n\t\thash0 = \"38a3f9f2aa47c2e940695f3dba6a7bb2\"\n\t\thash1 = \"3ca5886cd54d495dc95793579611f59a\"\n\t\thash2 = \"9c5bb5e3a46ec28039e8986324e42792\"\n\t\thash3 = \"09609851caa129e40b0d56e90dfc476c\"\n\tstrings:\n\t\t$s2 = \"echo \\\"<hr size=\\\\\\\"1\\\\\\\" noshade><b>Done!</b><br>Total time (secs.): \\\".$ft\"\n\t\t$s3 = \"$fqb_log .= \\\"\\\\r\\\\n------------------------------------------\\\\r\\\\nDone!\\\\r\"\n\tcondition:\n\t\t1 of them\n}\nrule multiple_webshells_0005 {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - from files r577.php.php.txt, SnIpEr_SA Shell.php.txt, r57.php.php.txt, r57 Shell.php.php.txt, spy.php.php.txt, s.php.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\tsuper_rule = 1\n\t\twas = \"_r577_php_php_SnIpEr_SA_Shell_php_r57_php_php_r57_Shell_php_php_spy_php_php_s_php_php\"\n\t\thash0 = \"0714f80f35c1fddef1f8938b8d42a4c8\"\n\t\thash1 = \"911195a9b7c010f61b66439d9048f400\"\n\t\thash2 = \"eddf7a8fde1e50a7f2a817ef7cece24f\"\n\t\thash3 = \"8023394542cddf8aee5dec6072ed02b5\"\n\t\thash4 = \"eed14de3907c9aa2550d95550d1a2d5f\"\n\t\thash5 = \"817671e1bdc85e04cc3440bbd9288800\"\n\tstrings:\n\t\t$s2 = \"'eng_text71'=>\\\"Second commands param is:\\\\r\\\\n- for CHOWN - name of new owner o\"\n\t\t$s4 = \"if(!empty($_POST['s_mask']) && !empty($_POST['m'])) { $sr = new SearchResult\"\n\tcondition:\n\t\t1 of them\n}\nrule multiple_webshells_0006 {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - from files c99shell_v1.0.php.php.txt, c99php.txt, SsEs.php.php.txt, ctt_sh.php.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\tsuper_rule = 1\n\t\twas = \"_c99shell_v1_0_php_php_c99php_SsEs_php_php_ctt_sh_php_php\"\n\t\thash0 = \"d8ae5819a0a2349ec552cbcf3a62c975\"\n\t\thash1 = \"9e9ae0332ada9c3797d6cee92c2ede62\"\n\t\thash2 = \"6cd50a14ea0da0df6a246a60c8f6f9c9\"\n\t\thash3 = \"671cad517edd254352fe7e0c7c981c39\"\n\tstrings:\n\t\t$s0 = \"\\\"AAAAACH5BAEAAAkALAAAAAAUABQAAAR0MMlJqyzFalqEQJuGEQSCnWg6FogpkHAMF4HAJsWh7/ze\\\"\"\n\t\t$s2 = \"\\\"mTP/zDP//2YAAGYAM2YAZmYAmWYAzGYA/2YzAGYzM2YzZmYzmWYzzGYz/2ZmAGZmM2ZmZmZmmWZm\\\"\"\n\t\t$s4 = \"\\\"R0lGODlhFAAUAKL/AP/4/8DAwH9/AP/4AL+/vwAAAAAAAAAAACH5BAEAAAEALAAAAAAUABQAQAMo\\\"\"\n\tcondition:\n\t\t2 of them\n}\nrule multiple_webshells_0007 {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - from files r577.php.php.txt, spy.php.php.txt, s.php.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\tsuper_rule = 1\n\t\twas = \"_r577_php_php_spy_php_php_s_php_php\"\n\t\thash0 = \"0714f80f35c1fddef1f8938b8d42a4c8\"\n\t\thash1 = \"eed14de3907c9aa2550d95550d1a2d5f\"\n\t\thash2 = \"817671e1bdc85e04cc3440bbd9288800\"\n\tstrings:\n\t\t$s2 = \"echo $te.\\\"<div align=center><textarea cols=35 name=db_query>\\\".(!empty($_POST['\"\n\t\t$s3 = \"echo sr(45,\\\"<b>\\\".$lang[$language.'_text80'].$arrow.\\\"</b>\\\",\\\"<select name=db>\"\n\tcondition:\n\t\t1 of them\n}\nrule multiple_webshells_0008 {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - from files w.php.php.txt, c99madshell_v2.1.php.php.txt, wacking.php.php.txt, c99shell_v1.0.php.php.txt, c99php.txt, SpecialShell_99.php.php.txt, ctt_sh.php.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\tsuper_rule = 1\n\t\twas = \"_w_php_php_c99madshell_v2_1_php_php_wacking_php_php_c99shell_v1_0_php_php_c99php_SpecialShell_99_php_php_ctt_sh_php_php\"\n\t\thash0 = \"38a3f9f2aa47c2e940695f3dba6a7bb2\"\n\t\thash1 = \"3ca5886cd54d495dc95793579611f59a\"\n\t\thash2 = \"9c5bb5e3a46ec28039e8986324e42792\"\n\t\thash3 = \"d8ae5819a0a2349ec552cbcf3a62c975\"\n\t\thash4 = \"9e9ae0332ada9c3797d6cee92c2ede62\"\n\t\thash5 = \"09609851caa129e40b0d56e90dfc476c\"\n\t\thash6 = \"671cad517edd254352fe7e0c7c981c39\"\n\tstrings:\n\t\t$s0 = \"  if ($copy_unset) {foreach($sess_data[\\\"copy\\\"] as $k=>$v) {unset($sess_data[\\\"\"\n\t\t$s1 = \"  if (file_exists($mkfile)) {echo \\\"<b>Make File \\\\\\\"\\\".htmlspecialchars($mkfile\"\n\t\t$s2 = \"  echo \\\"<center><b>MySQL \\\".mysql_get_server_info().\\\" (proto v.\\\".mysql_get_pr\"\n\t\t$s3 = \"  elseif (!fopen($mkfile,\\\"w\\\")) {echo \\\"<b>Make File \\\\\\\"\\\".htmlspecialchars($m\"\n\tcondition:\n\t\tall of them\n}\nrule multiple_webshells_0009 {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - from files w.php.php.txt, c99madshell_v2.1.php.php.txt, wacking.php.php.txt, c99shell_v1.0.php.php.txt, c99php.txt, SpecialShell_99.php.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\tsuper_rule = 1\n\t\twas = \"_w_php_php_c99madshell_v2_1_php_php_wacking_php_php_c99shell_v1_0_php_php_c99php_SpecialShell_99_php_php\"\n\t\thash0 = \"38a3f9f2aa47c2e940695f3dba6a7bb2\"\n\t\thash1 = \"3ca5886cd54d495dc95793579611f59a\"\n\t\thash2 = \"9c5bb5e3a46ec28039e8986324e42792\"\n\t\thash3 = \"d8ae5819a0a2349ec552cbcf3a62c975\"\n\t\thash4 = \"9e9ae0332ada9c3797d6cee92c2ede62\"\n\t\thash5 = \"09609851caa129e40b0d56e90dfc476c\"\n\tstrings:\n\t\t$s0 = \"$sess_data[\\\"cut\\\"] = array(); c99_s\"\n\t\t$s3 = \"if ((!eregi(\\\"http://\\\",$uploadurl)) and (!eregi(\\\"https://\\\",$uploadurl))\"\n\tcondition:\n\t\t1 of them\n}\nrule multiple_webshells_0010 {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - from files w.php.php.txt, wacking.php.php.txt, SpecialShell_99.php.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\tsuper_rule = 1\n\t\twas = \"_w_php_php_wacking_php_php_SpecialShell_99_php_php\"\n\t\thash0 = \"38a3f9f2aa47c2e940695f3dba6a7bb2\"\n\t\thash1 = \"9c5bb5e3a46ec28039e8986324e42792\"\n\t\thash2 = \"09609851caa129e40b0d56e90dfc476c\"\n\tstrings:\n\t\t$s0 = \"\\\"<td>&nbsp;<a href=\\\\\\\"\\\".$sql_surl.\\\"sql_act=query&sql_query=\\\".ur\"\n\t\t$s2 = \"c99sh_sqlquery\"\n\tcondition:\n\t\t1 of them\n}\nrule multiple_webshells_0011 {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - from files w.php.php.txt, c99madshell_v2.1.php.php.txt, wacking.php.php.txt, SsEs.php.php.txt, SpecialShell_99.php.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\tsuper_rule = 1\n\t\twas = \"_w_php_php_c99madshell_v2_1_php_php_wacking_php_php_SsEs_php_php_SpecialShell_99_php_php\"\n\t\thash0 = \"38a3f9f2aa47c2e940695f3dba6a7bb2\"\n\t\thash1 = \"3ca5886cd54d495dc95793579611f59a\"\n\t\thash2 = \"9c5bb5e3a46ec28039e8986324e42792\"\n\t\thash3 = \"6cd50a14ea0da0df6a246a60c8f6f9c9\"\n\t\thash4 = \"09609851caa129e40b0d56e90dfc476c\"\n\tstrings:\n\t\t$s0 = \"else {$act = \\\"f\\\"; $d = dirname($mkfile); if (substr($d,-1) != DIRECTORY_SEPA\"\n\t\t$s3 = \"else {echo \\\"<b>File \\\\\\\"\\\".$sql_getfile.\\\"\\\\\\\":</b><br>\\\".nl2br(htmlspec\"\n\tcondition:\n\t\t1 of them\n}\nrule multiple_webshells_0012 {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - from files r577.php.php.txt, SnIpEr_SA Shell.php.txt, r57.php.php.txt, spy.php.php.txt, s.php.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\tsuper_rule = 1\n\t\twas = \"_r577_php_php_SnIpEr_SA_Shell_php_r57_php_php_spy_php_php_s_php_php\"\n\t\thash0 = \"0714f80f35c1fddef1f8938b8d42a4c8\"\n\t\thash1 = \"911195a9b7c010f61b66439d9048f400\"\n\t\thash2 = \"eddf7a8fde1e50a7f2a817ef7cece24f\"\n\t\thash3 = \"eed14de3907c9aa2550d95550d1a2d5f\"\n\t\thash4 = \"817671e1bdc85e04cc3440bbd9288800\"\n\tstrings:\n\t\t$s0 = \"echo sr(15,\\\"<b>\\\".$lang[$language.'_text\"\n\t\t$s1 = \".$arrow.\\\"</b>\\\",in('text','\"\n\tcondition:\n\t\t2 of them\n}\nrule multiple_webshells_0013 {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - from files r577.php.php.txt, SnIpEr_SA Shell.php.txt, r57.php.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\tsuper_rule = 1\n\t\twas = \"_r577_php_php_SnIpEr_SA_Shell_php_r57_php_php\"\n\t\thash0 = \"0714f80f35c1fddef1f8938b8d42a4c8\"\n\t\thash1 = \"911195a9b7c010f61b66439d9048f400\"\n\t\thash2 = \"eddf7a8fde1e50a7f2a817ef7cece24f\"\n\tstrings:\n\t\t$s0 = \"'ru_text9' =>'???????? ????? ? ???????? ??? ? /bin/bash',\" fullword\n\t\t$s1 = \"$name='ec371748dc2da624b35a4f8f685dd122'\"\n\t\t$s2 = \"rst.void.ru\"\n\tcondition:\n\t\t3 of them\n}\nrule multiple_webshells_0014 {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - from files r577.php.php.txt, r57 Shell.php.php.txt, spy.php.php.txt, s.php.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\tsuper_rule = 1\n\t\twas = \"_r577_php_php_r57_Shell_php_php_spy_php_php_s_php_php\"\n\t\thash0 = \"0714f80f35c1fddef1f8938b8d42a4c8\"\n\t\thash1 = \"8023394542cddf8aee5dec6072ed02b5\"\n\t\thash2 = \"eed14de3907c9aa2550d95550d1a2d5f\"\n\t\thash3 = \"817671e1bdc85e04cc3440bbd9288800\"\n\tstrings:\n\t\t$s0 = \"echo ws(2).$lb.\\\" <a\"\n\t\t$s1 = \"$sql = \\\"LOAD DATA INFILE \\\\\\\"\\\".$_POST['test3_file']\"\n\t\t$s3 = \"if (empty($_POST['cmd'])&&!$safe_mode) { $_POST['cmd']=($windows)?(\\\"dir\\\"):(\\\"l\"\n\tcondition:\n\t\t2 of them\n}\nrule multiple_webshells_0015 {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - from files wacking.php.php.txt, 1.txt, SpecialShell_99.php.php.txt, c100.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\tsuper_rule = 1\n\t\twas = \"_wacking_php_php_1_SpecialShell_99_php_php_c100_php\"\n\t\thash0 = \"9c5bb5e3a46ec28039e8986324e42792\"\n\t\thash1 = \"44542e5c3e9790815c49d5f9beffbbf2\"\n\t\thash2 = \"09609851caa129e40b0d56e90dfc476c\"\n\t\thash3 = \"38fd7e45f9c11a37463c3ded1c76af4c\"\n\tstrings:\n\t\t$s0 = \"if(eregi(\\\"./shbd $por\\\",$scan))\"\n\t\t$s1 = \"$_POST['backconnectip']\"\n\t\t$s2 = \"$_POST['backcconnmsg']\"\n\tcondition:\n\t\t1 of them\n}\nrule multiple_webshells_0016 {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - from files r577.php.php.txt, r57.php.php.txt, r57 Shell.php.php.txt, spy.php.php.txt, s.php.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\tsuper_rule = 1\n\t\twas = \"_r577_php_php_r57_php_php_r57_Shell_php_php_spy_php_php_s_php_php\"\n\t\thash0 = \"0714f80f35c1fddef1f8938b8d42a4c8\"\n\t\thash1 = \"eddf7a8fde1e50a7f2a817ef7cece24f\"\n\t\thash2 = \"8023394542cddf8aee5dec6072ed02b5\"\n\t\thash3 = \"eed14de3907c9aa2550d95550d1a2d5f\"\n\t\thash4 = \"817671e1bdc85e04cc3440bbd9288800\"\n\tstrings:\n\t\t$s1 = \"if(rmdir($_POST['mk_name']))\"\n\t\t$s2 = \"$r .= '<tr><td>'.ws(3).'<font face=Verdana size=-2><b>'.$key.'</b></font></td>\"\n\t\t$s3 = \"if(unlink($_POST['mk_name'])) echo \\\"<table width=100% cellpadding=0 cell\"\n\tcondition:\n\t\t2 of them\n}\nrule multiple_webshells_0017 {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - from files w.php.php.txt, wacking.php.php.txt, SsEs.php.php.txt, SpecialShell_99.php.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\tsuper_rule = 1\n\t\twas = \"_w_php_php_wacking_php_php_SsEs_php_php_SpecialShell_99_php_php\"\n\t\thash0 = \"38a3f9f2aa47c2e940695f3dba6a7bb2\"\n\t\thash1 = \"9c5bb5e3a46ec28039e8986324e42792\"\n\t\thash2 = \"6cd50a14ea0da0df6a246a60c8f6f9c9\"\n\t\thash3 = \"09609851caa129e40b0d56e90dfc476c\"\n\tstrings:\n\t\t$s0 = \"\\\"ext_avi\\\"=>array(\\\"ext_avi\\\",\\\"ext_mov\\\",\\\"ext_mvi\"\n\t\t$s1 = \"echo \\\"<b>Execute file:</b><form action=\\\\\\\"\\\".$surl.\\\"\\\\\\\" method=POST><inpu\"\n\t\t$s2 = \"\\\"ext_htaccess\\\"=>array(\\\"ext_htaccess\\\",\\\"ext_htpasswd\"\n\tcondition:\n\t\t1 of them\n}\nrule multiple_webshells_0018 {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - from files webadmin.php.php.txt, iMHaPFtp.php.php.txt, Private-i3lue.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\tsuper_rule = 1\n\t\twas = \"_webadmin_php_php_iMHaPFtp_php_php_Private_i3lue_php\"\n\t\thash0 = \"b268e6fa3bf3fe496cffb4ea574ec4c7\"\n\t\thash1 = \"12911b73bc6a5d313b494102abcf5c57\"\n\t\thash2 = \"13f5c7a035ecce5f9f380967cf9d4e92\"\n\tstrings:\n\t\t$s0 = \"return $type . $owner . $group . $other;\" fullword\n\t\t$s1 = \"$owner  = ($mode & 00400) ? 'r' : '-';\" fullword\n\tcondition:\n\t\tall of them\n}\nrule multiple_php_webshells {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - from files multiple_php_webshells\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\tsuper_rule = 1\n\t\thash0 = \"0714f80f35c1fddef1f8938b8d42a4c8\"\n\t\thash1 = \"911195a9b7c010f61b66439d9048f400\"\n\t\thash2 = \"be0f67f3e995517d18859ed57b4b4389\"\n\t\thash3 = \"eddf7a8fde1e50a7f2a817ef7cece24f\"\n\t\thash4 = \"8023394542cddf8aee5dec6072ed02b5\"\n\t\thash5 = \"eed14de3907c9aa2550d95550d1a2d5f\"\n\t\thash6 = \"817671e1bdc85e04cc3440bbd9288800\"\n\t\thash7 = \"7101fe72421402029e2629f3aaed6de7\"\n\t\thash8 = \"f618f41f7ebeb5e5076986a66593afd1\"\n\tstrings:\n\t\t$s0 = \"kVycm9yOiAkIVxuIik7DQpjb25uZWN0KFNPQ0tFVCwgJHBhZGRyKSB8fCBkaWUoIkVycm9yOiAkIVxuI\"\n\t\t$s2 = \"sNCiRwcm90bz1nZXRwcm90b2J5bmFtZSgndGNwJyk7DQpzb2NrZXQoU09DS0VULCBQRl9JTkVULCBTT0\"\n\t\t$s4 = \"A8c3lzL3NvY2tldC5oPg0KI2luY2x1ZGUgPG5ldGluZXQvaW4uaD4NCiNpbmNsdWRlIDxlcnJuby5oPg\"\n\tcondition:\n\t\t2 of them\n}\nrule multiple_webshells_0019 {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - from files w.php.php.txt, c99madshell_v2.1.php.php.txt, wacking.php.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\tsuper_rule = 1\n\t\twas = \"_w_php_php_c99madshell_v2_1_php_php_wacking_php_php\"\n\t\thash0 = \"38a3f9f2aa47c2e940695f3dba6a7bb2\"\n\t\thash1 = \"3ca5886cd54d495dc95793579611f59a\"\n\t\thash2 = \"9c5bb5e3a46ec28039e8986324e42792\"\n\tstrings:\n\t\t$s0 = \"<b>Dumped! Dump has been writed to \"\n\t\t$s1 = \"if ((!empty($donated_html)) and (in_array($act,$donated_act))) {echo \\\"<TABLE st\"\n\t\t$s2 = \"<input type=submit name=actarcbuff value=\\\\\\\"Pack buffer to archive\"\n\tcondition:\n\t\t1 of them\n}\nrule multiple_webshells_0020 {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - from files w.php.php.txt, c99madshell_v2.1.php.php.txt, wacking.php.php.txt, c99shell_v1.0.php.php.txt, c99php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\tsuper_rule = 1\n\t\twas = \"_w_php_php_c99madshell_v2_1_php_php_wacking_php_php_c99shell_v1_0_php_php_c99php\"\n\t\thash0 = \"38a3f9f2aa47c2e940695f3dba6a7bb2\"\n\t\thash1 = \"3ca5886cd54d495dc95793579611f59a\"\n\t\thash2 = \"9c5bb5e3a46ec28039e8986324e42792\"\n\t\thash3 = \"d8ae5819a0a2349ec552cbcf3a62c975\"\n\t\thash4 = \"9e9ae0332ada9c3797d6cee92c2ede62\"\n\tstrings:\n\t\t$s0 = \"@ini_set(\\\"highlight\" fullword\n\t\t$s1 = \"echo \\\"<b>Result of execution this PHP-code</b>:<br>\\\";\" fullword\n\t\t$s2 = \"{$row[] = \\\"<b>Owner/Group</b>\\\";}\" fullword\n\tcondition:\n\t\t2 of them\n}\nrule multiple_webshells_0021 {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - from files GFS web-shell ver 3.1.7 - PRiV8.php.txt, nshell.php.php.txt, gfs_sh.php.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\tsuper_rule = 1\n\t\twas = \"_GFS_web_shell_ver_3_1_7___PRiV8_php_nshell_php_php_gfs_sh_php_php\"\n\t\thash0 = \"be0f67f3e995517d18859ed57b4b4389\"\n\t\thash1 = \"4a44d82da21438e32d4f514ab35c26b6\"\n\t\thash2 = \"f618f41f7ebeb5e5076986a66593afd1\"\n\tstrings:\n\t\t$s2 = \"echo $uname.\\\"</font><br><b>\\\";\" fullword\n\t\t$s3 = \"while(!feof($f)) { $res.=fread($f,1024); }\" fullword\n\t\t$s4 = \"echo \\\"user=\\\".@get_current_user().\\\" uid=\\\".@getmyuid().\\\" gid=\\\".@getmygid()\"\n\tcondition:\n\t\t2 of them\n}\nrule multiple_webshells_0022 {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - from files w.php.php.txt, c99madshell_v2.1.php.php.txt, wacking.php.php.txt, c99shell_v1.0.php.php.txt, SpecialShell_99.php.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\tsuper_rule = 1\n\t\twas = \"_w_php_php_c99madshell_v2_1_php_php_wacking_php_php_c99shell_v1_0_php_php_SpecialShell_99_php_php\"\n\t\thash0 = \"38a3f9f2aa47c2e940695f3dba6a7bb2\"\n\t\thash1 = \"3ca5886cd54d495dc95793579611f59a\"\n\t\thash2 = \"9c5bb5e3a46ec28039e8986324e42792\"\n\t\thash3 = \"d8ae5819a0a2349ec552cbcf3a62c975\"\n\t\thash4 = \"09609851caa129e40b0d56e90dfc476c\"\n\tstrings:\n\t\t$s0 = \"c99ftpbrutecheck\"\n\t\t$s1 = \"$ftpquick_t = round(getmicrotime()-$ftpquick_st,4);\" fullword\n\t\t$s2 = \"$fqb_lenght = $nixpwdperpage;\" fullword\n\t\t$s3 = \"$sock = @ftp_connect($host,$port,$timeout);\" fullword\n\tcondition:\n\t\t2 of them\n}\nrule multiple_webshells_0023 {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - from files w.php.php.txt, wacking.php.php.txt, c99shell_v1.0.php.php.txt, c99php.txt, SpecialShell_99.php.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\tsuper_rule = 1\n\t\twas = \"_w_php_php_wacking_php_php_c99shell_v1_0_php_php_c99php_SpecialShell_99_php_php\"\n\t\thash0 = \"38a3f9f2aa47c2e940695f3dba6a7bb2\"\n\t\thash1 = \"9c5bb5e3a46ec28039e8986324e42792\"\n\t\thash2 = \"d8ae5819a0a2349ec552cbcf3a62c975\"\n\t\thash3 = \"9e9ae0332ada9c3797d6cee92c2ede62\"\n\t\thash4 = \"09609851caa129e40b0d56e90dfc476c\"\n\tstrings:\n\t\t$s0 = \"$sqlquicklaunch[] = array(\\\"\"\n\t\t$s1 = \"else {echo \\\"<center><b>File does not exists (\\\".htmlspecialchars($d.$f).\\\")!<\"\n\tcondition:\n\t\tall of them\n}\nrule multiple_webshells_0024 {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - from files antichat.php.php.txt, Fatalshell.php.php.txt, a_gedit.php.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\tsuper_rule = 1\n\t\twas = \"_antichat_php_php_Fatalshell_php_php_a_gedit_php_php\"\n\t\thash0 = \"128e90b5e2df97e21e96d8e268cde7e3\"\n\t\thash1 = \"b15583f4eaad10a25ef53ab451a4a26d\"\n\t\thash2 = \"ab9c6b24ca15f4a1b7086cad78ff0f78\"\n\tstrings:\n\t\t$s0 = \"if(@$_POST['save'])writef($file,$_POST['data']);\" fullword\n\t\t$s1 = \"if($action==\\\"phpeval\\\"){\" fullword\n\t\t$s2 = \"$uploadfile = $dirupload.\\\"/\\\".$_POST['filename'];\" fullword\n\t\t$s3 = \"$dir=getcwd().\\\"/\\\";\" fullword\n\tcondition:\n\t\t2 of them\n}\nrule multiple_webshells_0025 {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - from files c99shell_v1.0.php.php.txt, c99php.txt, SsEs.php.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\tsuper_rule = 1\n\t\twas = \"_c99shell_v1_0_php_php_c99php_SsEs_php_php\"\n\t\thash0 = \"d8ae5819a0a2349ec552cbcf3a62c975\"\n\t\thash1 = \"9e9ae0332ada9c3797d6cee92c2ede62\"\n\t\thash2 = \"6cd50a14ea0da0df6a246a60c8f6f9c9\"\n\tstrings:\n\t\t$s3 = \"if (!empty($delerr)) {echo \\\"<b>Deleting with errors:</b><br>\\\".$delerr;}\" fullword\n\tcondition:\n\t\t1 of them\n}\nrule multiple_webshells_0026 {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - from files Crystal.php.txt, nshell.php.php.txt, load_shell.php.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\tsuper_rule = 1\n\t\twas = \"_Crystal_php_nshell_php_php_load_shell_php_php\"\n\t\thash0 = \"fdbf54d5bf3264eb1c4bff1fac548879\"\n\t\thash1 = \"4a44d82da21438e32d4f514ab35c26b6\"\n\t\thash2 = \"0c5d227f4aa76785e4760cdcff78a661\"\n\tstrings:\n\t\t$s0 = \"if ($filename != \\\".\\\" and $filename != \\\"..\\\"){\" fullword\n\t\t$s1 = \"$dires = $dires . $directory;\" fullword\n\t\t$s4 = \"$arr = array_merge($arr, glob(\\\"*\\\"));\" fullword\n\tcondition:\n\t\t2 of them\n}\nrule multiple_webshells_0027 {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - from files nst.php.php.txt, cybershell.php.php.txt, img.php.php.txt, nstview.php.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\tsuper_rule = 1\n\t\twas = \"_nst_php_php_cybershell_php_php_img_php_php_nstview_php_php\"\n\t\thash0 = \"ddaf9f1986d17284de83a17fe5f9fd94\"\n\t\thash1 = \"ef8828e0bc0641a655de3932199c0527\"\n\t\thash2 = \"17a07bb84e137b8aa60f87cd6bfab748\"\n\t\thash3 = \"4745d510fed4378e4b1730f56f25e569\"\n\tstrings:\n\t\t$s0 = \"@$rto=$_POST['rto'];\" fullword\n\t\t$s2 = \"SCROLLBAR-TRACK-COLOR: #91AAFF\" fullword\n\t\t$s3 = \"$to1=str_replace(\\\"//\\\",\\\"/\\\",$to1);\" fullword\n\tcondition:\n\t\t2 of them\n}\nrule multiple_webshells_0028 {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - from files w.php.php.txt, c99madshell_v2.1.php.php.txt, wacking.php.php.txt, dC3 Security Crew Shell PRiV.php.txt, SpecialShell_99.php.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\tsuper_rule = 1\n\t\twas = \"_w_php_php_c99madshell_v2_1_php_php_wacking_php_php_dC3_Security_Crew_Shell_PRiV_php_SpecialShell_99_php_php\"\n\t\thash0 = \"38a3f9f2aa47c2e940695f3dba6a7bb2\"\n\t\thash1 = \"3ca5886cd54d495dc95793579611f59a\"\n\t\thash2 = \"9c5bb5e3a46ec28039e8986324e42792\"\n\t\thash3 = \"433706fdc539238803fd47c4394b5109\"\n\t\thash4 = \"09609851caa129e40b0d56e90dfc476c\"\n\tstrings:\n\t\t$s0 = \" if ($mode & 0x200) {$world[\\\"execute\\\"] = ($world[\\\"execute\\\"] == \\\"x\\\")?\\\"t\\\":\"\n\t\t$s1 = \" $group[\\\"execute\\\"] = ($mode & 00010)?\\\"x\\\":\\\"-\\\";\" fullword\n\tcondition:\n\t\tall of them\n}\nrule multiple_webshells_0029 {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - from files c99shell_v1.0.php.php.txt, c99php.txt, 1.txt, c2007.php.php.txt, c100.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\tsuper_rule = 1\n\t\twas = \"_c99shell_v1_0_php_php_c99php_1_c2007_php_php_c100_php\"\n\t\thash0 = \"d8ae5819a0a2349ec552cbcf3a62c975\"\n\t\thash1 = \"9e9ae0332ada9c3797d6cee92c2ede62\"\n\t\thash2 = \"44542e5c3e9790815c49d5f9beffbbf2\"\n\t\thash3 = \"d089e7168373a0634e1ac18c0ee00085\"\n\t\thash4 = \"38fd7e45f9c11a37463c3ded1c76af4c\"\n\tstrings:\n\t\t$s0 = \"$result = mysql_query(\\\"SHOW PROCESSLIST\\\", $sql_sock); \" fullword\n\tcondition:\n\t\tall of them\n}\nrule multiple_php_webshells_2 {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - from files w.php.php.txt, c99madshell_v2.1.php.php.txt, wacking.php.php.txt, c99shell_v1.0.php.php.txt, c99php.txt, SsEs.php.php.txt, SpecialShell_99.php.php.txt, ctt_sh.php.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\tsuper_rule = 1\n\t\thash0 = \"38a3f9f2aa47c2e940695f3dba6a7bb2\"\n\t\thash1 = \"3ca5886cd54d495dc95793579611f59a\"\n\t\thash2 = \"9c5bb5e3a46ec28039e8986324e42792\"\n\t\thash3 = \"d8ae5819a0a2349ec552cbcf3a62c975\"\n\t\thash4 = \"9e9ae0332ada9c3797d6cee92c2ede62\"\n\t\thash5 = \"6cd50a14ea0da0df6a246a60c8f6f9c9\"\n\t\thash6 = \"09609851caa129e40b0d56e90dfc476c\"\n\t\thash7 = \"671cad517edd254352fe7e0c7c981c39\"\n\tstrings:\n\t\t$s0 = \"elseif (!empty($ft)) {echo \\\"<center><b>Manually selected type is incorrect. I\"\n\t\t$s1 = \"else {echo \\\"<center><b>Unknown extension (\\\".$ext.\\\"), please, select type ma\"\n\t\t$s3 = \"$s = \\\"!^(\\\".implode(\\\"|\\\",$tmp).\\\")$!i\\\";\" fullword\n\tcondition:\n\t\tall of them\n}\nrule multiple_webshells_0030 {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - from files w.php.php.txt, c99madshell_v2.1.php.php.txt, wacking.php.php.txt, 1.txt, SpecialShell_99.php.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\tsuper_rule = 1\n\t\twas = \"_w_php_php_c99madshell_v2_1_php_php_wacking_php_php_1_SpecialShell_99_php_php\"\n\t\thash0 = \"38a3f9f2aa47c2e940695f3dba6a7bb2\"\n\t\thash1 = \"3ca5886cd54d495dc95793579611f59a\"\n\t\thash2 = \"9c5bb5e3a46ec28039e8986324e42792\"\n\t\thash3 = \"44542e5c3e9790815c49d5f9beffbbf2\"\n\t\thash4 = \"09609851caa129e40b0d56e90dfc476c\"\n\tstrings:\n\t\t$s0 = \"if ($total === FALSE) {$total = 0;}\" fullword\n\t\t$s1 = \"$free_percent = round(100/($total/$free),2);\" fullword\n\t\t$s2 = \"if (!$bool) {$bool = is_dir($letter.\\\":\\\\\\\\\\\");}\" fullword\n\t\t$s3 = \"$bool = $isdiskette = in_array($letter,$safemode_diskettes);\" fullword\n\tcondition:\n\t\t2 of them\n}\nrule multiple_webshells_0031 {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - from files r577.php.php.txt, r57.php.php.txt, spy.php.php.txt, s.php.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\tsuper_rule = 1\n\t\twas = \"_r577_php_php_r57_php_php_spy_php_php_s_php_php\"\n\t\thash0 = \"0714f80f35c1fddef1f8938b8d42a4c8\"\n\t\thash1 = \"eddf7a8fde1e50a7f2a817ef7cece24f\"\n\t\thash2 = \"eed14de3907c9aa2550d95550d1a2d5f\"\n\t\thash3 = \"817671e1bdc85e04cc3440bbd9288800\"\n\tstrings:\n\t\t$s0 = \"$res = mssql_query(\\\"select * from r57_temp_table\\\",$db);\" fullword\n\t\t$s2 = \"'eng_text30'=>'Cat file',\" fullword\n\t\t$s3 = \"@mssql_query(\\\"drop table r57_temp_table\\\",$db);\" fullword\n\tcondition:\n\t\t1 of them\n}\nrule multiple_webshells_0032 {\n\tmeta:\n\t\tdescription = \"Semi-Auto-generated  - from files nixrem.php.php.txt, c99shell_v1.0.php.php.txt, c99php.txt, NIX REMOTE WEB-SHELL v.0.5 alpha Lite Public Version.php.txt\"\n\t\tauthor = \"Neo23x0 Yara BRG + customization by Stefan -dfate- Molls\"\n\t\tsuper_rule = 1\n\t\twas = \"_nixrem_php_php_c99shell_v1_0_php_php_c99php_NIX_REMOTE_WEB_SHELL_v_0_5_alpha_Lite_Public_Version_php\"\n\t\thash0 = \"40a3e86a63d3d7f063a86aab5b5f92c6\"\n\t\thash1 = \"d8ae5819a0a2349ec552cbcf3a62c975\"\n\t\thash2 = \"9e9ae0332ada9c3797d6cee92c2ede62\"\n\t\thash3 = \"f3ca29b7999643507081caab926e2e74\"\n\tstrings:\n\t\t$s0 = \"$num = $nixpasswd + $nixpwdperpage;\" fullword\n\t\t$s1 = \"$ret = posix_kill($pid,$sig);\" fullword\n\t\t$s2 = \"if ($uid) {echo join(\\\":\\\",$uid).\\\"<br>\\\";}\" fullword\n\t\t$s3 = \"$i = $nixpasswd;\" fullword\n\tcondition:\n\t\t2 of them\n}\n\n/* GIF Header webshell */\n\nrule DarkSecurityTeam_Webshell {\n\tmeta:\n\t\tdescription = \"Dark Security Team Webshell\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"f1c95b13a71ca3629a0bb79601fcacf57cdfcf768806a71b26f2448f8c1d5d24\"\n\t\tscore = 50\n\tstrings:\n\t\t$s0 = \"form method=post><input type=hidden name=\\\"\\\"#\\\"\\\" value=Execute(Session(\\\"\\\"#\\\"\\\"))><input name=thePath value=\\\"\\\"\\\"&HtmlEncode(Server.MapPath(\\\".\\\"))&\" ascii\n\tcondition:\n\t\t1 of them\n}\n\nrule PHP_Cloaked_Webshell_SuperFetchExec {\n\tmeta:\n\t\tdescription = \"Looks like a webshell cloaked as GIF - http://goo.gl/xFvioC\"\n\t\treference = \"http://goo.gl/xFvioC\"\n\t\tauthor = \"Florian Roth\"\n\t\tscore = 50\n\tstrings:\n\t\t$s0 = \"else{$d.=@chr(($h[$e[$o]]<<4)+($h[$e[++$o]]));}}eval($d);\"\n\tcondition:\n\t\t$s0\n}\n\n/* PHP Webshell Update - August 2014 - deducted from https://github.com/JohnTroony/php-webshells */\n\nrule WebShell_RemExp_asp_php {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file RemExp.asp.php.txt\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"d9919dcf94a70d5180650de8b81669fa1c10c5a2\"\n\tstrings:\n\t\t$s0 = \"lsExt = Right(FileName, Len(FileName) - liCount)\" fullword\n\t\t$s7 = \"<td bgcolor=\\\"<%=BgColor%>\\\" title=\\\"<%=File.Name%>\\\"> <a href= \\\"showcode.asp?f\"\n\t\t$s13 = \"Response.Write Drive.ShareName & \\\" [share]\\\"\" fullword\n\t\t$s19 = \"If Request.QueryString(\\\"CopyFile\\\") <> \\\"\\\" Then\" fullword\n\t\t$s20 = \"<td width=\\\"40%\\\" height=\\\"20\\\" bgcolor=\\\"silver\\\">  Name</td>\" fullword\n\tcondition:\n\t\tall of them\n}\nrule WebShell_dC3_Security_Crew_Shell_PRiV {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file dC3_Security_Crew_Shell_PRiV.php\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"1b2a4a7174ca170b4e3a8cdf4814c92695134c8a\"\n\tstrings:\n\t\t$s0 = \"@rmdir($_GET['file']) or die (\\\"[-]Error deleting dir!\\\");\" fullword\n\t\t$s4 = \"$ps=str_replace(\\\"\\\\\\\\\\\",\\\"/\\\",getenv('DOCUMENT_ROOT'));\" fullword\n\t\t$s5 = \"header(\\\"Expires: \\\".date(\\\"r\\\",mktime(0,0,0,1,1,2030)));\" fullword\n\t\t$s15 = \"search_file($_POST['search'],urldecode($_POST['dir']));\" fullword\n\t\t$s16 = \"echo base64_decode($images[$_GET['pic']]);\" fullword\n\t\t$s20 = \"if (isset($_GET['rename_all'])) {\" fullword\n\tcondition:\n\t\t3 of them\n}\nrule WebShell_simattacker {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file simattacker.php\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"258297b62aeaf4650ce04642ad5f19be25ec29c9\"\n\tstrings:\n\t\t$s1 = \"$from = rand (71,1020000000).\\\"@\\\".\\\"Attacker.com\\\";\" fullword\n\t\t$s4 = \"&nbsp;Turkish Hackers : WWW.ALTURKS.COM <br>\" fullword\n\t\t$s5 = \"&nbsp;Programer : SimAttacker - Edited By KingDefacer<br>\" fullword\n\t\t$s6 = \"//fake mail = Use victim server 4 DOS - fake mail \" fullword\n\t\t$s10 = \"&nbsp;e-mail : kingdefacer@msn.com<br>\" fullword\n\t\t$s17 = \"error_reporting(E_ERROR | E_WARNING | E_PARSE);\" fullword\n\t\t$s18 = \"echo \\\"<font size='1' color='#999999'>Dont in windows\\\";\" fullword\n\t\t$s20 = \"$Comments=$_POST['Comments'];\" fullword\n\tcondition:\n\t\t2 of them\n}\nrule WebShell_DTool_Pro {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file DTool Pro.php\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"e2ee1c7ba7b05994f65710b7bbf935954f2c3353\"\n\tstrings:\n\t\t$s1 = \"function PHPget(){inclVar(); if(confirm(\\\"O PHPget agora oferece uma lista pront\"\n\t\t$s2 = \"<font size=3>by r3v3ng4ns - revengans@gmail.com </font>\" fullword\n\t\t$s3 = \"function PHPwriter(){inclVar();var url=prompt(\\\"[ PHPwriter ] by r3v3ng4ns\\\\nDig\"\n\t\t$s11 = \"//Turns the 'ls' command more usefull, showing it as it looks in the shell\" fullword\n\t\t$s13 = \"if (@file_exists(\\\"/usr/bin/wget\\\")) $pro3=\\\"<i>wget</i> at /usr/bin/wget, \\\";\" fullword\n\t\t$s14 = \"//To keep the changes in the url, when using the 'GET' way to send php variables\" fullword\n\t\t$s16 = \"function PHPf(){inclVar();var o=prompt(\\\"[ PHPfilEditor ] by r3v3ng4ns\\\\nDigite \"\n\t\t$s18 = \"if(empty($fu)) $fu = @$_GET['fu'];\" fullword\n\tcondition:\n\t\t3 of them\n}\nrule WebShell_ironshell {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file ironshell.php\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"d47b8ba98ea8061404defc6b3a30839c4444a262\"\n\tstrings:\n\t\t$s0 = \"<title>'.getenv(\\\"HTTP_HOST\\\").' ~ Shell I</title>\" fullword\n\t\t$s2 = \"$link = mysql_connect($_POST['host'], $_POST['username'], $_POST\"\n\t\t$s4 = \"error_reporting(0); //If there is an error, we'll show it, k?\" fullword\n\t\t$s8 = \"print \\\"<form action=\\\\\\\"\\\".$me.\\\"?p=chmod&file=\\\".$content.\\\"&d\"\n\t\t$s15 = \"if(!is_numeric($_POST['timelimit']))\" fullword\n\t\t$s16 = \"if($_POST['chars'] == \\\"9999\\\")\" fullword\n\t\t$s17 = \"<option value=\\\\\\\"az\\\\\\\">a - zzzzz</option>\" fullword\n\t\t$s18 = \"print shell_exec($command);\" fullword\n\tcondition:\n\t\t3 of them\n}\nrule WebShell_indexer_asp_php {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file indexer.asp.php.txt\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"e9a7aa5eb1fb228117dc85298c7d3ecd8e288a2d\"\n\tstrings:\n\t\t$s0 = \"<meta http-equiv=\\\"Content-Language\\\" content=\\\"tr\\\">\" fullword\n\t\t$s1 = \"<title>WwW.SaNaLTeRoR.OrG - inDEXER And ReaDer</title>\" fullword\n\t\t$s2 = \"<form action=\\\"?Gonder\\\" method=\\\"post\\\">\" fullword\n\t\t$s4 = \"<form action=\\\"?oku\\\" method=\\\"post\\\">\" fullword\n\t\t$s7 = \"var message=\\\"SaNaLTeRoR - \" fullword\n\t\t$s8 = \"nDexEr - Reader\\\"\" fullword\n\tcondition:\n\t\t3 of them\n}\nrule WebShell_toolaspshell {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file toolaspshell.php\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"11d236b0d1c2da30828ffd2f393dd4c6a1022e3f\"\n\tstrings:\n\t\t$s0 = \"cprthtml = \\\"<font face='arial' size='1'>RHTOOLS 1.5 BETA(PVT) Edited By KingDef\"\n\t\t$s12 = \"barrapos = CInt(InstrRev(Left(raiz,Len(raiz) - 1),\\\"\\\\\\\")) - 1\" fullword\n\t\t$s20 = \"destino3 = folderItem.path & \\\"\\\\index.asp\\\"\" fullword\n\tcondition:\n\t\t2 of them\n}\nrule WebShell_b374k_mini_shell_php_php {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file b374k-mini-shell-php.php.php\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"afb88635fbdd9ebe86b650cc220d3012a8c35143\"\n\tstrings:\n\t\t$s0 = \"@error_reporting(0);\" fullword\n\t\t$s2 = \"@eval(gzinflate(base64_decode($code)));\" fullword\n\t\t$s3 = \"@set_time_limit(0); \" fullword\n\tcondition:\n\t\tall of them\n}\nrule WebShell_Sincap_1_0 {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file Sincap 1.0.php\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"9b72635ff1410fa40c4e15513ae3a496d54f971c\"\n\tstrings:\n\t\t$s4 = \"</font></span><a href=\\\"mailto:shopen@aventgrup.net\\\">\" fullword\n\t\t$s5 = \"<title>:: AventGrup ::.. - Sincap 1.0 | Session(Oturum) B\" fullword\n\t\t$s9 = \"</span>Avrasya Veri ve NetWork Teknolojileri Geli\" fullword\n\t\t$s12 = \"while (($ekinci=readdir ($sedat))){\" fullword\n\t\t$s19 = \"$deger2= \\\"$ich[$tampon4]\\\";\" fullword\n\tcondition:\n\t\t2 of them\n}\nrule WebShell_b374k_php {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file b374k.php.php\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"04c99efd187cf29dc4e5603c51be44170987bce2\"\n\tstrings:\n\t\t$s0 = \"// encrypt your password to md5 here http://kerinci.net/?x=decode\" fullword\n\t\t$s6 = \"// password (default is: b374k)\"\n\t\t$s8 = \"//******************************************************************************\"\n\t\t$s9 = \"// b374k 2.2\" fullword\n\t\t$s10 = \"eval(\\\"?>\\\".gzinflate(base64_decode(\"\n\tcondition:\n\t\t3 of them\n}\nrule WebShell_SimAttacker___Vrsion_1_0_0___priv8_4_My_friend {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file SimAttacker - Vrsion 1.0.0 - priv8 4 My friend.php\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"6454cc5ab73143d72cf0025a81bd1fe710351b44\"\n\tstrings:\n\t\t$s4 = \"&nbsp;Iranian Hackers : WWW.SIMORGH-EV.COM <br>\" fullword\n\t\t$s5 = \"//fake mail = Use victim server 4 DOS - fake mail \" fullword\n\t\t$s10 = \"<a style=\\\"TEXT-DECORATION: none\\\" href=\\\"http://www.simorgh-ev.com\\\">\" fullword\n\t\t$s16 = \"error_reporting(E_ERROR | E_WARNING | E_PARSE);\" fullword\n\t\t$s17 = \"echo \\\"<font size='1' color='#999999'>Dont in windows\\\";\" fullword\n\t\t$s19 = \"$Comments=$_POST['Comments'];\" fullword\n\t\t$s20 = \"Victim Mail :<br><input type='text' name='to' ><br>\" fullword\n\tcondition:\n\t\t3 of them\n}\nrule WebShell_h4ntu_shell__powered_by_tsoi_ {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file h4ntu shell [powered by tsoi].php\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"cbca8cd000e705357e2a7e0cf8262678706f18f9\"\n\tstrings:\n\t\t$s11 = \"<title>h4ntu shell [powered by tsoi]</title>\" fullword\n\t\t$s13 = \"$cmd = $_POST['cmd'];\" fullword\n\t\t$s16 = \"$uname = posix_uname( );\" fullword\n\t\t$s17 = \"if(!$whoami)$whoami=exec(\\\"whoami\\\");\" fullword\n\t\t$s18 = \"echo \\\"<p><font size=2 face=Verdana><b>This Is The Server Information</b></font>\"\n\t\t$s20 = \"ob_end_clean();\" fullword\n\tcondition:\n\t\t3 of them\n}\nrule WebShell_php_webshells_MyShell {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file MyShell.php\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"42e283c594c4d061f80a18f5ade0717d3fb2f76d\"\n\tstrings:\n\t\t$s3 = \"<title>MyShell error - Access Denied</title>\" fullword\n\t\t$s4 = \"$adminEmail = \\\"youremail@yourserver.com\\\";\" fullword\n\t\t$s5 = \"//A workdir has been asked for - we chdir to that dir.\" fullword\n\t\t$s6 = \"system($command . \\\" 1> /tmp/output.txt 2>&1; cat /tmp/output.txt; rm /tmp/o\"\n\t\t$s13 = \"#$autoErrorTrap Enable automatic error traping if command returns error.\" fullword\n\t\t$s14 = \"/* No work_dir - we chdir to $DOCUMENT_ROOT */\" fullword\n\t\t$s19 = \"#every command you excecute.\" fullword\n\t\t$s20 = \"<form name=\\\"shell\\\" method=\\\"post\\\">\" fullword\n\tcondition:\n\t\t3 of them\n}\nrule WebShell_php_webshells_pws {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file pws.php\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"7a405f1c179a84ff8ac09a42177a2bcd8a1a481b\"\n\tstrings:\n\t\t$s6 = \"if ($_POST['cmd']){\" fullword\n\t\t$s7 = \"$cmd = $_POST['cmd'];\" fullword\n\t\t$s10 = \"echo \\\"FILE UPLOADED TO $dez\\\";\" fullword\n\t\t$s11 = \"if (file_exists($uploaded)) {\" fullword\n\t\t$s12 = \"copy($uploaded, $dez);\" fullword\n\t\t$s17 = \"passthru($cmd);\" fullword\n\tcondition:\n\t\t4 of them\n}\nrule WebShell_reader_asp_php {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file reader.asp.php.txt\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"70656f3495e2b3ad391a77d5208eec0fb9e2d931\"\n\tstrings:\n\t\t$s5 = \"ster\\\" name=submit> </Font> &nbsp; &nbsp; &nbsp; <a href=mailto:mailbomb@hotmail\"\n\t\t$s12 = \" HACKING \" fullword\n\t\t$s16 = \"FONT-WEIGHT: bold; BACKGROUND: #ffffff url('images/cellpic1.gif'); TEXT-INDENT: \"\n\t\t$s20 = \"PADDING-RIGHT: 8px; PADDING-LEFT: 8px; FONT-WEIGHT: bold; FONT-SIZE: 11px; BACKG\"\n\tcondition:\n\t\t3 of them\n}\nrule WebShell_Safe_Mode_Bypass_PHP_4_4_2_and_PHP_5_1_2 {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file Safe_Mode_Bypass_PHP_4.4.2_and_PHP_5.1.2.php\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"db076b7c80d2a5279cab2578aa19cb18aea92832\"\n\tstrings:\n\t\t$s1 = \"<option value=\\\"/etc/passwd\\\">Get /etc/passwd</option>\" fullword\n\t\t$s6 = \"by PHP Emperor<xb5@hotmail.com>\" fullword\n\t\t$s9 = \"\\\".htmlspecialchars($file).\\\" has been already loaded. PHP Emperor <xb5@hotmail.\"\n\t\t$s11 = \"die(\\\"<FONT COLOR=\\\\\\\"RED\\\\\\\"><CENTER>Sorry... File\" fullword\n\t\t$s15 = \"if(empty($_GET['file'])){\" fullword\n\t\t$s16 = \"echo \\\"<head><title>Safe Mode Shell</title></head>\\\"; \" fullword\n\tcondition:\n\t\t3 of them\n}\nrule WebShell_Liz0ziM_Private_Safe_Mode_Command_Execuriton_Bypass_Exploit {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file Liz0ziM Private Safe Mode Command Execuriton Bypass Exploit.php\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"b2b797707e09c12ff5e632af84b394ad41a46fa4\"\n\tstrings:\n\t\t$s4 = \"$liz0zim=shell_exec($_POST[liz0]); \" fullword\n\t\t$s6 = \"$liz0=shell_exec($_POST[baba]); \" fullword\n\t\t$s9 = \"echo \\\"<b><font color=blue>Liz0ziM Private Safe Mode Command Execuriton Bypass E\"\n\t\t$s12 = \" :=) :</font><select size=\\\"1\\\" name=\\\"liz0\\\">\" fullword\n\t\t$s13 = \"<option value=\\\"cat /etc/passwd\\\">/etc/passwd</option>\" fullword\n\tcondition:\n\t\t1 of them\n}\nrule WebShell_php_backdoor {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file php-backdoor.php\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"b190c03af4f3fb52adc20eb0f5d4d151020c74fe\"\n\tstrings:\n\t\t$s5 = \"http://<? echo $SERVER_NAME.$REQUEST_URI; ?>?d=/etc on *nix\" fullword\n\t\t$s6 = \"// a simple php backdoor | coded by z0mbie [30.08.03] | http://freenet.am/~zombi\"\n\t\t$s11 = \"if(!isset($_REQUEST['dir'])) die('hey,specify directory!');\" fullword\n\t\t$s13 = \"else echo \\\"<a href='$PHP_SELF?f=$d/$dir'><font color=black>\\\";\" fullword\n\t\t$s15 = \"<pre><form action=\\\"<? echo $PHP_SELF; ?>\\\" METHOD=GET >execute command: <input \"\n\tcondition:\n\t\t1 of them\n}\nrule WebShell_Worse_Linux_Shell {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file Worse Linux Shell.php\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"64623ab1246bc8f7d256b25f244eb2b41f543e96\"\n\tstrings:\n\t\t$s4 = \"if( $_POST['_act'] == \\\"Upload!\\\" ) {\" fullword\n\t\t$s5 = \"print \\\"<center><h1>#worst @dal.net</h1></center>\\\";\" fullword\n\t\t$s7 = \"print \\\"<center><h1>Linux Shells</h1></center>\\\";\" fullword\n\t\t$s8 = \"$currentCMD = \\\"ls -la\\\";\" fullword\n\t\t$s14 = \"print \\\"<tr><td><b>System type:</b></td><td>$UName</td></tr>\\\";\" fullword\n\t\t$s19 = \"$currentCMD = str_replace(\\\"\\\\\\\\\\\\\\\\\\\",\\\"\\\\\\\\\\\",$_POST['_cmd']);\" fullword\n\tcondition:\n\t\t2 of them\n}\nrule WebShell_php_webshells_pHpINJ {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file pHpINJ.php\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"75116bee1ab122861b155cc1ce45a112c28b9596\"\n\tstrings:\n\t\t$s3 = \"echo '<a href='.$expurl.'> Click Here to Exploit </a> <br />';\" fullword\n\t\t$s10 = \"<form action = \\\"<?php echo \\\"$_SERVER[PHP_SELF]\\\" ; ?>\\\" method = \\\"post\\\">\" fullword\n\t\t$s11 = \"$sql = \\\"0' UNION SELECT '0' , '<? system(\\\\$_GET[cpc]);exit; ?>' ,0 ,0 ,0 ,0 IN\"\n\t\t$s13 = \"Full server path to a writable file which will contain the Php Shell <br />\" fullword\n\t\t$s14 = \"$expurl= $url.\\\"?id=\\\".$sql ;\" fullword\n\t\t$s15 = \"<header>||   .::News PHP Shell Injection::.   ||</header> <br /> <br />\" fullword\n\t\t$s16 = \"<input type = \\\"submit\\\" value = \\\"Create Exploit\\\"> <br /> <br />\" fullword\n\tcondition:\n\t\t1 of them\n}\nrule WebShell_php_webshells_NGH {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file NGH.php\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"c05b5deecfc6de972aa4652cb66da89cfb3e1645\"\n\tstrings:\n\t\t$s0 = \"<title>Webcommander at <?=$_SERVER[\\\"HTTP_HOST\\\"]?></title>\" fullword\n\t\t$s2 = \"/* Webcommander by Cr4sh_aka_RKL v0.3.9 NGH edition :p */\" fullword\n\t\t$s5 = \"<form action=<?=$script?>?act=bindshell method=POST>\" fullword\n\t\t$s9 = \"<form action=<?=$script?>?act=backconnect method=POST>\" fullword\n\t\t$s11 = \"<form action=<?=$script?>?act=mkdir method=POST>\" fullword\n\t\t$s16 = \"die(\\\"<font color=#DF0000>Login error</font>\\\");\" fullword\n\t\t$s20 = \"<b>Bind /bin/bash at port: </b><input type=text name=port size=8>\" fullword\n\tcondition:\n\t\t2 of them\n}\nrule WebShell_php_webshells_matamu {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file matamu.php\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"d477aae6bd2f288b578dbf05c1c46b3aaa474733\"\n\tstrings:\n\t\t$s2 = \"$command .= ' -F';\" fullword\n\t\t$s3 = \"/* We try and match a cd command. */\" fullword\n\t\t$s4 = \"directory... Trust me - it works :-) */\" fullword\n\t\t$s5 = \"$command .= \\\" 1> $tmpfile 2>&1; \\\" .\" fullword\n\t\t$s10 = \"$new_dir = $regs[1]; // 'cd /something/...'\" fullword\n\t\t$s16 = \"/* The last / in work_dir were the first charecter.\" fullword\n\tcondition:\n\t\t2 of them\n}\nrule WebShell_ru24_post_sh {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file ru24_post_sh.php\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"d2c18766a1cd4dda928c12ff7b519578ccec0769\"\n\tstrings:\n\t\t$s1 = \"http://www.ru24-team.net\" fullword\n\t\t$s4 = \"if ((!$_POST['cmd']) || ($_POST['cmd']==\\\"\\\")) { $_POST['cmd']=\\\"id;pwd;uname -a\"\n\t\t$s6 = \"Ru24PostWebShell\"\n\t\t$s7 = \"Writed by DreAmeRz\" fullword\n\t\t$s9 = \"$function=passthru; // system, exec, cmd\" fullword\n\tcondition:\n\t\t1 of them\n}\nrule WebShell_hiddens_shell_v1 {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file hiddens shell v1.php\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"1674bd40eb98b48427c547bf9143aa7fbe2f4a59\"\n\tstrings:\n\t\t$s0 = \"<?$d='G7mHWQ9vvXiL/QX2oZ2VTDpo6g3FYAa6X+8DMIzcD0eHZaBZH7jFpZzUz7XNenxSYvBP2Wy36U\"\n\tcondition:\n\t\tall of them\n}\nrule WebShell_c99_madnet {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file c99_madnet.php\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"17613df393d0a99fd5bea18b2d4707f566cff219\"\n\tstrings:\n\t\t$s0 = \"$md5_pass = \\\"\\\"; //If no pass then hash\" fullword\n\t\t$s1 = \"eval(gzinflate(base64_decode('\"\n\t\t$s2 = \"$pass = \\\"pass\\\";  //Pass\" fullword\n\t\t$s3 = \"$login = \\\"user\\\"; //Login\" fullword\n\t\t$s4 = \"             //Authentication\" fullword\n\tcondition:\n\t\tall of them\n}\nrule WebShell_c99_locus7s {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file c99_locus7s.php\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"d413d4700daed07561c9f95e1468fb80238fbf3c\"\n\tstrings:\n\t\t$s8 = \"$encoded = base64_encode(file_get_contents($d.$f)); \" fullword\n\t\t$s9 = \"$file = $tmpdir.\\\"dump_\\\".getenv(\\\"SERVER_NAME\\\").\\\"_\\\".$db.\\\"_\\\".date(\\\"d-m-Y\"\n\t\t$s10 = \"else {$tmp = htmlspecialchars(\\\"./dump_\\\".getenv(\\\"SERVER_NAME\\\").\\\"_\\\".$sq\"\n\t\t$s11 = \"$c99sh_sourcesurl = \\\"http://locus7s.com/\\\"; //Sources-server \" fullword\n\t\t$s19 = \"$nixpwdperpage = 100; // Get first N lines from /etc/passwd \" fullword\n\tcondition:\n\t\t2 of them\n}\nrule WebShell_JspWebshell_1_2 {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file JspWebshell_1.2.php\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"0bed4a1966117dd872ac9e8dceceb54024a030fa\"\n\tstrings:\n\t\t$s0 = \"System.out.println(\\\"CreateAndDeleteFolder is error:\\\"+ex); \" fullword\n\t\t$s1 = \"String password=request.getParameter(\\\"password\\\");\" fullword\n\t\t$s3 = \"<%@ page contentType=\\\"text/html; charset=GBK\\\" language=\\\"java\\\" import=\\\"java.\"\n\t\t$s7 = \"String editfile=request.getParameter(\\\"editfile\\\");\" fullword\n\t\t$s8 = \"//String tempfilename=request.getParameter(\\\"file\\\");\" fullword\n\t\t$s12 = \"password = (String)session.getAttribute(\\\"password\\\");\" fullword\n\tcondition:\n\t\t3 of them\n}\nrule WebShell_safe0ver {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file safe0ver.php\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"366639526d92bd38ff7218b8539ac0f154190eb8\"\n\tstrings:\n\t\t$s3 = \"$scriptident = \\\"$scriptTitle By Evilc0der.com\\\";\" fullword\n\t\t$s4 = \"while (file_exists(\\\"$lastdir/newfile$i.txt\\\"))\" fullword\n\t\t$s5 = \"else { /* <!-- Then it must be a File... --> */\" fullword\n\t\t$s7 = \"$contents .= htmlentities( $line ) ;\" fullword\n\t\t$s8 = \"<br><p><br>Safe Mode ByPAss<p><form method=\\\"POST\\\">\" fullword\n\t\t$s14 = \"elseif ( $cmd==\\\"upload\\\" ) { /* <!-- Upload File form --> */ \" fullword\n\t\t$s20 = \"/* <!-- End of Actions --> */\" fullword\n\tcondition:\n\t\t3 of them\n}\nrule WebShell_Uploader {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file Uploader.php\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"e216c5863a23fde8a449c31660fd413d77cce0b7\"\n\tstrings:\n\t\t$s1 = \"move_uploaded_file($userfile, \\\"entrika.php\\\"); \" fullword\n\tcondition:\n\t\tall of them\n}\nrule WebShell_php_webshells_kral {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file kral.php\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"4cd1d1a2fd448cecc605970e3a89f3c2e5c80dfc\"\n\tstrings:\n\t\t$s1 = \"$adres=gethostbyname($ip);\" fullword\n\t\t$s3 = \"curl_setopt($ch,CURLOPT_POSTFIELDS,\\\"domain=\\\".$site);\" fullword\n\t\t$s4 = \"$ekle=\\\"/index.php?option=com_user&view=reset&layout=confirm\\\";\" fullword\n\t\t$s16 = \"echo $son.' <br> <font color=\\\"green\\\">Access</font><br>';\" fullword\n\t\t$s17 = \"<p>kodlama by <a href=\\\"mailto:priv8coder@gmail.com\\\">BLaSTER</a><br /\"\n\t\t$s20 = \"<p><strong>Server listeleyici</strong><br />\" fullword\n\tcondition:\n\t\t2 of them\n}\nrule WebShell_cgitelnet {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file cgitelnet.php\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"72e5f0e4cd438e47b6454de297267770a36cbeb3\"\n\tstrings:\n\t\t$s9 = \"# Author Homepage: http://www.rohitab.com/\" fullword\n\t\t$s10 = \"elsif($Action eq \\\"command\\\") # user wants to run a command\" fullword\n\t\t$s18 = \"# in a command line on Windows NT.\" fullword\n\t\t$s20 = \"print \\\"Transfered $TargetFileSize Bytes.<br>\\\";\" fullword\n\tcondition:\n\t\t2 of them\n}\nrule WebShell_simple_backdoor {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file simple-backdoor.php\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"edcd5157a68fa00723a506ca86d6cbb8884ef512\"\n\tstrings:\n\t\t$s0 = \"<!-- Simple PHP backdoor by DK (http://michaeldaw.org) -->\" fullword\n\t\t$s1 = \"<!--    http://michaeldaw.org   2006    -->\" fullword\n\t\t$s2 = \"Usage: http://target.com/simple-backdoor.php?cmd=cat+/etc/passwd\" fullword\n\t\t$s3 = \"        echo \\\"</pre>\\\";\" fullword\n\t\t$s4 = \"        $cmd = ($_REQUEST['cmd']);\" fullword\n\t\t$s5 = \"        echo \\\"<pre>\\\";\" fullword\n\t\t$s6 = \"if(isset($_REQUEST['cmd'])){\" fullword\n\t\t$s7 = \"        die;\" fullword\n\t\t$s8 = \"        system($cmd);\" fullword\n\tcondition:\n\t\tall of them\n}\nrule WebShell_Safe_Mode_Bypass_PHP_4_4_2_and_PHP_5_1_2_2 {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file Safe_Mode Bypass PHP 4.4.2 and PHP 5.1.2.php\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"8fdd4e0e87c044177e9e1c97084eb5b18e2f1c25\"\n\tstrings:\n\t\t$s1 = \"<option value=\\\"/etc/passwd\\\">Get /etc/passwd</option>\" fullword\n\t\t$s3 = \"xb5@hotmail.com</FONT></CENTER></B>\\\");\" fullword\n\t\t$s4 = \"$v = @ini_get(\\\"open_basedir\\\");\" fullword\n\t\t$s6 = \"by PHP Emperor<xb5@hotmail.com>\" fullword\n\tcondition:\n\t\t2 of them\n}\nrule WebShell_NTDaddy_v1_9 {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file NTDaddy v1.9.php\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"79519aa407fff72b7510c6a63c877f2e07d7554b\"\n\tstrings:\n\t\t$s2 = \"|     -obzerve : mr_o@ihateclowns.com |\" fullword\n\t\t$s6 = \"szTempFile = \\\"C:\\\\\\\" & oFileSys.GetTempName( )\" fullword\n\t\t$s13 = \"<form action=ntdaddy.asp method=post>\" fullword\n\t\t$s17 = \"response.write(\\\"<ERROR: THIS IS NOT A TEXT FILE>\\\")\" fullword\n\tcondition:\n\t\t2 of them\n}\nrule WebShell_lamashell {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file lamashell.php\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"b71181e0d899b2b07bc55aebb27da6706ea1b560\"\n\tstrings:\n\t\t$s0 = \"if(($_POST['exe']) == \\\"Execute\\\") {\" fullword\n\t\t$s8 = \"$curcmd = $_POST['king'];\" fullword\n\t\t$s16 = \"\\\"http://www.w3.org/TR/html4/loose.dtd\\\">\" fullword\n\t\t$s18 = \"<title>lama's'hell v. 3.0</title>\" fullword\n\t\t$s19 = \"_|_  O    _    O  _|_\" fullword\n\t\t$s20 = \"$curcmd = \\\"ls -lah\\\";\" fullword\n\tcondition:\n\t\t2 of them\n}\nrule WebShell_Simple_PHP_backdoor_by_DK {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file Simple_PHP_backdoor_by_DK.php\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"03f6215548ed370bec0332199be7c4f68105274e\"\n\tstrings:\n\t\t$s0 = \"<!-- Simple PHP backdoor by DK (http://michaeldaw.org) -->\" fullword\n\t\t$s1 = \"<!--    http://michaeldaw.org   2006    -->\" fullword\n\t\t$s2 = \"Usage: http://target.com/simple-backdoor.php?cmd=cat+/etc/passwd\" fullword\n\t\t$s6 = \"if(isset($_REQUEST['cmd'])){\" fullword\n\t\t$s8 = \"system($cmd);\" fullword\n\tcondition:\n\t\t2 of them\n}\nrule WebShell_Moroccan_Spamers_Ma_EditioN_By_GhOsT {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file Moroccan Spamers Ma-EditioN By GhOsT.php\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"31e5473920a2cc445d246bc5820037d8fe383201\"\n\tstrings:\n\t\t$s4 = \"$content = chunk_split(base64_encode($content)); \" fullword\n\t\t$s12 = \"print \\\"Sending mail to $to....... \\\"; \" fullword\n\t\t$s16 = \"if (!$from && !$subject && !$message && !$emaillist){ \" fullword\n\tcondition:\n\t\tall of them\n}\nrule WebShell_C99madShell_v__2_0_madnet_edition {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file C99madShell v. 2.0 madnet edition.php\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"f99f8228eb12746847f54bad45084f19d1a7e111\"\n\tstrings:\n\t\t$s0 = \"$md5_pass = \\\"\\\"; //If no pass then hash\" fullword\n\t\t$s1 = \"eval(gzinflate(base64_decode('\"\n\t\t$s2 = \"$pass = \\\"\\\";  //Pass\" fullword\n\t\t$s3 = \"$login = \\\"\\\"; //Login\" fullword\n\t\t$s4 = \"//Authentication\" fullword\n\tcondition:\n\t\tall of them\n}\nrule WebShell_CmdAsp_asp_php {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file CmdAsp.asp.php.txt\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"cb18e1ac11e37e236e244b96c2af2d313feda696\"\n\tstrings:\n\t\t$s1 = \"szTempFile = \\\"C:\\\\\\\" & oFileSys.GetTempName( )\" fullword\n\t\t$s4 = \"' Author: Maceo <maceo @ dogmile.com>\" fullword\n\t\t$s5 = \"' -- Use a poor man's pipe ... a temp file -- '\" fullword\n\t\t$s6 = \"' --------------------o0o--------------------\" fullword\n\t\t$s8 = \"' File: CmdAsp.asp\" fullword\n\t\t$s11 = \"<-- CmdAsp.asp -->\" fullword\n\t\t$s14 = \"Call oScript.Run (\\\"cmd.exe /c \\\" & szCMD & \\\" > \\\" & szTempFile, 0, True)\" fullword\n\t\t$s16 = \"Set oScriptNet = Server.CreateObject(\\\"WSCRIPT.NETWORK\\\")\" fullword\n\t\t$s19 = \"<%= \\\"\\\\\\\\\\\" & oScriptNet.ComputerName & \\\"\\\\\\\" & oScriptNet.UserName %>\" fullword\n\tcondition:\n\t\t4 of them\n}\nrule WebShell_NCC_Shell {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file NCC-Shell.php\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"64d4495875a809b2730bd93bec2e33902ea80a53\"\n\tstrings:\n\t\t$s0 = \" if (isset($_FILES['probe']) and ! $_FILES['probe']['error']) {\" fullword\n\t\t$s1 = \"<b>--Coded by Silver\" fullword\n\t\t$s2 = \"<title>Upload - Shell/Datei</title>\" fullword\n\t\t$s8 = \"<a href=\\\"http://www.n-c-c.6x.to\\\" target=\\\"_blank\\\">-->NCC<--</a></center></b><\"\n\t\t$s14 = \"~|_Team .:National Cracker Crew:._|~<br>\" fullword\n\t\t$s18 = \"printf(\\\"Sie ist %u Bytes gro\" fullword\n\tcondition:\n\t\t3 of them\n}\nrule WebShell_php_webshells_README {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file README.md\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"ef2c567b4782c994db48de0168deb29c812f7204\"\n\tstrings:\n\t\t$s0 = \"Common php webshells. Do not host the file(s) in your server!\" fullword\n\t\t$s1 = \"php-webshells\" fullword\n\tcondition:\n\t\tall of them\n}\nrule WebShell_backupsql {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file backupsql.php\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"863e017545ec8e16a0df5f420f2d708631020dd4\"\n\tstrings:\n\t\t$s0 = \"$headers .= \\\"\\\\nMIME-Version: 1.0\\\\n\\\" .\\\"Content-Type: multipart/mixed;\\\\n\\\" .\"\n\t\t$s1 = \"$ftpconnect = \\\"ncftpput -u $ftp_user_name -p $ftp_user_pass -d debsender_ftplog\"\n\t\t$s2 = \"* as email attachment, or send to a remote ftp server by\" fullword\n\t\t$s16 = \"* Neagu Mihai<neagumihai@hotmail.com>\" fullword\n\t\t$s17 = \"$from    = \\\"Neu-Cool@email.com\\\";  // Who should the emails be sent from?, may \"\n\tcondition:\n\t\t2 of them\n}\nrule WebShell_AK_74_Security_Team_Web_Shell_Beta_Version {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file AK-74 Security Team Web Shell Beta Version.php\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"c90b0ba575f432ecc08f8f292f3013b5532fe2c4\"\n\tstrings:\n\t\t$s8 = \"- AK-74 Security Team Web Site: www.ak74-team.net\" fullword\n\t\t$s9 = \"<b><font color=#830000>8. X Forwarded For IP - </font></b><font color=#830000>'.\"\n\t\t$s10 = \"<b><font color=#83000>Execute system commands!</font></b>\" fullword\n\tcondition:\n\t\t1 of them\n}\nrule WebShell_php_webshells_cpanel {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file cpanel.php\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"433dab17106b175c7cf73f4f094e835d453c0874\"\n\tstrings:\n\t\t$s0 = \"function ftp_check($host,$user,$pass,$timeout){\" fullword\n\t\t$s3 = \"curl_setopt($ch, CURLOPT_URL, \\\"http://$host:2082\\\");\" fullword\n\t\t$s4 = \"[ user@alturks.com ]# info<b><br><font face=tahoma><br>\" fullword\n\t\t$s12 = \"curl_setopt($ch, CURLOPT_FTPLISTONLY, 1);\" fullword\n\t\t$s13 = \"Powerful tool , ftp and cPanel brute forcer , php 5.2.9 safe_mode & open_basedir\"\n\t\t$s20 = \"<br><b>Please enter your USERNAME and PASSWORD to logon<br>\" fullword\n\tcondition:\n\t\t2 of them\n}\nrule WebShell_accept_language {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file accept_language.php\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"180b13576f8a5407ab3325671b63750adbcb62c9\"\n\tstrings:\n\t\t$s0 = \"<?php passthru(getenv(\\\"HTTP_ACCEPT_LANGUAGE\\\")); echo '<br> by q1w2e3r4'; ?>\" fullword\n\tcondition:\n\t\tall of them\n}\nrule WebShell_php_webshells_529 {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file 529.php\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"ba3fb2995528307487dff7d5b624d9f4c94c75d3\"\n\tstrings:\n\t\t$s0 = \"<p>More: <a href=\\\"/\\\">Md5Cracking.Com Crew</a> \" fullword\n\t\t$s7 = \"href=\\\"/\\\" title=\\\"Securityhouse\\\">Security House - Shell Center - Edited By Kin\"\n\t\t$s9 = \"echo '<PRE><P>This is exploit from <a \" fullword\n\t\t$s10 = \"This Exploit Was Edited By KingDefacer\" fullword\n\t\t$s13 = \"safe_mode and open_basedir Bypass PHP 5.2.9 \" fullword\n\t\t$s14 = \"$hardstyle = explode(\\\"/\\\", $file); \" fullword\n\t\t$s20 = \"while($level--) chdir(\\\"..\\\"); \" fullword\n\tcondition:\n\t\t2 of them\n}\nrule WebShell_STNC_WebShell_v0_8 {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file STNC WebShell v0.8.php\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"52068c9dff65f1caae8f4c60d0225708612bb8bc\"\n\tstrings:\n\t\t$s3 = \"if(isset($_POST[\\\"action\\\"])) $action = $_POST[\\\"action\\\"];\" fullword\n\t\t$s8 = \"elseif(fe(\\\"system\\\")){ob_start();system($s);$r=ob_get_contents();ob_end_clean()\"\n\t\t$s13 = \"{ $pwd = $_POST[\\\"pwd\\\"]; $type = filetype($pwd); if($type === \\\"dir\\\")chdir($pw\"\n\tcondition:\n\t\t2 of them\n}\nrule WebShell_php_webshells_tryag {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file tryag.php\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"42d837e9ab764e95ed11b8bd6c29699d13fe4c41\"\n\tstrings:\n\t\t$s1 = \"<title>TrYaG Team - TrYaG.php - Edited By KingDefacer</title>\" fullword\n\t\t$s3 = \"$tabledump = \\\"DROP TABLE IF EXISTS $table;\\\\n\\\"; \" fullword\n\t\t$s6 = \"$string = !empty($_POST['string']) ? $_POST['string'] : 0; \" fullword\n\t\t$s7 = \"$tabledump .= \\\"CREATE TABLE $table (\\\\n\\\"; \" fullword\n\t\t$s14 = \"echo \\\"<center><div id=logostrip>Edit file: $editfile </div><form action='$REQUE\"\n\tcondition:\n\t\t3 of them\n}\nrule WebShell_dC3_Security_Crew_Shell_PRiV_2 {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file dC3 Security Crew Shell PRiV.php\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"9077eb05f4ce19c31c93c2421430dd3068a37f17\"\n\tstrings:\n\t\t$s0 = \"@rmdir($_GET['file']) or die (\\\"[-]Error deleting dir!\\\");\" fullword\n\t\t$s9 = \"header(\\\"Last-Modified: \\\".date(\\\"r\\\",filemtime(__FILE__)));\" fullword\n\t\t$s13 = \"header(\\\"Content-type: image/gif\\\");\" fullword\n\t\t$s14 = \"@copy($file,$to) or die (\\\"[-]Error copying file!\\\");\" fullword\n\t\t$s20 = \"if (isset($_GET['rename_all'])) {\" fullword\n\tcondition:\n\t\t3 of them\n}\nrule WebShell_qsd_php_backdoor {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file qsd-php-backdoor.php\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"4856bce45fc5b3f938d8125f7cdd35a8bbae380f\"\n\tstrings:\n\t\t$s1 = \"// A robust backdoor script made by Daniel Berliner - http://www.qsdconsulting.c\"\n\t\t$s2 = \"if(isset($_POST[\\\"newcontent\\\"]))\" fullword\n\t\t$s3 = \"foreach($parts as $val)//Assemble the path back together\" fullword\n\t\t$s7 = \"$_POST[\\\"newcontent\\\"]=urldecode(base64_decode($_POST[\\\"newcontent\\\"]));\" fullword\n\tcondition:\n\t\t2 of them\n}\nrule WebShell_php_webshells_spygrup {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file spygrup.php\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"12f9105332f5dc5d6360a26706cd79afa07fe004\"\n\tstrings:\n\t\t$s2 = \"kingdefacer@msn.com</FONT></CENTER></B>\\\");\" fullword\n\t\t$s6 = \"if($_POST['root']) $root = $_POST['root'];\" fullword\n\t\t$s12 = \"\\\".htmlspecialchars($file).\\\" Bu Dosya zaten Goruntuleniyor<kingdefacer@msn.com>\" fullword\n\t\t$s18 = \"By KingDefacer From Spygrup.org>\" fullword\n\tcondition:\n\t\t3 of them\n}\nrule WebShell_Web_shell__c_ShAnKaR {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file Web-shell (c)ShAnKaR.php\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"3dd4f25bd132beb59d2ae0c813373c9ea20e1b7a\"\n\tstrings:\n\t\t$s0 = \"header(\\\"Content-Length: \\\".filesize($_POST['downf']));\" fullword\n\t\t$s5 = \"if($_POST['save']==0){echo \\\"<textarea cols=70 rows=10>\\\".htmlspecialchars($dump\"\n\t\t$s6 = \"write(\\\"#\\\\n#Server : \\\".getenv('SERVER_NAME').\\\"\" fullword\n\t\t$s12 = \"foreach(@file($_POST['passwd']) as $fed)echo $fed;\" fullword\n\tcondition:\n\t\t2 of them\n}\nrule WebShell_Ayyildiz_Tim___AYT__Shell_v_2_1_Biz {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file Ayyildiz Tim  -AYT- Shell v 2.1 Biz.php\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"5fe8c1d01dc5bc70372a8a04410faf8fcde3cb68\"\n\tstrings:\n\t\t$s7 = \"<meta name=\\\"Copyright\\\" content=TouCh By iJOo\\\">\" fullword\n\t\t$s11 = \"directory... Trust me - it works :-) */\" fullword\n\t\t$s15 = \"/* ls looks much better with ' -F', IMHO. */\" fullword\n\t\t$s16 = \"} else if ($command == 'ls') {\" fullword\n\tcondition:\n\t\t3 of them\n}\nrule WebShell_Gamma_Web_Shell {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file Gamma Web Shell.php\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"7ef773df7a2f221468cc8f7683e1ace6b1e8139a\"\n\tstrings:\n\t\t$s4 = \"$ok_commands = ['ls', 'ls -l', 'pwd', 'uptime'];\" fullword\n\t\t$s8 = \"### Gamma Group <http://www.gammacenter.com>\" fullword\n\t\t$s15 = \"my $error = \\\"This command is not available in the restricted mode.\\\\n\\\";\" fullword\n\t\t$s20 = \"my $command = $self->query('command');\" fullword\n\tcondition:\n\t\t2 of them\n}\nrule WebShell_php_webshells_aspydrv {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file aspydrv.php\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"3d8996b625025dc549d73cdb3e5fa678ab35d32a\"\n\tstrings:\n\t\t$s0 = \"Target = \\\"D:\\\\hshome\\\\masterhr\\\\masterhr.com\\\\\\\"  ' ---Directory to which files\"\n\t\t$s1 = \"nPos = InstrB(nPosEnd, biData, CByteString(\\\"Content-Type:\\\"))\" fullword\n\t\t$s3 = \"Document.frmSQL.mPage.value = Document.frmSQL.mPage.value - 1\" fullword\n\t\t$s17 = \"If request.querystring(\\\"getDRVs\\\")=\\\"@\\\" then\" fullword\n\t\t$s20 = \"' ---Copy Too Folder routine Start\" fullword\n\tcondition:\n\t\t3 of them\n}\nrule WebShell_JspWebshell_1_2_2 {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file JspWebshell 1.2.php\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"184fc72b51d1429c44a4c8de43081e00967cf86b\"\n\tstrings:\n\t\t$s0 = \"System.out.println(\\\"CreateAndDeleteFolder is error:\\\"+ex); \" fullword\n\t\t$s3 = \"<%@ page contentType=\\\"text/html; charset=GBK\\\" language=\\\"java\\\" import=\\\"java.\"\n\t\t$s4 = \"// String tempfilepath=request.getParameter(\\\"filepath\\\");\" fullword\n\t\t$s15 = \"endPoint=random1.getFilePointer();\" fullword\n\t\t$s20 = \"if (request.getParameter(\\\"command\\\") != null) {\" fullword\n\tcondition:\n\t\t3 of them\n}\nrule WebShell_g00nshell_v1_3 {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file g00nshell-v1.3.php\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"70fe072e120249c9e2f0a8e9019f984aea84a504\"\n\tstrings:\n\t\t$s10 = \"#To execute commands, simply include ?cmd=___ in the url. #\" fullword\n\t\t$s15 = \"$query = \\\"SHOW COLUMNS FROM \\\" . $_GET['table'];\" fullword\n\t\t$s16 = \"$uakey = \\\"724ea055b975621b9d679f7077257bd9\\\"; // MD5 encoded user-agent\" fullword\n\t\t$s17 = \"echo(\\\"<form method='GET' name='shell'>\\\");\" fullword\n\t\t$s18 = \"echo(\\\"<form method='post' action='?act=sql'>\\\");\" fullword\n\tcondition:\n\t\t2 of them\n}\nrule WebShell_WinX_Shell {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file WinX Shell.php\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"a94d65c168344ad9fa406d219bdf60150c02010e\"\n\tstrings:\n\t\t$s4 = \"// It's simple shell for all Win OS.\" fullword\n\t\t$s5 = \"//------- [netstat -an] and [ipconfig] and [tasklist] ------------\" fullword\n\t\t$s6 = \"<html><head><title>-:[GreenwooD]:- WinX Shell</title></head>\" fullword\n\t\t$s13 = \"// Created by greenwood from n57\" fullword\n\t\t$s20 = \" if (is_uploaded_file($userfile)) {\" fullword\n\tcondition:\n\t\t3 of them\n}\nrule WebShell_PHANTASMA {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file PHANTASMA.php\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"cd12d42abf854cd34ff9e93a80d464620af6d75e\"\n\tstrings:\n\t\t$s12 = \"\\\"    printf(\\\\\\\"Usage: %s [Host] <port>\\\\\\\\n\\\\\\\", argv[0]);\\\\n\\\" .\" fullword\n\t\t$s15 = \"if ($portscan != \\\"\\\") {\" fullword\n\t\t$s16 = \"echo \\\"<br>Banner: $get <br><br>\\\";\" fullword\n\t\t$s20 = \"$dono = get_current_user( );\" fullword\n\tcondition:\n\t\t3 of them\n}\nrule WebShell_php_webshells_cw {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file cw.php\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"e65e0670ef6edf0a3581be6fe5ddeeffd22014bf\"\n\tstrings:\n\t\t$s1 = \"// Dump Database [pacucci.com]\" fullword\n\t\t$s2 = \"$dump = \\\"-- Database: \\\".$_POST['db'] .\\\" \\\\n\\\";\" fullword\n\t\t$s7 = \"$aids = passthru(\\\"perl cbs.pl \\\".$_POST['connhost'].\\\" \\\".$_POST['connport']);\" fullword\n\t\t$s8 = \"<b>IP:</b> <u>\\\" . $_SERVER['REMOTE_ADDR'] .\\\"</u> - Server IP:</b> <a href='htt\"\n\t\t$s14 = \"$dump .= \\\"-- Cyber-Warrior.Org\\\\n\\\";\" fullword\n\t\t$s20 = \"if(isset($_POST['doedit']) && $_POST['editfile'] != $dir)\" fullword\n\tcondition:\n\t\t3 of them\n}\nrule WebShell_php_include_w_shell {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file php-include-w-shell.php\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"1a7f4868691410830ad954360950e37c582b0292\"\n\tstrings:\n\t\t$s13 = \"# dump variables (DEBUG SCRIPT) NEEDS MODIFINY FOR B64 STATUS!!\" fullword\n\t\t$s17 = \"\\\"phpshellapp\\\" => \\\"export TERM=xterm; bash -i\\\",\" fullword\n\t\t$s19 = \"else if($numhosts == 1) $strOutput .= \\\"On 1 host..\\\\n\\\";\" fullword\n\tcondition:\n\t\t1 of them\n}\nrule WebShell_mysql_tool {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file mysql_tool.php\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"c9cf8cafcd4e65d1b57fdee5eef98f0f2de74474\"\n\tstrings:\n\t\t$s12 = \"$dump .= \\\"-- Dumping data for table '$table'\\\\n\\\";\" fullword\n\t\t$s20 = \"$dump .= \\\"CREATE TABLE $table (\\\\n\\\";\" fullword\n\tcondition:\n\t\t2 of them\n}\nrule WebShell_PhpSpy_Ver_2006 {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file PhpSpy Ver 2006.php\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"34a89e0ab896c3518d9a474b71ee636ca595625d\"\n\tstrings:\n\t\t$s2 = \"var_dump(@$shell->RegRead($_POST['readregname']));\" fullword\n\t\t$s12 = \"$prog = isset($_POST['prog']) ? $_POST['prog'] : \\\"/c net start > \\\".$pathname.\"\n\t\t$s19 = \"$program = isset($_POST['program']) ? $_POST['program'] : \\\"c:\\\\winnt\\\\system32\"\n\t\t$s20 = \"$regval = isset($_POST['regval']) ? $_POST['regval'] : 'c:\\\\winnt\\\\backdoor.exe'\"\n\tcondition:\n\t\t1 of them\n}\nrule WebShell_ZyklonShell {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file ZyklonShell.php\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"3fa7e6f3566427196ac47551392e2386a038d61c\"\n\tstrings:\n\t\t$s0 = \"The requested URL /Nemo/shell/zyklonshell.txt was not found on this server.<P>\" fullword\n\t\t$s1 = \"<!DOCTYPE HTML PUBLIC \\\"-//IETF//DTD HTML 2.0//EN\\\">\" fullword\n\t\t$s2 = \"<TITLE>404 Not Found</TITLE>\" fullword\n\t\t$s3 = \"<H1>Not Found</H1>\" fullword\n\tcondition:\n\t\tall of them\n}\nrule WebShell_php_webshells_myshell {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file myshell.php\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"5bd52749872d1083e7be076a5e65ffcde210e524\"\n\tstrings:\n\t\t$s0 = \"if($ok==false &&$status && $autoErrorTrap)system($command . \\\" 1> /tmp/outpu\"\n\t\t$s5 = \"system($command . \\\" 1> /tmp/output.txt 2>&1; cat /tmp/output.txt; rm /tmp/o\"\n\t\t$s15 = \"<title>$MyShellVersion - Access Denied</title>\" fullword\n\t\t$s16 = \"}$ra44  = rand(1,99999);$sj98 = \\\"sh-$ra44\\\";$ml = \\\"$sd98\\\";$a5 = $_SERVER['HTT\"\n\tcondition:\n\t\t1 of them\n}\nrule WebShell_php_webshells_lolipop {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file lolipop.php\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"86f23baabb90c93465e6851e40104ded5a5164cb\"\n\tstrings:\n\t\t$s3 = \"$commander = $_POST['commander']; \" fullword\n\t\t$s9 = \"$sourcego = $_POST['sourcego']; \" fullword\n\t\t$s20 = \"$result = mysql_query($loli12) or die (mysql_error()); \" fullword\n\tcondition:\n\t\tall of them\n}\nrule WebShell_simple_cmd {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file simple_cmd.php\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"466a8caf03cdebe07aa16ad490e54744f82e32c2\"\n\tstrings:\n\t\t$s1 = \"<input type=TEXT name=\\\"-cmd\\\" size=64 value=\\\"<?=$cmd?>\\\" \" fullword\n\t\t$s2 = \"<title>G-Security Webshell</title>\" fullword\n\t\t$s4 = \"<? if($cmd != \\\"\\\") print Shell_Exec($cmd);?>\" fullword\n\t\t$s6 = \"<? $cmd = $_REQUEST[\\\"-cmd\\\"];?>\" fullword\n\tcondition:\n\t\t1 of them\n}\nrule WebShell_go_shell {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file go-shell.php\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"3dd85981bec33de42c04c53d081c230b5fc0e94f\"\n\tstrings:\n\t\t$s0 = \"#change this password; for power security - delete this file =)\" fullword\n\t\t$s2 = \"if (!defined$param{cmd}){$param{cmd}=\\\"ls -la\\\"};\" fullword\n\t\t$s11 = \"open(FILEHANDLE, \\\"cd $param{dir}&&$param{cmd}|\\\");\" fullword\n\t\t$s12 = \"print << \\\"[kalabanga]\\\";\" fullword\n\t\t$s13 = \"<title>GO.cgi</title>\" fullword\n\tcondition:\n\t\t1 of them\n}\nrule WebShell_aZRaiLPhp_v1_0 {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file aZRaiLPhp v1.0.php\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"a2c609d1a8c8ba3d706d1d70bef69e63f239782b\"\n\tstrings:\n\t\t$s0 = \"<font size='+1'color='#0000FF'>aZRaiLPhP'nin URL'si: http://$HTTP_HOST$RED\"\n\t\t$s4 = \"$fileperm=base_convert($_POST['fileperm'],8,10);\" fullword\n\t\t$s19 = \"touch (\\\"$path/$dismi\\\") or die(\\\"Dosya Olu\" fullword\n\t\t$s20 = \"echo \\\"<div align=left><a href='./$this_file?dir=$path/$file'>G\" fullword\n\tcondition:\n\t\t2 of them\n}\nrule WebShell_webshells_zehir4 {\n\tmeta:\n\t\tdescription = \"Webshells Github Archive - file zehir4\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"788928ae87551f286d189e163e55410acbb90a64\"\n\t\tscore = 55\n\tstrings:\n\t\t$s0 = \"frames.byZehir.document.execCommand(command, false, option);\" fullword\n\t\t$s8 = \"response.Write \\\"<title>ZehirIV --> Powered By Zehir &lt;zehirhacker@hotmail.com\"\n\tcondition:\n\t\t1 of them\n}\nrule WebShell_zehir4_asp_php {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file zehir4.asp.php.txt\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"1d9b78b5b14b821139541cc0deb4cbbd994ce157\"\n\tstrings:\n\t\t$s4 = \"response.Write \\\"<title>zehir3 --> powered by zehir &lt;zehirhacker@hotmail.com&\"\n\t\t$s11 = \"frames.byZehir.document.execCommand(\"\n\t\t$s15 = \"frames.byZehir.document.execCommand(co\"\n\tcondition:\n\t\t2 of them\n}\nrule WebShell_php_webshells_lostDC {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file lostDC.php\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"d54fe07ea53a8929620c50e3a3f8fb69fdeb1cde\"\n\tstrings:\n\t\t$s0 = \"$info .= '[~]Server: ' .$_SERVER['HTTP_HOST'] .'<br />';\" fullword\n\t\t$s4 = \"header ( \\\"Content-Description: Download manager\\\" );\" fullword\n\t\t$s5 = \"print \\\"<center>[ Generation time: \\\".round(getTime()-startTime,4).\\\" second\"\n\t\t$s9 = \"if (mkdir($_POST['dir'], 0777) == false) {\" fullword\n\t\t$s12 = \"$ret = shellexec($command);\" fullword\n\tcondition:\n\t\t2 of them\n}\nrule WebShell_CasuS_1_5 {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file CasuS 1.5.php\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"7eee8882ad9b940407acc0146db018c302696341\"\n\tstrings:\n\t\t$s2 = \"<font size='+1'color='#0000FF'><u>CasuS 1.5'in URL'si</u>: http://$HTTP_HO\"\n\t\t$s8 = \"$fonk_kap = get_cfg_var(\\\"fonksiyonlary_kapat\\\");\" fullword\n\t\t$s18 = \"if (file_exists(\\\"F:\\\\\\\\\\\")){\" fullword\n\tcondition:\n\t\t1 of them\n}\nrule WebShell_ftpsearch {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - file ftpsearch.php\"\n\t\tauthor = \"Florian Roth\"\n\t\thash = \"c945f597552ccb8c0309ad6d2831c8cabdf4e2d6\"\n\tstrings:\n\t\t$s0 = \"echo \\\"[-] Error : coudn't read /etc/passwd\\\";\" fullword\n\t\t$s9 = \"@$ftp=ftp_connect('127.0.0.1');\" fullword\n\t\t$s12 = \"echo \\\"<title>Edited By KingDefacer</title><body>\\\";\" fullword\n\t\t$s19 = \"echo \\\"[+] Founded \\\".sizeof($users).\\\" entrys in /etc/passwd\\\\n\\\";\" fullword\n\tcondition:\n\t\t2 of them\n}\nrule WebShell__Cyber_Shell_cybershell_Cyber_Shell__v_1_0_ {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - from files Cyber Shell.php, cybershell.php, Cyber Shell (v 1.0).php\"\n\t\tauthor = \"Florian Roth\"\n\t\tsuper_rule = 1\n\t\thash0 = \"ef7f7c45d26614cea597f2f8e64a85d54630fe38\"\n\t\thash1 = \"cabf47b96e3b2c46248f075bdbc46197db28a25f\"\n\t\thash2 = \"9e165d4ed95e0501cd9a90155ac60546eb5b1076\"\n\tstrings:\n\t\t$s4 = \" <a href=\\\"http://www.cyberlords.net\\\" target=\\\"_blank\\\">Cyber Lords Community</\"\n\t\t$s10 = \"echo \\\"<meta http-equiv=Refresh content=\\\\\\\"0; url=$PHP_SELF?edit=$nameoffile&sh\"\n\t\t$s11 = \" *   Coded by Pixcher\" fullword\n\t\t$s16 = \"<input type=text size=55 name=newfile value=\\\"$d/newfile.php\\\">\" fullword\n\tcondition:\n\t\t2 of them\n}\nrule WebShell__Ajax_PHP_Command_Shell_Ajax_PHP_Command_Shell_soldierofallah {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - from files Ajax_PHP Command Shell.php, Ajax_PHP_Command_Shell.php, soldierofallah.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tsuper_rule = 1\n\t\thash0 = \"fa11deaee821ca3de7ad1caafa2a585ee1bc8d82\"\n\t\thash1 = \"c0a4ba3e834fb63e0a220a43caaf55c654f97429\"\n\t\thash2 = \"16fa789b20409c1f2ffec74484a30d0491904064\"\n\tstrings:\n\t\t$s1 = \"'Read /etc/passwd' => \\\"runcommand('etcpasswdfile','GET')\\\",\" fullword\n\t\t$s2 = \"'Running processes' => \\\"runcommand('ps -aux','GET')\\\",\" fullword\n\t\t$s3 = \"$dt = $_POST['filecontent'];\" fullword\n\t\t$s4 = \"'Open ports' => \\\"runcommand('netstat -an | grep -i listen','GET')\\\",\" fullword\n\t\t$s6 = \"print \\\"Sorry, none of the command functions works.\\\";\" fullword\n\t\t$s11 = \"document.cmdform.command.value='';\" fullword\n\t\t$s12 = \"elseif(isset($_GET['savefile']) && !empty($_POST['filetosave']) && !empty($_POST\"\n\tcondition:\n\t\t3 of them\n}\nrule WebShell_Generic_PHP_7 {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - from files Mysql interface v1.0.php, MySQL Web Interface Version 0.8.php, Mysql_interface_v1.0.php, MySQL_Web_Interface_Version_0.8.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tsuper_rule = 1\n\t\thash0 = \"de98f890790756f226f597489844eb3e53a867a9\"\n\t\thash1 = \"128988c8ef5294d51c908690d27f69dffad4e42e\"\n\t\thash2 = \"fd64f2bf77df8bcf4d161ec125fa5c3695fe1267\"\n\t\thash3 = \"715f17e286416724e90113feab914c707a26d456\"\n\tstrings:\n\t\t$s0 = \"header(\\\"Content-disposition: filename=$filename.sql\\\");\" fullword\n\t\t$s1 = \"else if( $action == \\\"dumpTable\\\" || $action == \\\"dumpDB\\\" ) {\" fullword\n\t\t$s2 = \"echo \\\"<font color=blue>[$USERNAME]</font> - \\\\n\\\";\" fullword\n\t\t$s4 = \"if( $action == \\\"dumpTable\\\" )\" fullword\n\tcondition:\n\t\t2 of them\n}\nrule WebShell__Small_Web_Shell_by_ZaCo_small_zaco_zacosmall {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - from files Small Web Shell by ZaCo.php, small.php, zaco.php, zacosmall.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tsuper_rule = 1\n\t\thash0 = \"b148ead15d34a55771894424ace2a92983351dda\"\n\t\thash1 = \"e4ba288f6d46dc77b403adf7d411a280601c635b\"\n\t\thash2 = \"e5713d6d231c844011e9a74175a77e8eb835c856\"\n\t\thash3 = \"1b836517164c18caf2c92ee2a06c645e26936a0c\"\n\tstrings:\n\t\t$s2 = \"if(!$result2)$dump_file.='#error table '.$rows[0];\" fullword\n\t\t$s4 = \"if(!(@mysql_select_db($db_dump,$mysql_link)))echo('DB error');\" fullword\n\t\t$s6 = \"header('Content-Length: '.strlen($dump_file).\\\"\\\\n\\\");\" fullword\n\t\t$s20 = \"echo('Dump for '.$db_dump.' now in '.$to_file);\" fullword\n\tcondition:\n\t\t2 of them\n}\nrule WebShell_Generic_PHP_8 {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - from files Macker's Private PHPShell.php, PHP Shell.php, Safe0ver Shell -Safe Mod Bypass By Evilc0der.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tsuper_rule = 1\n\t\thash0 = \"fc1ae242b926d70e32cdb08bbe92628bc5bd7f99\"\n\t\thash1 = \"9ad55629c4576e5a31dd845012d13a08f1c1f14e\"\n\t\thash2 = \"c4aa2cf665c784553740c3702c3bfcb5d7af65a3\"\n\tstrings:\n\t\t$s1 = \"elseif ( $cmd==\\\"file\\\" ) { /* <!-- View a file in text --> */\" fullword\n\t\t$s2 = \"elseif ( $cmd==\\\"upload\\\" ) { /* <!-- Upload File form --> */ \" fullword\n\t\t$s3 = \"/* I added this to ensure the script will run correctly...\" fullword\n\t\t$s14 = \"<!--    </form>   -->\" fullword\n\t\t$s15 = \"<form action=\\\\\\\"$SFileName?$urlAdd\\\\\\\" method=\\\\\\\"POST\\\\\\\">\" fullword\n\t\t$s20 = \"elseif ( $cmd==\\\"downl\\\" ) { /*<!-- Save the edited file back to a file --> */\" fullword\n\tcondition:\n\t\t3 of them\n}\nrule WebShell__PH_Vayv_PHVayv_PH_Vayv_klasvayv_asp_php {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - from files PH Vayv.php, PHVayv.php, PH_Vayv.php, klasvayv.asp.php.txt\"\n\t\tauthor = \"Florian Roth\"\n\t\tsuper_rule = 1\n\t\thash0 = \"b51962a1ffa460ec793317571fc2f46042fd13ee\"\n\t\thash1 = \"408ac9ca3d435c0f78bda370b33e84ba25afc357\"\n\t\thash2 = \"4003ae289e3ae036755976f8d2407c9381ff5653\"\n\t\thash3 = \"4f83bc2836601225a115b5ad54496428a507a361\"\n\tstrings:\n\t\t$s1 = \"<font color=\\\"#000000\\\">Sil</font></a></font></td>\" fullword\n\t\t$s5 = \"<td width=\\\"122\\\" height=\\\"17\\\" bgcolor=\\\"#9F9F9F\\\">\" fullword\n\t\t$s6 = \"onfocus=\\\"if (this.value == 'Kullan\" fullword\n\t\t$s16 = \"<img border=\\\"0\\\" src=\\\"http://www.aventgrup.net/arsiv/klasvayv/1.0/2.gif\\\">\"\n\tcondition:\n\t\t2 of them\n}\nrule WebShell_Generic_PHP_9 {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - from files KAdot Universal Shell v0.1.6.php, KAdot_Universal_Shell_v0.1.6.php, KA_uShell 0.1.6.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tsuper_rule = 1\n\t\thash0 = \"89f2a7007a2cd411e0a7abd2ff5218d212b84d18\"\n\t\thash1 = \"2266178ad4eb72c2386c0a4d536e5d82bb7ed6a2\"\n\t\thash2 = \"0daed818cac548324ad0c5905476deef9523ad73\"\n\tstrings:\n\t\t$s2 = \":<b>\\\" .base64_decode($_POST['tot']). \\\"</b>\\\";\" fullword\n\t\t$s6 = \"if (isset($_POST['wq']) && $_POST['wq']<>\\\"\\\") {\" fullword\n\t\t$s12 = \"if (!empty($_POST['c'])){\" fullword\n\t\t$s13 = \"passthru($_POST['c']);\" fullword\n\t\t$s16 = \"<input type=\\\"radio\\\" name=\\\"tac\\\" value=\\\"1\\\">B64 Decode<br>\" fullword\n\t\t$s20 = \"<input type=\\\"radio\\\" name=\\\"tac\\\" value=\\\"3\\\">md5 Hash\" fullword\n\tcondition:\n\t\t3 of them\n}\nrule WebShell__PH_Vayv_PHVayv_PH_Vayv {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - from files PH Vayv.php, PHVayv.php, PH_Vayv.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tsuper_rule = 1\n\t\thash0 = \"b51962a1ffa460ec793317571fc2f46042fd13ee\"\n\t\thash1 = \"408ac9ca3d435c0f78bda370b33e84ba25afc357\"\n\t\thash2 = \"4003ae289e3ae036755976f8d2407c9381ff5653\"\n\tstrings:\n\t\t$s4 = \"<form method=\\\"POST\\\" action=\\\"<?echo \\\"PHVayv.php?duzkaydet=$dizin/$duzenle\"\n\t\t$s12 = \"<? if ($ekinci==\\\".\\\" or  $ekinci==\\\"..\\\") {\" fullword\n\t\t$s17 = \"name=\\\"duzenx2\\\" value=\\\"Klas\" fullword\n\tcondition:\n\t\t2 of them\n}\nrule WebShell_Generic_PHP_1 {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - from files Dive Shell 1.0 - Emperor Hacking Team.php, Dive_Shell_1.0_Emperor_Hacking_Team.php, SimShell 1.0 - Simorgh Security MGZ.php, SimShell_1.0_-_Simorgh_Security_MGZ.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tsuper_rule = 1\n\t\thash0 = \"3b086b9b53cf9d25ff0d30b1d41bb2f45c7cda2b\"\n\t\thash1 = \"2558e728184b8efcdb57cfab918d95b06d45de04\"\n\t\thash2 = \"203a8021192531d454efbc98a3bbb8cabe09c85c\"\n\t\thash3 = \"b79709eb7801a28d02919c41cc75ac695884db27\"\n\tstrings:\n\t\t$s1 = \"$token = substr($_REQUEST['command'], 0, $length);\" fullword\n\t\t$s4 = \"var command_hist = new Array(<?php echo $js_command_hist ?>);\" fullword\n\t\t$s7 = \"$_SESSION['output'] .= htmlspecialchars(fgets($io[1]),\" fullword\n\t\t$s9 = \"document.shell.command.value = command_hist[current_line];\" fullword\n\t\t$s16 = \"$_REQUEST['command'] = $aliases[$token] . substr($_REQUEST['command'], $\"\n\t\t$s19 = \"if (empty($_SESSION['cwd']) || !empty($_REQUEST['reset'])) {\" fullword\n\t\t$s20 = \"if (e.keyCode == 38 && current_line < command_hist.length-1) {\" fullword\n\tcondition:\n\t\t5 of them\n}\nrule WebShell_Generic_PHP_2 {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - from files CrystalShell v.1.php, load_shell.php, Loaderz WEB Shell.php, stres.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tsuper_rule = 1\n\t\thash0 = \"335a0851304acedc3f117782b61479bbc0fd655a\"\n\t\thash1 = \"ca9fcfb50645dc0712abdf18d613ed2196e66241\"\n\t\thash2 = \"36d8782d749638fdcaeed540d183dd3c8edc6791\"\n\t\thash3 = \"03f88f494654f2ad0361fb63e805b6bbfc0c86de\"\n\tstrings:\n\t\t$s3 = \"if((isset($_POST['fileto']))||(isset($_POST['filefrom'])))\" fullword\n\t\t$s4 = \"\\\\$port = {$_POST['port']};\" fullword\n\t\t$s5 = \"$_POST['installpath'] = \\\"temp.pl\\\";}\" fullword\n\t\t$s14 = \"if(isset($_POST['post']) and $_POST['post'] == \\\"yes\\\" and @$HTTP_POST_FILES[\\\"u\"\n\t\t$s16 = \"copy($HTTP_POST_FILES[\\\"userfile\\\"][\\\"tmp_name\\\"],$HTTP_POST_FILES[\\\"userfile\\\"]\"\n\tcondition:\n\t\t4 of them\n}\nrule WebShell__CrystalShell_v_1_erne_stres {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - from files CrystalShell v.1.php, erne.php, stres.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tsuper_rule = 1\n\t\thash0 = \"335a0851304acedc3f117782b61479bbc0fd655a\"\n\t\thash1 = \"6eb4ab630bd25bec577b39fb8a657350bf425687\"\n\t\thash2 = \"03f88f494654f2ad0361fb63e805b6bbfc0c86de\"\n\tstrings:\n\t\t$s1 = \"<input type='submit' value='  open (shill.txt) '>\" fullword\n\t\t$s4 = \"var_dump(curl_exec($ch));\" fullword\n\t\t$s7 = \"if(empty($_POST['Mohajer22'])){\" fullword\n\t\t$s10 = \"$m=$_POST['curl'];\" fullword\n\t\t$s13 = \"$u1p=$_POST['copy'];\" fullword\n\t\t$s14 = \"if(empty(\\\\$_POST['cmd'])){\" fullword\n\t\t$s15 = \"$string = explode(\\\"|\\\",$string);\" fullword\n\t\t$s16 = \"$stream = imap_open(\\\"/etc/passwd\\\", \\\"\\\", \\\"\\\");\" fullword\n\tcondition:\n\t\t5 of them\n}\nrule WebShell_Generic_PHP_3 {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - from files Antichat Shell v1.3.php, Antichat Shell. Modified by Go0o$E.php, Antichat Shell.php, fatal.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tsuper_rule = 1\n\t\thash0 = \"d829e87b3ce34460088c7775a60bded64e530cd4\"\n\t\thash1 = \"d710c95d9f18ec7c76d9349a28dd59c3605c02be\"\n\t\thash2 = \"f044d44e559af22a1a7f9db72de1206f392b8976\"\n\t\thash3 = \"41780a3e8c0dc3cbcaa7b4d3c066ae09fb74a289\"\n\tstrings:\n\t\t$s0 = \"header('Content-Length:'.filesize($file).'');\" fullword\n\t\t$s4 = \"<textarea name=\\\\\\\"command\\\\\\\" rows=\\\\\\\"5\\\\\\\" cols=\\\\\\\"150\\\\\\\">\\\".@$_POST['comma\"\n\t\t$s7 = \"if(filetype($dir . $file)==\\\"file\\\")$files[]=$file;\" fullword\n\t\t$s14 = \"elseif (($perms & 0x6000) == 0x6000) {$info = 'b';} \" fullword\n\t\t$s20 = \"$info .= (($perms & 0x0004) ? 'r' : '-');\" fullword\n\tcondition:\n\t\tall of them\n}\nrule WebShell_Generic_PHP_4 {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - from files CrystalShell v.1.php, load_shell.php, nshell.php, Loaderz WEB Shell.php, stres.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tsuper_rule = 1\n\t\thash0 = \"335a0851304acedc3f117782b61479bbc0fd655a\"\n\t\thash1 = \"ca9fcfb50645dc0712abdf18d613ed2196e66241\"\n\t\thash2 = \"86bc40772de71b1e7234d23cab355e1ff80c474d\"\n\t\thash3 = \"36d8782d749638fdcaeed540d183dd3c8edc6791\"\n\t\thash4 = \"03f88f494654f2ad0361fb63e805b6bbfc0c86de\"\n\tstrings:\n\t\t$s0 = \"if ($filename != \\\".\\\" and $filename != \\\"..\\\"){\" fullword\n\t\t$s2 = \"$owner[\\\"write\\\"] = ($mode & 00200) ? 'w' : '-';\" fullword\n\t\t$s5 = \"$owner[\\\"execute\\\"] = ($mode & 00100) ? 'x' : '-';\" fullword\n\t\t$s6 = \"$world[\\\"write\\\"] = ($mode & 00002) ? 'w' : '-';\" fullword\n\t\t$s7 = \"$world[\\\"execute\\\"] = ($mode & 00001) ? 'x' : '-';\" fullword\n\t\t$s10 = \"foreach ($arr as $filename) {\" fullword\n\t\t$s19 = \"else if( $mode & 0x6000 ) { $type='b'; }\" fullword\n\tcondition:\n\t\tall of them\n}\n/*\nrule WebShell_Generic_PHP_5 {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - from files ex0shell.php, megabor.php, GRP WebShell 2.0 release build 2018 (C)2006,Great.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tsuper_rule = 1\n\t\thash0 = \"64461ad8d8f23ea078201a31d747157f701a4e00\"\n\t\thash1 = \"3df1afbcfa718da6fc8af27554834ff6d1a86562\"\n\t\thash2 = \"ad86ef7f24f75081318146edc788e5466722a629\"\n\tstrings:\n\t\t$s0 = \"(($perms & 0x0400) ? 'S' : '-'));\" fullword\n\t\t$s10 = \"} elseif (($perms & 0x8000) == 0x8000) {\" fullword\n\t\t$s11 = \"if (($perms & 0xC000) == 0xC000) {\" fullword\n\t\t$s12 = \"$info .= (($perms & 0x0008) ?\" fullword\n\t\t$s16 = \"// Block special\" fullword\n\t\t$s18 = \"$info = 's';\" fullword\n\tcondition:\n\t\tall of them\n}\n*/\nrule WebShell_GFS {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - from files GFS web-shell ver 3.1.7 - PRiV8.php, Predator.php, GFS_web-shell_ver_3.1.7_-_PRiV8.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tsuper_rule = 1\n\t\thash0 = \"c2f1ef6b11aaec255d4dd31efad18a3869a2a42c\"\n\t\thash1 = \"34f6640985b07009dbd06cd70983451aa4fe9822\"\n\t\thash2 = \"d25ef72bdae3b3cb0fc0fdd81cfa58b215812a50\"\n\tstrings:\n\t\t$s0 = \"OKTsNCmNsb3NlKFNURE9VVCk7DQpjbG9zZShTVERFUlIpOw==\\\";\" fullword\n\t\t$s1 = \"lIENPTk47DQpleGl0IDA7DQp9DQp9\\\";\" fullword\n\t\t$s2 = \"Ow0KIGR1cDIoZmQsIDIpOw0KIGV4ZWNsKCIvYmluL3NoIiwic2ggLWkiLCBOVUxMKTsNCiBjbG9zZShm\"\n\tcondition:\n\t\tall of them\n}\nrule WebShell__CrystalShell_v_1_sosyete_stres {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - from files CrystalShell v.1.php, sosyete.php, stres.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tsuper_rule = 1\n\t\thash0 = \"335a0851304acedc3f117782b61479bbc0fd655a\"\n\t\thash1 = \"e32405e776e87e45735c187c577d3a4f98a64059\"\n\t\thash2 = \"03f88f494654f2ad0361fb63e805b6bbfc0c86de\"\n\tstrings:\n\t\t$s1 = \"A:visited { COLOR:blue; TEXT-DECORATION: none}\" fullword\n\t\t$s4 = \"A:active {COLOR:blue; TEXT-DECORATION: none}\" fullword\n\t\t$s11 = \"scrollbar-darkshadow-color: #101842;\" fullword\n\t\t$s15 = \"<a bookmark=\\\"minipanel\\\">\" fullword\n\t\t$s16 = \"background-color: #EBEAEA;\" fullword\n\t\t$s18 = \"color: #D5ECF9;\" fullword\n\t\t$s19 = \"<center><TABLE style=\\\"BORDER-COLLAPSE: collapse\\\" height=1 cellSpacing=0 border\"\n\tcondition:\n\t\tall of them\n}\nrule WebShell_Generic_PHP_10 {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - from files Cyber Shell.php, cybershell.php, Cyber Shell (v 1.0).php, PHPRemoteView.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tsuper_rule = 1\n\t\thash0 = \"ef7f7c45d26614cea597f2f8e64a85d54630fe38\"\n\t\thash1 = \"cabf47b96e3b2c46248f075bdbc46197db28a25f\"\n\t\thash2 = \"9e165d4ed95e0501cd9a90155ac60546eb5b1076\"\n\t\thash3 = \"7d5b54c7cab6b82fb7d131d7bbb989fd53cb1b57\"\n\tstrings:\n\t\t$s2 = \"$world[\\\"execute\\\"] = ($world['execute']=='x') ? 't' : 'T'; \" fullword\n\t\t$s6 = \"$owner[\\\"write\\\"] = ($mode & 00200) ? 'w' : '-'; \" fullword\n\t\t$s11 = \"$world[\\\"execute\\\"] = ($mode & 00001) ? 'x' : '-'; \" fullword\n\t\t$s12 = \"else if( $mode & 0xA000 ) \" fullword\n\t\t$s17 = \"$s=sprintf(\\\"%1s\\\", $type); \" fullword\n\t\t$s20 = \"font-size: 8pt;\" fullword\n\tcondition:\n\t\tall of them\n}\nrule WebShell_Generic_PHP_11 {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - from files rootshell.php, Rootshell.v.1.0.php, s72 Shell v1.1 Coding.php, s72_Shell_v1.1_Coding.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tsuper_rule = 1\n\t\thash0 = \"31a82cbee8dffaf8eb7b73841f3f3e8e9b3e78cf\"\n\t\thash1 = \"838c7191cb10d5bb0fc7460b4ad0c18c326764c6\"\n\t\thash2 = \"8dfcd919d8ddc89335307a7b2d5d467b1fd67351\"\n\t\thash3 = \"80aba3348434c66ac471daab949871ab16c50042\"\n\tstrings:\n\t\t$s5 = \"$filename = $backupstring.\\\"$filename\\\";\" fullword\n\t\t$s6 = \"while ($file = readdir($folder)) {\" fullword\n\t\t$s7 = \"if($file != \\\".\\\" && $file != \\\"..\\\")\" fullword\n\t\t$s9 = \"$backupstring = \\\"copy_of_\\\";\" fullword\n\t\t$s10 = \"if( file_exists($file_name))\" fullword\n\t\t$s13 = \"global $file_name, $filename;\" fullword\n\t\t$s16 = \"copy($file,\\\"$filename\\\");\" fullword\n\t\t$s18 = \"<td width=\\\"49%\\\" height=\\\"142\\\">\" fullword\n\tcondition:\n\t\tall of them\n}\nrule WebShell__findsock_php_findsock_shell_php_reverse_shell {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - from files findsock.c, php-findsock-shell.php, php-reverse-shell.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tsuper_rule = 1\n\t\thash0 = \"5622c9841d76617bfc3cd4cab1932d8349b7044f\"\n\t\thash1 = \"4a20f36035bbae8e342aab0418134e750b881d05\"\n\t\thash2 = \"40dbdc0bdf5218af50741ba011c5286a723fa9bf\"\n\tstrings:\n\t\t$s1 = \"// me at pentestmonkey@pentestmonkey.net\" fullword\n\tcondition:\n\t\tall of them\n}\nrule WebShell_Generic_PHP_6 {\n\tmeta:\n\t\tdescription = \"PHP Webshells Github Archive - from files c0derz shell [csh] v. 0.1.1 release.php, CrystalShell v.1.php, load_shell.php, Loaderz WEB Shell.php, stres.php\"\n\t\tauthor = \"Florian Roth\"\n\t\tsuper_rule = 1\n\t\thash0 = \"1a08f5260c4a2614636dfc108091927799776b13\"\n\t\thash1 = \"335a0851304acedc3f117782b61479bbc0fd655a\"\n\t\thash2 = \"ca9fcfb50645dc0712abdf18d613ed2196e66241\"\n\t\thash3 = \"36d8782d749638fdcaeed540d183dd3c8edc6791\"\n\t\thash4 = \"03f88f494654f2ad0361fb63e805b6bbfc0c86de\"\n\tstrings:\n\t\t$s2 = \"@eval(stripslashes($_POST['phpcode']));\" fullword\n\t\t$s5 = \"echo shell_exec($com);\" fullword\n\t\t$s7 = \"if($sertype == \\\"winda\\\"){\" fullword\n\t\t$s8 = \"function execute($com)\" fullword\n\t\t$s12 = \"echo decode(execute($cmd));\" fullword\n\t\t$s15 = \"echo system($com);\" fullword\n\tcondition:\n\t\t4 of them\n}\n\nrule Unpack_Injectt {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file Injectt.exe\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"8a5d2158a566c87edc999771e12d42c5\"\n\tstrings:\n\t\t$s2 = \"%s -Run                              -->To Install And Run The Service\"\n\t\t$s3 = \"%s -Uninstall                        -->To Uninstall The Service\"\n\t\t$s4 = \"(STANDARD_RIGHTS_REQUIRED |SC_MANAGER_CONNECT |SC_MANAGER_CREATE_SERVICE |SC_MAN\"\n\tcondition:\n\t\tall of them\n}\nrule HYTop_DevPack_fso {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file fso.asp\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"b37f3cde1a08890bd822a182c3a881f6\"\n\tstrings:\n\t\t$s0 = \"<!-- PageFSO Below -->\"\n\t\t$s1 = \"theFile.writeLine(\\\"<script language=\\\"\\\"vbscript\\\"\\\" runat=server>if request(\\\"\\\"\\\"&cli\"\n\tcondition:\n\t\tall of them\n}\nrule FeliksPack3___PHP_Shells_ssh {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file ssh.php\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"1aa5307790d72941589079989b4f900e\"\n\tstrings:\n\t\t$s0 = \"eval(gzinflate(str_rot13(base64_decode('\"\n\tcondition:\n\t\tall of them\n}\nrule Debug_BDoor {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file BDoor.dll\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"e4e8e31dd44beb9320922c5f49739955\"\n\tstrings:\n\t\t$s1 = \"\\\\BDoor\\\\\"\n\t\t$s4 = \"SOFTWARE\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Run\"\n\tcondition:\n\t\tall of them\n}\nrule bin_Client {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file Client.exe\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"5f91a5b46d155cacf0cc6673a2a5461b\"\n\tstrings:\n\t\t$s0 = \"Recieved respond from server!!\"\n\t\t$s4 = \"packet door client\"\n\t\t$s5 = \"input source port(whatever you want):\"\n\t\t$s7 = \"Packet sent,waiting for reply...\"\n\tcondition:\n\t\tall of them\n}\nrule ZXshell2_0_rar_Folder_ZXshell {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file ZXshell.exe\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"246ce44502d2f6002d720d350e26c288\"\n\tstrings:\n\t\t$s0 = \"WPreviewPagesn\"\n\t\t$s1 = \"DA!OLUTELY N\"\n\tcondition:\n\t\tall of them\n}\nrule RkNTLoad {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file RkNTLoad.exe\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"262317c95ced56224f136ba532b8b34f\"\n\tstrings:\n\t\t$s1 = \"$Info: This file is packed with the UPX executable packer http://upx.tsx.org $\"\n\t\t$s2 = \"5pur+virtu!\"\n\t\t$s3 = \"ugh spac#n\"\n\t\t$s4 = \"xcEx3WriL4\"\n\t\t$s5 = \"runtime error\"\n\t\t$s6 = \"loseHWait.Sr.\"\n\t\t$s7 = \"essageBoxAw\"\n\t\t$s8 = \"$Id: UPX 1.07 Copyright (C) 1996-2001 the UPX Team. All Rights Reserved. $\"\n\tcondition:\n\t\tall of them\n}\nrule binder2_binder2 {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file binder2.exe\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"d594e90ad23ae0bc0b65b59189c12f11\"\n\tstrings:\n\t\t$s0 = \"IsCharAlphaNumericA\"\n\t\t$s2 = \"WideCharToM\"\n\t\t$s4 = \"g 5pur+virtu!\"\n\t\t$s5 = \"\\\\syslog.en\"\n\t\t$s6 = \"heap7'7oqk?not=\"\n\t\t$s8 = \"- Kablto in\"\n\tcondition:\n\t\tall of them\n}\nrule thelast_orice2 {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file orice2.php\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"aa63ffb27bde8d03d00dda04421237ae\"\n\tstrings:\n\t\t$s0 = \" $aa = $_GET['aa'];\"\n\t\t$s1 = \"echo $aa;\"\n\tcondition:\n\t\tall of them\n}\nrule FSO_s_sincap {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file sincap.php\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"dc5c2c2392b84a1529abd92e98e9aa5b\"\n\tstrings:\n\t\t$s0 = \"    <font color=\\\"#E5E5E5\\\" style=\\\"font-size: 8pt; font-weight: 700\\\" face=\\\"Arial\\\">\"\n\t\t$s4 = \"<body text=\\\"#008000\\\" bgcolor=\\\"#808080\\\" topmargin=\\\"0\\\" leftmargin=\\\"0\\\" rightmargin=\"\n\tcondition:\n\t\tall of them\n}\nrule PhpShell {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file PhpShell.php\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"539baa0d39a9cf3c64d65ee7a8738620\"\n\tstrings:\n\t\t$s2 = \"href=\\\"http://www.gimpster.com/wiki/PhpShell\\\">www.gimpster.com/wiki/PhpShell</a>.\"\n\tcondition:\n\t\tall of them\n}\nrule HYTop_DevPack_config {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file config.asp\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"b41d0e64e64a685178a3155195921d61\"\n\tstrings:\n\t\t$s0 = \"const adminPassword=\\\"\"\n\t\t$s2 = \"const userPassword=\\\"\"\n\t\t$s3 = \"const mVersion=\"\n\tcondition:\n\t\tall of them\n}\nrule sendmail {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file sendmail.exe\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"75b86f4a21d8adefaf34b3a94629bd17\"\n\tstrings:\n\t\t$s3 = \"_NextPyC808\"\n\t\t$s6 = \"Copyright (C) 2000, Diamond Computer Systems Pty. Ltd. (www.diamondcs.com.au)\"\n\tcondition:\n\t\tall of them\n}\nrule FSO_s_zehir4 {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file zehir4.asp\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"5b496a61363d304532bcf52ee21f5d55\"\n\tstrings:\n\t\t$s5 = \" byMesaj \"\n\tcondition:\n\t\tall of them\n}\nrule hkshell_hkshell {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file hkshell.exe\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"168cab58cee59dc4706b3be988312580\"\n\tstrings:\n\t\t$s1 = \"PrSessKERNELU\"\n\t\t$s2 = \"Cur3ntV7sion\"\n\t\t$s3 = \"Explorer8\"\n\tcondition:\n\t\tall of them\n}\nrule iMHaPFtp {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file iMHaPFtp.php\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"12911b73bc6a5d313b494102abcf5c57\"\n\tstrings:\n\t\t$s1 = \"echo \\\"\\\\t<th class=\\\\\\\"permission_header\\\\\\\"><a href=\\\\\\\"$self?{$d}sort=permission$r\\\\\\\">\"\n\tcondition:\n\t\tall of them\n}\nrule Unpack_TBack {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file TBack.dll\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"a9d1007823bf96fb163ab38726b48464\"\n\tstrings:\n\t\t$s5 = \"\\\\final\\\\new\\\\lcc\\\\public.dll\"\n\tcondition:\n\t\tall of them\n}\nrule DarkSpy105 {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file DarkSpy105.exe\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"f0b85e7bec90dba829a3ede1ab7d8722\"\n\tstrings:\n\t\t$s7 = \"Sorry,DarkSpy got an unknown exception,please re-run it,thanks!\"\n\tcondition:\n\t\tall of them\n}\nrule EditServer_Webshell {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file EditServer.exe\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"f945de25e0eba3bdaf1455b3a62b9832\"\n\tstrings:\n\t\t$s2 = \"Server %s Have Been Configured\"\n\t\t$s5 = \"The Server Password Exceeds 32 Characters\"\n\t\t$s8 = \"9--Set Procecess Name To Inject DLL\"\n\tcondition:\n\t\tall of them\n}\nrule FSO_s_reader {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file reader.asp\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"b598c8b662f2a1f6cc61f291fb0a6fa2\"\n\tstrings:\n\t\t$s2 = \"mailto:mailbomb@hotmail.\"\n\tcondition:\n\t\tall of them\n}\nrule ASP_CmdAsp {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file CmdAsp.asp\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"79d4f3425f7a89befb0ef3bafe5e332f\"\n\tstrings:\n\t\t$s2 = \"' -- Read the output from our command and remove the temp file -- '\"\n\t\t$s6 = \"Call oScript.Run (\\\"cmd.exe /c \\\" & szCMD & \\\" > \\\" & szTempFile, 0, True)\"\n\t\t$s9 = \"' -- create the COM objects that we will be using -- '\"\n\tcondition:\n\t\tall of them\n}\nrule KA_uShell {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file KA_uShell.php\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"685f5d4f7f6751eaefc2695071569aab\"\n\tstrings:\n\t\t$s5 = \"if(empty($_SERVER['PHP_AUTH_PW']) || $_SERVER['PHP_AUTH_PW']<>$pass\"\n\t\t$s6 = \"if ($_POST['path']==\\\"\\\"){$uploadfile = $_FILES['file']['name'];}\"\n\tcondition:\n\t\tall of them\n}\nrule PHP_Backdoor_v1 {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file PHP Backdoor v1.php\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"0506ba90759d11d78befd21cabf41f3d\"\n\tstrings:\n\n\t\t$s5 = \"echo\\\"<form method=\\\\\\\"POST\\\\\\\" action=\\\\\\\"\\\".$_SERVER['PHP_SELF'].\\\"?edit=\\\".$th\"\n\t\t$s8 = \"echo \\\"<a href=\\\\\\\"\\\".$_SERVER['PHP_SELF'].\\\"?proxy\"\n\tcondition:\n\t\tall of them\n}\nrule svchostdll {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file svchostdll.dll\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"0f6756c8cb0b454c452055f189e4c3f4\"\n\tstrings:\n\t\t$s0 = \"InstallService\"\n\t\t$s1 = \"RundllInstallA\"\n\t\t$s2 = \"UninstallService\"\n\t\t$s3 = \"&G3 Users In RegistryD\"\n\t\t$s4 = \"OL_SHUTDOWN;I\"\n\t\t$s5 = \"SvcHostDLL.dll\"\n\t\t$s6 = \"RundllUninstallA\"\n\t\t$s7 = \"InternetOpenA\"\n\t\t$s8 = \"Check Cloneomplete\"\n\tcondition:\n\t\tall of them\n}\nrule HYTop_DevPack_server {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file server.asp\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"1d38526a215df13c7373da4635541b43\"\n\tstrings:\n\t\t$s0 = \"<!-- PageServer Below -->\"\n\tcondition:\n\t\tall of them\n}\nrule vanquish {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file vanquish.dll\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"684450adde37a93e8bb362994efc898c\"\n\tstrings:\n\t\t$s3 = \"You cannot delete protected files/folders! Instead, your attempt has been logged\"\n\t\t$s8 = \"?VCreateProcessA@@YGHPBDPADPAU_SECURITY_ATTRIBUTES@@2HKPAX0PAU_STARTUPINFOA@@PAU\"\n\t\t$s9 = \"?VFindFirstFileExW@@YGPAXPBGW4_FINDEX_INFO_LEVELS@@PAXW4_FINDEX_SEARCH_OPS@@2K@Z\"\n\tcondition:\n\t\tall of them\n}\nrule winshell {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file winshell.exe\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"3144410a37dd4c29d004a814a294ea26\"\n\tstrings:\n\t\t$s0 = \"Software\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\RunServices\"\n\t\t$s1 = \"WinShell Service\"\n\t\t$s2 = \"__GLOBAL_HEAP_SELECTED\"\n\t\t$s3 = \"__MSVCRT_HEAP_SELECT\"\n\t\t$s4 = \"Provide Windows CmdShell Service\"\n\t\t$s5 = \"URLDownloadToFileA\"\n\t\t$s6 = \"RegisterServiceProcess\"\n\t\t$s7 = \"GetModuleBaseNameA\"\n\t\t$s8 = \"WinShell v5.0 (C)2002 janker.org\"\n\tcondition:\n\t\tall of them\n}\nrule FSO_s_remview {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file remview.php\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"b4a09911a5b23e00b55abe546ded691c\"\n\tstrings:\n\t\t$s2 = \"      echo \\\"<hr size=1 noshade>\\\\n\\\\n\\\\n\\\\n\\\\n\\\\n\\\\n\\\\n\\\\n\\\\n\\\\n\\\\n\\\\n\\\\n\\\\n\\\\n\\\\n\\\\n\\\\n\\\\n\\\\n\\\\n\\\\n\\\\n\\\"\"\n\t\t$s3 = \"         echo \\\"<script>str$i=\\\\\\\"\\\".str_replace(\\\"\\\\\\\"\\\",\\\"\\\\\\\\\\\\\\\"\\\",str_replace(\\\"\\\\\\\\\\\",\\\"\\\\\\\\\\\\\\\\\\\"\"\n\t\t$s4 = \"      echo \\\"<hr size=1 noshade>\\\\n\\\\n\\\\n\\\\n\\\\n\\\\n\\\\n\\\\n\\\\n\\\\n\\\\n\\\\n\\\\n\\\\n\\\\n\\\\n\\\\n\\\\n\\\\n\\\\n\\\\n\\\\n\\\\n\\\\n<\"\n\tcondition:\n\t\tall of them\n}\nrule saphpshell {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file saphpshell.php\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"d7bba8def713512ddda14baf9cd6889a\"\n\tstrings:\n\t\t$s0 = \"<td><input type=\\\"text\\\" name=\\\"command\\\" size=\\\"60\\\" value=\\\"<?=$_POST['command']?>\"\n\tcondition:\n\t\tall of them\n}\nrule HYTop2006_rar_Folder_2006Z {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file 2006Z.exe\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"fd1b6129abd4ab177fed135e3b665488\"\n\tstrings:\n\t\t$s1 = \"wangyong,czy,allen,lcx,Marcos,kEvin1986,myth\"\n\t\t$s8 = \"System\\\\CurrentControlSet\\\\Control\\\\Keyboard Layouts\\\\%.8x\"\n\tcondition:\n\t\tall of them\n}\nrule admin_ad {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file admin-ad.asp\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"e6819b8f8ff2f1073f7d46a0b192f43b\"\n\tstrings:\n\t\t$s6 = \"<td align=\\\"center\\\"> <input name=\\\"cmd\\\" type=\\\"text\\\" id=\\\"cmd\\\" siz\"\n\t\t$s7 = \"Response.write\\\"<a href='\\\"&url&\\\"?path=\\\"&Request(\\\"oldpath\\\")&\\\"&attrib=\\\"&attrib&\\\"'><\"\n\tcondition:\n\t\tall of them\n}\nrule FSO_s_casus15 {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file casus15.php\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"8d155b4239d922367af5d0a1b89533a3\"\n\tstrings:\n\t\t$s6 = \"if((is_dir(\\\"$deldir/$file\\\")) AND ($file!=\\\".\\\") AND ($file!=\\\"..\\\"))\"\n\tcondition:\n\t\tall of them\n}\nrule BIN_Client {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file Client.exe\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"9f0a74ec81bc2f26f16c5c172b80eca7\"\n\tstrings:\n\t\t$s0 = \"=====Remote Shell Closed=====\"\n\t\t$s2 = \"All Files(*.*)|*.*||\"\n\t\t$s6 = \"WSAStartup Error!\"\n\t\t$s7 = \"SHGetFileInfoA\"\n\t\t$s8 = \"CreateThread False!\"\n\t\t$s9 = \"Port Number Error\"\n\tcondition:\n\t\t4 of them\n}\nrule shelltools_g0t_root_uptime {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file uptime.exe\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"d1f56102bc5d3e2e37ab3ffa392073b9\"\n\tstrings:\n\t\t$s0 = \"JDiamondCSlC~\"\n\t\t$s1 = \"CharactQA\"\n\t\t$s2 = \"$Info: This file is packed with the UPX executable packer $\"\n\t\t$s5 = \"HandlereateConso\"\n\t\t$s7 = \"ION\\\\System\\\\FloatingPo\"\n\tcondition:\n\t\tall of them\n}\nrule Simple_PHP_BackDooR {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file Simple_PHP_BackDooR.php\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"a401132363eecc3a1040774bec9cb24f\"\n\tstrings:\n\t\t$s0 = \"<hr>to browse go to http://<? echo $SERVER_NAME.$REQUEST_URI; ?>?d=[directory he\"\n\t\t$s6 = \"if(!move_uploaded_file($HTTP_POST_FILES['file_name']['tmp_name'], $dir.$fn\"\n\t\t$s9 = \"// a simple php backdoor\"\n\tcondition:\n\t\t1 of them\n}\nrule sig_2005Gray {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file 2005Gray.asp\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"75dbe3d3b70a5678225d3e2d78b604cc\"\n\tstrings:\n\t\t$s0 = \"SCROLLBAR-FACE-COLOR: #e8e7e7;\"\n\t\t$s4 = \"echo \\\"&nbsp;<a href=\\\"\\\"/\\\"&encodeForUrl(theHref,false)&\\\"\\\"\\\" target=_blank>\\\"&replace\"\n\t\t$s8 = \"theHref=mid(replace(lcase(list.path),lcase(server.mapPath(\\\"/\\\")),\\\"\\\"),2)\"\n\t\t$s9 = \"SCROLLBAR-3DLIGHT-COLOR: #cccccc;\"\n\tcondition:\n\t\tall of them\n}\nrule DllInjection {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file DllInjection.exe\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"a7b92283a5102886ab8aee2bc5c8d718\"\n\tstrings:\n\t\t$s0 = \"\\\\BDoor\\\\DllInjecti\"\n\tcondition:\n\t\tall of them\n}\nrule Mithril_v1_45_Mithril {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file Mithril.exe\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"f1484f882dc381dde6eaa0b80ef64a07\"\n\tstrings:\n\t\t$s2 = \"cress.exe\"\n\t\t$s7 = \"\\\\Debug\\\\Mithril.\"\n\tcondition:\n\t\tall of them\n}\nrule hkshell_hkrmv {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file hkrmv.exe\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"bd3a0b7a6b5536f8d96f50956560e9bf\"\n\tstrings:\n\t\t$s5 = \"/THUMBPOSITION7\"\n\t\t$s6 = \"\\\\EvilBlade\\\\\"\n\tcondition:\n\t\tall of them\n}\nrule phpshell {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file phpshell.php\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"1dccb1ea9f24ffbd085571c88585517b\"\n\tstrings:\n\t\t$s1 = \"echo \\\"<input size=\\\\\\\"100\\\\\\\" type=\\\\\\\"text\\\\\\\" name=\\\\\\\"newfile\\\\\\\" value=\\\\\\\"$inputfile\\\\\\\"><b\"\n\t\t$s2 = \"$img[$id] = \\\"<img height=\\\\\\\"16\\\\\\\" width=\\\\\\\"16\\\\\\\" border=\\\\\\\"0\\\\\\\" src=\\\\\\\"$REMOTE_IMAGE_UR\"\n\t\t$s3 = \"$file = str_replace(\\\"\\\\\\\\\\\", \\\"/\\\", str_replace(\\\"//\\\", \\\"/\\\", str_replace(\\\"\\\\\\\\\\\\\\\\\\\", \\\"\\\\\\\\\\\", \"\n\tcondition:\n\t\tall of them\n}\nrule FSO_s_cmd {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file cmd.asp\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"cbe8e365d41dd3cd8e462ca434cf385f\"\n\tstrings:\n\t\t$s0 = \"<%= \\\"\\\\\\\\\\\" & oScriptNet.ComputerName & \\\"\\\\\\\" & oScriptNet.UserName %>\"\n\t\t$s1 = \"Call oScript.Run (\\\"cmd.exe /c \\\" & szCMD & \\\" > \\\" & szTempFile, 0, True)\"\n\tcondition:\n\t\tall of them\n}\nrule FeliksPack3___PHP_Shells_phpft {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file phpft.php\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"60ef80175fcc6a879ca57c54226646b1\"\n\tstrings:\n\t\t$s6 = \"PHP Files Thief\"\n\t\t$s11 = \"http://www.4ngel.net\"\n\tcondition:\n\t\tall of them\n}\nrule FSO_s_indexer {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file indexer.asp\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"135fc50f85228691b401848caef3be9e\"\n\tstrings:\n\t\t$s3 = \"<td>Nereye :<td><input type=\\\"text\\\" name=\\\"nereye\\\" size=25></td><td><input type=\\\"r\"\n\tcondition:\n\t\tall of them\n}\nrule r57shell {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file r57shell.php\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"8023394542cddf8aee5dec6072ed02b5\"\n\tstrings:\n\t\t$s11 = \" $_POST['cmd']=\\\"echo \\\\\\\"Now script try connect to\"\n\tcondition:\n\t\tall of them\n}\nrule bdcli100 {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file bdcli100.exe\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"b12163ac53789fb4f62e4f17a8c2e028\"\n\tstrings:\n\t\t$s5 = \"unable to connect to \"\n\t\t$s8 = \"backdoor is corrupted on \"\n\tcondition:\n\t\tall of them\n}\nrule HYTop_DevPack_2005Red {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file 2005Red.asp\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"d8ccda2214b3f6eabd4502a050eb8fe8\"\n\tstrings:\n\t\t$s0 = \"scrollbar-darkshadow-color:#FF9DBB;\"\n\t\t$s3 = \"echo \\\"&nbsp;<a href=\\\"\\\"/\\\"&encodeForUrl(theHref,false)&\\\"\\\"\\\" target=_blank>\\\"&replace\"\n\t\t$s9 = \"theHref=mid(replace(lcase(list.path),lcase(server.mapPath(\\\"/\\\")),\\\"\\\"),2)\"\n\tcondition:\n\t\tall of them\n}\nrule HYTop2006_rar_Folder_2006X2 {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file 2006X2.exe\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"cc5bf9fc56d404ebbc492855393d7620\"\n\tstrings:\n\t\t$s2 = \"Powered By \"\n\t\t$s3 = \" \\\" onClick=\\\"this.form.sharp.name=this.form.password.value;this.form.action=this.\"\n\tcondition:\n\t\tall of them\n}\nrule rdrbs084 {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file rdrbs084.exe\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"ed30327b255816bdd7590bf891aa0020\"\n\tstrings:\n\t\t$s0 = \"Create mapped port. You have to specify domain when using HTTP type.\"\n\t\t$s8 = \"<LOCAL PORT> <MAPPING SERVER> <MAPPING SERVER PORT> <TARGET SERVER> <TARGET\"\n\tcondition:\n\t\tall of them\n}\nrule HYTop_CaseSwitch_2005 {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file 2005.exe\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"8bf667ee9e21366bc0bd3491cb614f41\"\n\tstrings:\n\t\t$s1 = \"MSComDlg.CommonDialog\"\n\t\t$s2 = \"CommonDialog1\"\n\t\t$s3 = \"__vbaExceptHandler\"\n\t\t$s4 = \"EVENT_SINK_Release\"\n\t\t$s5 = \"EVENT_SINK_AddRef\"\n\t\t$s6 = \"By Marcos\"\n\t\t$s7 = \"EVENT_SINK_QueryInterface\"\n\t\t$s8 = \"MethCallEngine\"\n\tcondition:\n\t\tall of them\n}\nrule eBayId_index3 {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file index3.php\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"0412b1e37f41ea0d002e4ed11608905f\"\n\tstrings:\n\t\t$s8 = \"$err = \\\"<i>Your Name</i> Not Entered!</font></h2>Sorry, \\\\\\\"You\"\n\tcondition:\n\t\tall of them\n}\nrule FSO_s_phvayv {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file phvayv.php\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"205ecda66c443083403efb1e5c7f7878\"\n\tstrings:\n\t\t$s2 = \"wrap=\\\"OFF\\\">XXXX</textarea></font><font face\"\n\tcondition:\n\t\tall of them\n}\nrule byshell063_ntboot {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file ntboot.exe\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"99b5f49db6d6d9a9faeffb29fd8e6d8c\"\n\tstrings:\n\t\t$s0 = \"SYSTEM\\\\CurrentControlSet\\\\Services\\\\NtBoot\"\n\t\t$s1 = \"Failure ... Access is Denied !\"\n\t\t$s2 = \"Dumping Description to Registry...\"\n\t\t$s3 = \"Opening Service .... Failure !\"\n\tcondition:\n\t\tall of them\n}\nrule FSO_s_casus15_2 {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file casus15.php\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"8d155b4239d922367af5d0a1b89533a3\"\n\tstrings:\n\t\t$s0 = \"copy ( $dosya_gonder\"\n\tcondition:\n\t\tall of them\n}\nrule installer {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file installer.cmd\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"a507919ae701cf7e42fa441d3ad95f8f\"\n\tstrings:\n\t\t$s0 = \"Restore Old Vanquish\"\n\t\t$s4 = \"ReInstall Vanquish\"\n\tcondition:\n\t\tall of them\n}\nrule uploader {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file uploader.php\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"b9a9aab319964351b46bd5fc9d6246a8\"\n\tstrings:\n\t\t$s0 = \"move_uploaded_file($userfile, \\\"entrika.php\\\"); \"\n\tcondition:\n\t\tall of them\n}\nrule FSO_s_remview_2 {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file remview.php\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"b4a09911a5b23e00b55abe546ded691c\"\n\tstrings:\n\t\t$s0 = \"<xmp>$out</\"\n\t\t$s1 = \".mm(\\\"Eval PHP code\\\").\"\n\tcondition:\n\t\tall of them\n}\nrule FeliksPack3___PHP_Shells_r57 {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file r57.php\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"903908b77a266b855262cdbce81c3f72\"\n\tstrings:\n\t\t$s1 = \"$sql = \\\"LOAD DATA INFILE \\\\\\\"\\\".$_POST['test3_file'].\"\n\tcondition:\n\t\tall of them\n}\nrule HYTop2006_rar_Folder_2006X {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file 2006X.exe\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"cf3ee0d869dd36e775dfcaa788db8e4b\"\n\tstrings:\n\t\t$s1 = \"<input name=\\\"password\\\" type=\\\"password\\\" id=\\\"password\\\"\"\n\t\t$s6 = \"name=\\\"theAction\\\" type=\\\"text\\\" id=\\\"theAction\\\"\"\n\tcondition:\n\t\tall of them\n}\nrule FSO_s_phvayv_2 {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file phvayv.php\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"205ecda66c443083403efb1e5c7f7878\"\n\tstrings:\n\t\t$s2 = \"rows=\\\"24\\\" cols=\\\"122\\\" wrap=\\\"OFF\\\">XXXX</textarea></font><font\"\n\tcondition:\n\t\tall of them\n}\nrule elmaliseker {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file elmaliseker.asp\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"ccf48af0c8c09bbd038e610a49c9862e\"\n\tstrings:\n\t\t$s0 = \"javascript:Command('Download'\"\n\t\t$s5 = \"zombie_array=array(\"\n\tcondition:\n\t\tall of them\n}\nrule shelltools_g0t_root_resolve {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file resolve.exe\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"69bf9aa296238610a0e05f99b5540297\"\n\tstrings:\n\t\t$s0 = \"3^n6B(Ed3\"\n\t\t$s1 = \"^uldn'Vt(x\"\n\t\t$s2 = \"\\\\= uPKfp\"\n\t\t$s3 = \"'r.axV<ad\"\n\t\t$s4 = \"p,modoi$=sr(\"\n\t\t$s5 = \"DiamondC8S t\"\n\t\t$s6 = \"`lQ9fX<ZvJW\"\n\tcondition:\n\t\tall of them\n}\nrule FSO_s_RemExp {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file RemExp.asp\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"b69670ecdbb40012c73686cd22696eeb\"\n\tstrings:\n\t\t$s1 = \"<td bgcolor=\\\"<%=BgColor%>\\\" title=\\\"<%=SubFolder.Name%>\\\"> <a href= \\\"<%=Request.Ser\"\n\t\t$s5 = \"<td bgcolor=\\\"<%=BgColor%>\\\" title=\\\"<%=File.Name%>\\\"> <a href= \\\"showcode.asp?f=<%=F\"\n\t\t$s6 = \"<td bgcolor=\\\"<%=BgColor%>\\\" align=\\\"right\\\"><%=Attributes(SubFolder.Attributes)%></\"\n\tcondition:\n\t\tall of them\n}\nrule FSO_s_tool {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file tool.asp\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"3a1e1e889fdd974a130a6a767b42655b\"\n\tstrings:\n\t\t$s7 = \"\\\"\\\"%windir%\\\\\\\\calc.exe\\\"\\\")\"\n\tcondition:\n\t\tall of them\n}\nrule FeliksPack3___PHP_Shells_2005 {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file 2005.asp\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"97f2552c2fafc0b2eb467ee29cc803c8\"\n\tstrings:\n\t\t$s0 = \"window.open(\\\"\\\"&url&\\\"?id=edit&path=\\\"+sfile+\\\"&op=copy&attrib=\\\"+attrib+\\\"&dpath=\\\"+lp\"\n\t\t$s3 = \"<input name=\\\"dbname\\\" type=\\\"hidden\\\" id=\\\"dbname\\\" value=\\\"<%=request(\\\"dbname\\\")%>\\\">\"\n\tcondition:\n\t\tall of them\n}\nrule byloader {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file byloader.exe\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"0f0d6dc26055653f5844ded906ce52df\"\n\tstrings:\n\t\t$s0 = \"SYSTEM\\\\CurrentControlSet\\\\Services\\\\NtfsChk\"\n\t\t$s1 = \"Failure ... Access is Denied !\"\n\t\t$s2 = \"NTFS Disk Driver Checking Service\"\n\t\t$s3 = \"Dumping Description to Registry...\"\n\t\t$s4 = \"Opening Service .... Failure !\"\n\tcondition:\n\t\tall of them\n}\nrule shelltools_g0t_root_Fport {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file Fport.exe\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"dbb75488aa2fa22ba6950aead1ef30d5\"\n\tstrings:\n\t\t$s4 = \"Copyright 2000 by Foundstone, Inc.\"\n\t\t$s5 = \"You must have administrator privileges to run fport - exiting...\"\n\tcondition:\n\t\tall of them\n}\nrule BackDooR__fr_ {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file BackDooR (fr).php\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"a79cac2cf86e073a832aaf29a664f4be\"\n\tstrings:\n\t\t$s3 = \"print(\\\"<p align=\\\\\\\"center\\\\\\\"><font size=\\\\\\\"5\\\\\\\">Exploit include \"\n\tcondition:\n\t\tall of them\n}\nrule FSO_s_ntdaddy {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file ntdaddy.asp\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"f6262f3ad9f73b8d3e7d9ea5ec07a357\"\n\tstrings:\n\t\t$s1 = \"<input type=\\\"text\\\" name=\\\".CMD\\\" size=\\\"45\\\" value=\\\"<%= szCMD %>\\\"> <input type=\\\"s\"\n\tcondition:\n\t\tall of them\n}\nrule nstview_nstview {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file nstview.php\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"3871888a0c1ac4270104918231029a56\"\n\tstrings:\n\t\t$s4 = \"open STDIN,\\\\\\\"<&X\\\\\\\";open STDOUT,\\\\\\\">&X\\\\\\\";open STDERR,\\\\\\\">&X\\\\\\\";exec(\\\\\\\"/bin/sh -i\\\\\\\");\"\n\tcondition:\n\t\tall of them\n}\nrule HYTop_DevPack_upload {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file upload.asp\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"b09852bda534627949f0259828c967de\"\n\tstrings:\n\t\t$s0 = \"<!-- PageUpload Below -->\"\n\tcondition:\n\t\tall of them\n}\nrule PasswordReminder {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file PasswordReminder.exe\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"ea49d754dc609e8bfa4c0f95d14ef9bf\"\n\tstrings:\n\t\t$s3 = \"The encoded password is found at 0x%8.8lx and has a length of %d.\"\n\tcondition:\n\t\tall of them\n}\nrule Pack_InjectT {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file InjectT.exe\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"983b74ccd57f6195a0584cdfb27d55e8\"\n\tstrings:\n\t\t$s3 = \"ail To Open Registry\"\n\t\t$s4 = \"32fDssignim\"\n\t\t$s5 = \"vide Internet S\"\n\t\t$s6 = \"d]Software\\\\M\"\n\t\t$s7 = \"TInject.Dll\"\n\tcondition:\n\t\tall of them\n}\nrule FSO_s_RemExp_2 {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file RemExp.asp\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"b69670ecdbb40012c73686cd22696eeb\"\n\tstrings:\n\t\t$s2 = \" Then Response.Write \\\"\"\n\t\t$s3 = \"<a href= \\\"<%=Request.ServerVariables(\\\"script_name\\\")%>\"\n\tcondition:\n\t\tall of them\n}\nrule FSO_s_c99 {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file c99.php\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"5f9ba02eb081bba2b2434c603af454d0\"\n\tstrings:\n\t\t$s2 = \"\\\"txt\\\",\\\"conf\\\",\\\"bat\\\",\\\"sh\\\",\\\"js\\\",\\\"bak\\\",\\\"doc\\\",\\\"log\\\",\\\"sfc\\\",\\\"cfg\\\",\\\"htacce\"\n\tcondition:\n\t\tall of them\n}\nrule rknt_zip_Folder_RkNT {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file RkNT.dll\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"5f97386dfde148942b7584aeb6512b85\"\n\tstrings:\n\t\t$s0 = \"PathStripPathA\"\n\t\t$s1 = \"`cLGet!Addr%\"\n\t\t$s2 = \"$Info: This file is packed with the UPX executable packer http://upx.tsx.org $\"\n\t\t$s3 = \"oQToOemBuff* <=\"\n\t\t$s4 = \"ionCdunAsw[Us'\"\n\t\t$s6 = \"CreateProcessW: %S\"\n\t\t$s7 = \"ImageDirectoryEntryToData\"\n\tcondition:\n\t\tall of them\n}\nrule dbgntboot {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file dbgntboot.dll\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"4d87543d4d7f73c1529c9f8066b475ab\"\n\tstrings:\n\t\t$s2 = \"now DOS is working at mode %d,faketype %d,against %s,has worked %d minutes,by sp\"\n\t\t$s3 = \"sth junk the M$ Wind0wZ retur\"\n\tcondition:\n\t\tall of them\n}\nrule PHP_shell {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file shell.php\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"45e8a00567f8a34ab1cccc86b4bc74b9\"\n\tstrings:\n\t\t$s0 = \"AR8iROET6mMnrqTpC6W1Kp/DsTgxNby9H1xhiswfwgoAtED0y6wEXTihoAtICkIX6L1+vTUYWuWz\"\n\t\t$s11 = \"1HLp1qnlCyl5gko8rDlWHqf8/JoPKvGwEm9Q4nVKvEh0b0PKle3zeFiJNyjxOiVepMSpflJkPv5s\"\n\tcondition:\n\t\tall of them\n}\nrule hxdef100 {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file hxdef100.exe\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"55cc1769cef44910bd91b7b73dee1f6c\"\n\tstrings:\n\t\t$s0 = \"RtlAnsiStringToUnicodeString\"\n\t\t$s8 = \"SYSTEM\\\\CurrentControlSet\\\\Control\\\\SafeBoot\\\\\"\n\t\t$s9 = \"\\\\\\\\.\\\\mailslot\\\\hxdef-rk100sABCDEFGH\"\n\tcondition:\n\t\tall of them\n}\nrule rdrbs100 {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file rdrbs100.exe\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"7c752bcd6da796d80a6830c61a632bff\"\n\tstrings:\n\t\t$s3 = \"Server address must be IP in A.B.C.D format.\"\n\t\t$s4 = \" mapped ports in the list. Currently \"\n\tcondition:\n\t\tall of them\n}\nrule Mithril_Mithril {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file Mithril.exe\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"017191562d72ab0ca551eb89256650bd\"\n\tstrings:\n\t\t$s0 = \"OpenProcess error!\"\n\t\t$s1 = \"WriteProcessMemory error!\"\n\t\t$s4 = \"GetProcAddress error!\"\n\t\t$s5 = \"HHt`HHt\\\\\"\n\t\t$s6 = \"Cmaudi0\"\n\t\t$s7 = \"CreateRemoteThread error!\"\n\t\t$s8 = \"Kernel32\"\n\t\t$s9 = \"VirtualAllocEx error!\"\n\tcondition:\n\t\tall of them\n}\nrule hxdef100_2 {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file hxdef100.exe\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"1b393e2e13b9c57fb501b7cd7ad96b25\"\n\tstrings:\n\t\t$s0 = \"\\\\\\\\.\\\\mailslot\\\\hxdef-rkc000\"\n\t\t$s2 = \"Shared Components\\\\On Access Scanner\\\\BehaviourBlo\"\n\t\t$s6 = \"SYSTEM\\\\CurrentControlSet\\\\Control\\\\SafeBoot\\\\\"\n\tcondition:\n\t\tall of them\n}\nrule Release_dllTest {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file dllTest.dll\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"76a59fc3242a2819307bb9d593bef2e0\"\n\tstrings:\n\t\t$s0 = \";;;Y;`;d;h;l;p;t;x;|;\"\n\t\t$s1 = \"0 0&00060K0R0X0f0l0q0w0\"\n\t\t$s2 = \": :$:(:,:0:4:8:D:`=d=\"\n\t\t$s3 = \"4@5P5T5\\\\5T7\\\\7d7l7t7|7\"\n\t\t$s4 = \"1,121>1C1K1Q1X1^1e1k1s1y1\"\n\t\t$s5 = \"9 9$9(9,9P9X9\\\\9`9d9h9l9p9t9x9|9\"\n\t\t$s6 = \"0)0O0\\\\0a0o0\\\"1E1P1q1\"\n\t\t$s7 = \"<.<I<d<h<l<p<t<x<|<\"\n\t\t$s8 = \"3&31383>3F3Q3X3`3f3w3|3\"\n\t\t$s9 = \"8@;D;H;L;P;T;X;\\\\;a;9=W=z=\"\n\tcondition:\n\t\tall of them\n}\nrule webadmin {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file webadmin.php\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"3a90de401b30e5b590362ba2dde30937\"\n\tstrings:\n\t\t$s0 = \"<input name=\\\\\\\"editfilename\\\\\\\" type=\\\\\\\"text\\\\\\\" class=\\\\\\\"style1\\\\\\\" value='\\\".$this->inpu\"\n\tcondition:\n\t\tall of them\n}\nrule commands {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file commands.asp\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"174486fe844cb388e2ae3494ac2d1ec2\"\n\tstrings:\n\t\t$s1 = \"If CheckRecord(\\\"SELECT COUNT(ID) FROM VictimDetail WHERE VictimID = \\\" & VictimID\"\n\t\t$s2 = \"proxyArr = Array (\\\"HTTP_X_FORWARDED_FOR\\\",\\\"HTTP_VIA\\\",\\\"HTTP_CACHE_CONTROL\\\",\\\"HTTP_F\"\n\tcondition:\n\t\tall of them\n}\nrule hkdoordll {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file hkdoordll.dll\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"b715c009d47686c0e62d0981efce2552\"\n\tstrings:\n\t\t$s6 = \"Can't uninstall,maybe the backdoor is not installed or,the Password you INPUT is\"\n\tcondition:\n\t\tall of them\n}\nrule r57shell_2 {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file r57shell.php\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"8023394542cddf8aee5dec6072ed02b5\"\n\tstrings:\n\t\t$s2 = \"echo \\\"<br>\\\".ws(2).\\\"HDD Free : <b>\\\".view_size($free).\\\"</b> HDD Total : <b>\\\".view_\"\n\tcondition:\n\t\tall of them\n}\nrule Mithril_v1_45_dllTest {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file dllTest.dll\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"1b9e518aaa62b15079ff6edb412b21e9\"\n\tstrings:\n\t\t$s3 = \"syspath\"\n\t\t$s4 = \"\\\\Mithril\"\n\t\t$s5 = \"--list the services in the computer\"\n\tcondition:\n\t\tall of them\n}\nrule dbgiis6cli {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file dbgiis6cli.exe\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"3044dceb632b636563f66fee3aaaf8f3\"\n\tstrings:\n\t\t$s0 = \"User-Agent: Mozilla/4.0 (compatible; MSIE 5.01; Windows NT 5.0)\"\n\t\t$s5 = \"###command:(NO more than 100 bytes!)\"\n\tcondition:\n\t\tall of them\n}\nrule remview_2003_04_22 {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file remview_2003_04_22.php\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"17d3e4e39fbca857344a7650f7ea55e3\"\n\tstrings:\n\t\t$s1 = \"\\\"<b>\\\".mm(\\\"Eval PHP code\\\").\\\"</b> (\\\".mm(\\\"don't type\\\").\\\" \\\\\\\"&lt;?\\\\\\\"\"\n\tcondition:\n\t\tall of them\n}\nrule FSO_s_test {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file test.php\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"82cf7b48da8286e644f575b039a99c26\"\n\tstrings:\n\t\t$s0 = \"$yazi = \\\"test\\\" . \\\"\\\\r\\\\n\\\";\"\n\t\t$s2 = \"fwrite ($fp, \\\"$yazi\\\");\"\n\tcondition:\n\t\tall of them\n}\nrule Debug_cress {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file cress.exe\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"36a416186fe010574c9be68002a7286a\"\n\tstrings:\n\t\t$s0 = \"\\\\Mithril \"\n\t\t$s4 = \"Mithril.exe\"\n\tcondition:\n\t\tall of them\n}\nrule webshell {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file webshell.php\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"f2f8c02921f29368234bfb4d4622ad19\"\n\tstrings:\n\t\t$s0 = \"RhViRYOzz\"\n\t\t$s1 = \"d\\\\O!jWW\"\n\t\t$s2 = \"bc!jWW\"\n\t\t$s3 = \"0W[&{l\"\n\t\t$s4 = \"[INhQ@\\\\\"\n\tcondition:\n\t\tall of them\n}\nrule FSO_s_EFSO_2 {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file EFSO_2.asp\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"a341270f9ebd01320a7490c12cb2e64c\"\n\tstrings:\n\t\t$s0 = \";!+/DRknD7+.\\\\mDrC(V+kcJznndm\\\\f|nzKuJb'r@!&0KUY@*Jb@#@&Xl\\\"dKVcJ\\\\CslU,),@!0KxD~mKV\"\n\t\t$s4 = \"\\\\co!VV2CDtSJ'E*#@#@&mKx/DP14lM/nY{JC81N+6LtbL3^hUWa;M/OE-AXX\\\"b~/fAs!u&9|J\\\\grKp\\\"j\"\n\tcondition:\n\t\tall of them\n}\nrule thelast_index3 {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file index3.php\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"cceff6dc247aaa25512bad22120a14b4\"\n\tstrings:\n\t\t$s5 = \"$err = \\\"<i>Your Name</i> Not Entered!</font></h2>Sorry, \\\\\\\"Your Name\\\\\\\" field is r\"\n\tcondition:\n\t\tall of them\n}\nrule adjustcr {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file adjustcr.exe\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"17037fa684ef4c90a25ec5674dac2eb6\"\n\tstrings:\n\t\t$s0 = \"$Info: This file is packed with the UPX executable packer $\"\n\t\t$s2 = \"$License: NRV for UPX is distributed under special license $\"\n\t\t$s6 = \"AdjustCR Carr\"\n\t\t$s7 = \"ION\\\\System\\\\FloatingPo\"\n\tcondition:\n\t\tall of them\n}\nrule FeliksPack3___PHP_Shells_xIShell {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file xIShell.php\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"997c8437c0621b4b753a546a53a88674\"\n\tstrings:\n\t\t$s3 = \"if (!$nix) { $xid = implode(explode(\\\"\\\\\\\\\\\",$xid),\\\"\\\\\\\\\\\\\\\\\\\");}echo (\\\"<td><a href='Java\"\n\tcondition:\n\t\tall of them\n}\nrule HYTop_AppPack_2005 {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file 2005.asp\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"63d9fd24fa4d22a41fc5522fc7050f9f\"\n\tstrings:\n\t\t$s6 = \"\\\" onclick=\\\"this.form.sqlStr.value='e:\\\\hytop.mdb\"\n\tcondition:\n\t\tall of them\n}\nrule xssshell {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file xssshell.asp\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"8fc0ffc5e5fbe85f7706ffc45b3f79b4\"\n\tstrings:\n\t\t$s1 = \"if( !getRequest(COMMANDS_URL + \\\"?v=\\\" + VICTIM + \\\"&r=\\\" + generateID(), \\\"pushComma\"\n\tcondition:\n\t\tall of them\n}\nrule FeliksPack3___PHP_Shells_usr {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file usr.php\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"ade3357520325af50c9098dc8a21a024\"\n\tstrings:\n\t\t$s0 = \"<?php $id_info = array('notify' => 'off','sub' => 'aasd','s_name' => 'nurullahor\"\n\tcondition:\n\t\tall of them\n}\nrule FSO_s_phpinj {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file phpinj.php\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"dd39d17e9baca0363cc1c3664e608929\"\n\tstrings:\n\t\t$s4 = \"echo '<a href='.$expurl.'> Click Here to Exploit </a> <br />';\"\n\tcondition:\n\t\tall of them\n}\nrule xssshell_db {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file db.asp\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"cb62e2ec40addd4b9930a9e270f5b318\"\n\tstrings:\n\t\t$s8 = \"'// By Ferruh Mavituna | http://ferruh.mavituna.com\"\n\tcondition:\n\t\tall of them\n}\nrule PHP_sh {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file sh.php\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"1e9e879d49eb0634871e9b36f99fe528\"\n\tstrings:\n\t\t$s1 = \"\\\"@$SERVER_NAME \\\".exec(\\\"pwd\\\")\"\n\tcondition:\n\t\tall of them\n}\nrule xssshell_default {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file default.asp\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"d156782ae5e0b3724de3227b42fcaf2f\"\n\tstrings:\n\t\t$s3 = \"If ProxyData <> \\\"\\\" Then ProxyData = Replace(ProxyData, DATA_SEPERATOR, \\\"<br />\\\")\"\n\tcondition:\n\t\tall of them\n}\nrule EditServer_Webshell_2 {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file EditServer.exe\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"5c1f25a4d206c83cdfb006b3eb4c09ba\"\n\tstrings:\n\t\t$s0 = \"@HOTMAIL.COM\"\n\t\t$s1 = \"Press Any Ke\"\n\t\t$s3 = \"glish MenuZ\"\n\tcondition:\n\t\tall of them\n}\nrule by064cli {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file by064cli.exe\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"10e0dff366968b770ae929505d2a9885\"\n\tstrings:\n\t\t$s7 = \"packet dropped,redirecting\"\n\t\t$s9 = \"input the password(the default one is 'by')\"\n\tcondition:\n\t\tall of them\n}\nrule Mithril_dllTest {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file dllTest.dll\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"a8d25d794d8f08cd4de0c3d6bf389e6d\"\n\tstrings:\n\t\t$s0 = \"please enter the password:\"\n\t\t$s3 = \"\\\\dllTest.pdb\"\n\tcondition:\n\t\tall of them\n}\nrule peek_a_boo {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file peek-a-boo.exe\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"aca339f60d41fdcba83773be5d646776\"\n\tstrings:\n\t\t$s0 = \"__vbaHresultCheckObj\"\n\t\t$s1 = \"\\\\VB\\\\VB5.OLB\"\n\t\t$s2 = \"capGetDriverDescriptionA\"\n\t\t$s3 = \"__vbaExceptHandler\"\n\t\t$s4 = \"EVENT_SINK_Release\"\n\t\t$s8 = \"__vbaErrorOverflow\"\n\tcondition:\n\t\tall of them\n}\nrule fmlibraryv3 {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file fmlibraryv3.asp\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"c34c248fed6d5a20d8203924a2088acc\"\n\tstrings:\n\t\t$s3 = \"ExeNewRs.CommandText = \\\"UPDATE \\\" & tablename & \\\" SET \\\" & ExeNewRsValues & \\\" WHER\"\n\tcondition:\n\t\tall of them\n}\nrule Debug_dllTest_2 {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file dllTest.dll\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"1b9e518aaa62b15079ff6edb412b21e9\"\n\tstrings:\n\t\t$s4 = \"\\\\Debug\\\\dllTest.pdb\"\n\t\t$s5 = \"--list the services in the computer\"\n\tcondition:\n\t\tall of them\n}\nrule connector {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file connector.asp\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"3ba1827fca7be37c8296cd60be9dc884\"\n\tstrings:\n\t\t$s2 = \"If ( AttackID = BROADCAST_ATTACK )\"\n\t\t$s4 = \"Add UNIQUE ID for victims / zombies\"\n\tcondition:\n\t\tall of them\n}\nrule shelltools_g0t_root_HideRun {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file HideRun.exe\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"45436d9bfd8ff94b71eeaeb280025afe\"\n\tstrings:\n\t\t$s0 = \"Usage -- hiderun [AppName]\"\n\t\t$s7 = \"PVAX SW, Alexey A. Popoff, Moscow, 1997.\"\n\tcondition:\n\t\tall of them\n}\nrule regshell {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file regshell.exe\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"db2fdc821ca6091bab3ebd0d8bc46ded\"\n\tstrings:\n\t\t$s0 = \"Changes the base hive to HKEY_CURRENT_USER.\"\n\t\t$s4 = \"Displays a list of values and sub-keys in a registry Hive.\"\n\t\t$s5 = \"Enter a menu selection number (1 - 3) or 99 to Exit: \"\n\tcondition:\n\t\tall of them\n}\nrule PHP_Shell_v1_7 {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file PHP_Shell_v1.7.php\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"b5978501c7112584532b4ca6fb77cba5\"\n\tstrings:\n\t\t$s8 = \"<title>[ADDITINAL TITTLE]-phpShell by:[YOURNAME]\"\n\tcondition:\n\t\tall of them\n}\nrule xssshell_save {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file save.asp\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"865da1b3974e940936fe38e8e1964980\"\n\tstrings:\n\t\t$s4 = \"RawCommand = Command & COMMAND_SEPERATOR & Param & COMMAND_SEPERATOR & AttackID\"\n\t\t$s5 = \"VictimID = fm_NStr(Victims(i))\"\n\tcondition:\n\t\tall of them\n}\nrule screencap {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file screencap.exe\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"51139091dea7a9418a50f2712ea72aa6\"\n\tstrings:\n\t\t$s0 = \"GetDIBColorTable\"\n\t\t$s1 = \"Screen.bmp\"\n\t\t$s2 = \"CreateDCA\"\n\tcondition:\n\t\tall of them\n}\nrule FSO_s_phpinj_2 {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file phpinj.php\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"dd39d17e9baca0363cc1c3664e608929\"\n\tstrings:\n\t\t$s9 = \"<? system(\\\\$_GET[cpc]);exit; ?>' ,0 ,0 ,0 ,0 INTO\"\n\tcondition:\n\t\tall of them\n}\nrule ZXshell2_0_rar_Folder_zxrecv {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file zxrecv.exe\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"5d3d12a39f41d51341ef4cb7ce69d30f\"\n\tstrings:\n\t\t$s0 = \"RyFlushBuff\"\n\t\t$s1 = \"teToWideChar^FiYP\"\n\t\t$s2 = \"mdesc+8F D\"\n\t\t$s3 = \"\\\\von76std\"\n\t\t$s4 = \"5pur+virtul\"\n\t\t$s5 = \"- Kablto io\"\n\t\t$s6 = \"ac#f{lowi8a\"\n\tcondition:\n\t\tall of them\n}\nrule FSO_s_ajan {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file ajan.asp\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"22194f8c44524f80254e1b5aec67b03e\"\n\tstrings:\n\t\t$s4 = \"entrika.write \\\"BinaryStream.SaveToFile\"\n\tcondition:\n\t\tall of them\n}\nrule c99shell {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file c99shell.php\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"90b86a9c63e2cd346fe07cea23fbfc56\"\n\tstrings:\n\t\t$s0 = \"<br />Input&nbsp;URL:&nbsp;&lt;input&nbsp;name=\\\\\\\"uploadurl\\\\\\\"&nbsp;type=\\\\\\\"text\\\\\\\"&\"\n\tcondition:\n\t\tall of them\n}\nrule phpspy_2005_full {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file phpspy_2005_full.php\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"d1c69bb152645438440e6c903bac16b2\"\n\tstrings:\n\t\t$s7 = \"echo \\\"  <td align=\\\\\\\"center\\\\\\\" nowrap valign=\\\\\\\"top\\\\\\\"><a href=\\\\\\\"?downfile=\\\".urlenco\"\n\tcondition:\n\t\tall of them\n}\nrule FSO_s_zehir4_2 {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file zehir4.asp\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"5b496a61363d304532bcf52ee21f5d55\"\n\tstrings:\n\t\t$s4 = \"\\\"Program Files\\\\Serv-u\\\\Serv\"\n\tcondition:\n\t\tall of them\n}\nrule httpdoor {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file httpdoor.exe\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"6097ea963455a09474471a9864593dc3\"\n\tstrings:\n\t\t$s4 = \"''''''''''''''''''DaJKHPam\"\n\t\t$s5 = \"o,WideCharR]!n]\"\n\t\t$s6 = \"HAutoComplete\"\n\t\t$s7 = \"<?xml version=\\\"1.0\\\" encoding=\\\"UTF-8\\\" standalone=\\\"yes\\\"?> <assembly xmlns=\\\"urn:sch\"\n\tcondition:\n\t\tall of them\n}\nrule FSO_s_indexer_2 {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file indexer.asp\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"135fc50f85228691b401848caef3be9e\"\n\tstrings:\n\t\t$s5 = \"<td>Nerden :<td><input type=\\\"text\\\" name=\\\"nerden\\\" size=25 value=index.html></td>\"\n\tcondition:\n\t\tall of them\n}\nrule HYTop_DevPack_2005 {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file 2005.asp\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"63d9fd24fa4d22a41fc5522fc7050f9f\"\n\tstrings:\n\t\t$s7 = \"theHref=encodeForUrl(mid(replace(lcase(list.path),lcase(server.mapPath(\\\"/\\\")),\\\"\\\")\"\n\t\t$s8 = \"scrollbar-darkshadow-color:#9C9CD3;\"\n\t\t$s9 = \"scrollbar-face-color:#E4E4F3;\"\n\tcondition:\n\t\tall of them\n}\nrule _root_040_zip_Folder_deploy {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file deploy.exe\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"2c9f9c58999256c73a5ebdb10a9be269\"\n\tstrings:\n\t\t$s5 = \"halon synscan 127.0.0.1 1-65536\"\n\t\t$s8 = \"Obviously you replace the ip address with that of the target.\"\n\n\tcondition:\n\t\tall of them\n}\nrule by063cli {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file by063cli.exe\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"49ce26eb97fd13b6d92a5e5d169db859\"\n\tstrings:\n\t\t$s2 = \"#popmsghello,are you all right?\"\n\t\t$s4 = \"connect failed,check your network and remote ip.\"\n\tcondition:\n\t\tall of them\n}\nrule icyfox007v1_10_rar_Folder_asp {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file asp.asp\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"2c412400b146b7b98d6e7755f7159bb9\"\n\tstrings:\n\t\t$s0 = \"<SCRIPT RUNAT=SERVER LANGUAGE=JAVASCRIPT>eval(Request.form('#')+'')</SCRIPT>\"\n\tcondition:\n\t\tall of them\n}\nrule FSO_s_EFSO_2_2 {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file EFSO_2.asp\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"a341270f9ebd01320a7490c12cb2e64c\"\n\tstrings:\n\t\t$s0 = \";!+/DRknD7+.\\\\mDrC(V+kcJznndm\\\\f|nzKuJb'r@!&0KUY@*Jb@#@&Xl\\\"dKVcJ\\\\CslU,),@!0KxD~mKV\"\n\t\t$s4 = \"\\\\co!VV2CDtSJ'E*#@#@&mKx/DP14lM/nY{JC81N+6LtbL3^hUWa;M/OE-AXX\\\"b~/fAs!u&9|J\\\\grKp\\\"j\"\n\tcondition:\n\t\tall of them\n}\nrule byshell063_ntboot_2 {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file ntboot.dll\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"cb9eb5a6ff327f4d6c46aacbbe9dda9d\"\n\tstrings:\n\t\t$s6 = \"OK,job was done,cuz we have localsystem & SE_DEBUG_NAME:)\"\n\tcondition:\n\t\tall of them\n}\nrule u_uay {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file uay.exe\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"abbc7b31a24475e4c5d82fc4c2b8c7c4\"\n\tstrings:\n\t\t$s1 = \"exec \\\"c:\\\\WINDOWS\\\\System32\\\\freecell.exe\"\n\t\t$s9 = \"SYSTEM\\\\CurrentControlSet\\\\Services\\\\uay.sys\\\\Security\"\n\tcondition:\n\t\t1 of them\n}\nrule bin_wuaus {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file wuaus.dll\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"46a365992bec7377b48a2263c49e4e7d\"\n\tstrings:\n\t\t$s1 = \"9(90989@9V9^9f9n9v9\"\n\t\t$s2 = \":(:,:0:4:8:C:H:N:T:Y:_:e:o:y:\"\n\t\t$s3 = \";(=@=G=O=T=X=\\\\=\"\n\t\t$s4 = \"TCP Send Error!!\"\n\t\t$s5 = \"1\\\"1;1X1^1e1m1w1~1\"\n\t\t$s8 = \"=$=)=/=<=Y=_=j=p=z=\"\n\tcondition:\n\t\tall of them\n}\nrule pwreveal {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file pwreveal.exe\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"b4e8447826a45b76ca45ba151a97ad50\"\n\tstrings:\n\t\t$s0 = \"*<Blank - no es\"\n\t\t$s3 = \"JDiamondCS \"\n\t\t$s8 = \"sword set> [Leith=0 bytes]\"\n\t\t$s9 = \"ION\\\\System\\\\Floating-\"\n\tcondition:\n\t\tall of them\n}\nrule shelltools_g0t_root_xwhois {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file xwhois.exe\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"0bc98bd576c80d921a3460f8be8816b4\"\n\tstrings:\n\t\t$s1 = \"rting! \"\n\t\t$s2 = \"aTypCog(\"\n\t\t$s5 = \"Diamond\"\n\t\t$s6 = \"r)r=rQreryr\"\n\tcondition:\n\t\tall of them\n}\nrule vanquish_2 {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file vanquish.exe\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"2dcb9055785a2ee01567f52b5a62b071\"\n\tstrings:\n\t\t$s2 = \"Vanquish - DLL injection failed:\"\n\tcondition:\n\t\tall of them\n}\nrule down_rar_Folder_down {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file down.asp\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"db47d7a12b3584a2e340567178886e71\"\n\tstrings:\n\t\t$s0 = \"response.write \\\"<font color=blue size=2>NetBios Name: \\\\\\\\\\\"  & Snet.ComputerName &\"\n\tcondition:\n\t\tall of them\n}\nrule cmdShell {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file cmdShell.asp\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"8a9fef43209b5d2d4b81dfbb45182036\"\n\tstrings:\n\t\t$s1 = \"if cmdPath=\\\"wscriptShell\\\" then\"\n\tcondition:\n\t\tall of them\n}\nrule ZXshell2_0_rar_Folder_nc {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file nc.exe\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"2cd1bf15ae84c5f6917ddb128827ae8b\"\n\tstrings:\n\t\t$s0 = \"WSOCK32.dll\"\n\t\t$s1 = \"?bSUNKNOWNV\"\n\t\t$s7 = \"p@gram Jm6h)\"\n\t\t$s8 = \"ser32.dllCONFP@\"\n\tcondition:\n\t\tall of them\n}\nrule portlessinst {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file portlessinst.exe\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"74213856fc61475443a91cd84e2a6c2f\"\n\tstrings:\n\t\t$s2 = \"Fail To Open Registry\"\n\t\t$s3 = \"f<-WLEggDr\\\"\"\n\t\t$s6 = \"oMemoryCreateP\"\n\tcondition:\n\t\tall of them\n}\nrule SetupBDoor {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file SetupBDoor.exe\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"41f89e20398368e742eda4a3b45716b6\"\n\tstrings:\n\t\t$s1 = \"\\\\BDoor\\\\SetupBDoor\"\n\tcondition:\n\t\tall of them\n}\nrule phpshell_3 {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file phpshell.php\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"e8693a2d4a2ffea4df03bb678df3dc6d\"\n\tstrings:\n\t\t$s3 = \"<input name=\\\"submit_btn\\\" type=\\\"submit\\\" value=\\\"Execute Command\\\"></p>\"\n\t\t$s5 = \"      echo \\\"<option value=\\\\\\\"$work_dir\\\\\\\" selected>Current Directory</option>\\\\n\\\";\"\n\tcondition:\n\t\tall of them\n}\nrule BIN_Server {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file Server.exe\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"1d5aa9cbf1429bb5b8bf600335916dcd\"\n\tstrings:\n\t\t$s0 = \"configserver\"\n\t\t$s1 = \"GetLogicalDrives\"\n\t\t$s2 = \"WinExec\"\n\t\t$s4 = \"fxftest\"\n\t\t$s5 = \"upfileok\"\n\t\t$s7 = \"upfileer\"\n\tcondition:\n\t\tall of them\n}\nrule HYTop2006_rar_Folder_2006 {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file 2006.asp\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"c19d6f4e069188f19b08fa94d44bc283\"\n\tstrings:\n\t\t$s6 = \"strBackDoor = strBackDoor \"\n\tcondition:\n\t\tall of them\n}\nrule r57shell_3 {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file r57shell.php\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"87995a49f275b6b75abe2521e03ac2c0\"\n\tstrings:\n\t\t$s1 = \"<b>\\\".$_POST['cmd']\"\n\tcondition:\n\t\tall of them\n}\nrule HDConfig {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file HDConfig.exe\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"7d60e552fdca57642fd30462416347bd\"\n\tstrings:\n\t\t$s0 = \"An encryption key is derived from the password hash. \"\n\t\t$s3 = \"A hash object has been created. \"\n\t\t$s4 = \"Error during CryptCreateHash!\"\n\t\t$s5 = \"A new key container has been created.\"\n\t\t$s6 = \"The password has been added to the hash. \"\n\tcondition:\n\t\tall of them\n}\nrule FSO_s_ajan_2 {\n\tmeta:\n\t\tdescription = \"Webshells Auto-generated - file ajan.asp\"\n\t\tauthor = \"Yara Bulk Rule Generator by Florian Roth\"\n\t\thash = \"22194f8c44524f80254e1b5aec67b03e\"\n\tstrings:\n\t\t$s2 = \"\\\"Set WshShell = CreateObject(\\\"\\\"WScript.Shell\\\"\\\")\"\n\t\t$s3 = \"/file.zip\"\n\tcondition:\n\t\tall of them\n}\n\nrule Webshell_and_Exploit_CN_APT_HK : Webshell\n{\nmeta:\n\tauthor = \"Florian Roth\"\n\tdescription = \"Webshell and Exploit Code in relation with APT against Honk Kong protesters\"\n\tdate = \"10.10.2014\"\n\tscore = 50\nstrings:\n\t$a0 = \"<script language=javascript src=http://java-se.com/o.js</script>\" fullword\n\t$s0 = \"<span style=\\\"font:11px Verdana;\\\">Password: </span><input name=\\\"password\\\" type=\\\"password\\\" size=\\\"20\\\">\"\n\t$s1 = \"<input type=\\\"hidden\\\" name=\\\"doing\\\" value=\\\"login\\\">\"\ncondition:\n\t$a0 or ( all of ($s*) )\n}\n\nrule JSP_Browser_APT_webshell {\n\tmeta:\n\t\tdescription = \"VonLoesch JSP Browser used as web shell by APT groups - jsp File browser 1.1a\"\n\t\tauthor = \"F.Roth\"\n\t\tdate = \"10.10.2014\"\n\t\tscore = 60\n\tstrings:\n\t\t$a1a = \"private static final String[] COMMAND_INTERPRETER = {\\\"\" ascii\n\t\t$a1b = \"cmd\\\", \\\"/C\\\"}; // Dos,Windows\" ascii\n\t\t$a2 = \"Process ls_proc = Runtime.getRuntime().exec(comm, null, new File(dir));\" ascii\n\t\t$a3 = \"ret.append(\\\"!!!! Process has timed out, destroyed !!!!!\\\");\" ascii\n\tcondition:\n\t\tall of them\n}\n\nrule JSP_jfigueiredo_APT_webshell {\n\tmeta:\n\t\tdescription = \"JSP Browser used as web shell by APT groups - author: jfigueiredo\"\n\t\tauthor = \"F.Roth\"\n\t\tdate = \"12.10.2014\"\n\t\tscore = 60\n\t\treference = \"http://ceso.googlecode.com/svn/web/bko/filemanager/Browser.jsp\"\n\tstrings:\n\t\t$a1 = \"String fhidden = new String(Base64.encodeBase64(path.getBytes()));\" ascii\n\t\t$a2 = \"<form id=\\\"upload\\\" name=\\\"upload\\\" action=\\\"ServFMUpload\\\" method=\\\"POST\\\" enctype=\\\"multipart/form-data\\\">\" ascii\n\tcondition:\n\t\tall of them\n}\n\nrule JSP_jfigueiredo_APT_webshell_2 {\n\tmeta:\n\t\tdescription = \"JSP Browser used as web shell by APT groups - author: jfigueiredo\"\n\t\tauthor = \"F.Roth\"\n\t\tdate = \"12.10.2014\"\n\t\tscore = 60\n\t\treference = \"http://ceso.googlecode.com/svn/web/bko/filemanager/\"\n\tstrings:\n\t\t$a1 = \"<div id=\\\"bkorotator\\\"><img alt=\\\"\\\" src=\\\"images/rotator/1.jpg\\\"></div>\" ascii\n\t\t$a2 = \"$(\\\"#dialog\\\").dialog(\\\"destroy\\\");\" ascii\n\t\t$s1 = \"<form id=\\\"form\\\" action=\\\"ServFMUpload\\\" method=\\\"post\\\" enctype=\\\"multipart/form-data\\\">\" ascii\n\t\t$s2 = \"<input type=\\\"hidden\\\" id=\\\"fhidden\\\" name=\\\"fhidden\\\" value=\\\"L3BkZi8=\\\" />\" ascii\n\tcondition:\n\t\tall of ($a*) or all of ($s*)\n}\n\nrule AJAX_FileUpload_webshell {\n\tmeta:\n\t\tdescription = \"AJAX JS/CSS components providing web shell by APT groups\"\n\t\tauthor = \"F.Roth\"\n\t\tdate = \"12.10.2014\"\n\t\tscore = 75\n\t\treference = \"http://ceso.googlecode.com/svn/web/bko/filemanager/ajaxfileupload.js\"\n\tstrings:\n\t\t$a1 = \"var frameId = 'jUploadFrame' + id;\" ascii\n\t\t$a2 = \"var form = jQuery('<form  action=\\\"\\\" method=\\\"POST\\\" name=\\\"' + formId + '\\\" id=\\\"' + formId + '\\\" enctype=\\\"multipart/form-data\\\"></form>');\" ascii\n\t\t$a3 = \"jQuery(\\\"<div>\\\").html(data).evalScripts();\" ascii\n\tcondition:\n\t\tall of them\n}\n\nrule Webshell_Insomnia {\n\tmeta:\n\t\tdescription = \"Insomnia Webshell - file InsomniaShell.aspx\"\n\t\tauthor = \"Florian Roth\"\n\t\treference = \"http://www.darknet.org.uk/2014/12/insomniashell-asp-net-reverse-shell-bind-shell/\"\n\t\tdate = \"2014/12/09\"\n\t\thash = \"e0cfb2ffaa1491aeaf7d3b4ee840f72d42919d22\"\n\t\tscore = 80\n\tstrings:\n\t\t$s0 = \"Response.Write(\\\"- Failed to create named pipe:\\\");\" fullword ascii\n\t\t$s1 = \"Response.Output.Write(\\\"+ Sending {0}<br>\\\", command);\" fullword ascii\n\t\t$s2 = \"String command = \\\"exec master..xp_cmdshell 'dir > \\\\\\\\\\\\\\\\127.0.0.1\" ascii\n\t\t$s3 = \"Response.Write(\\\"- Error Getting User Info<br>\\\");\" fullword ascii\n\t\t$s4 = \"string lpCommandLine, ref SECURITY_ATTRIBUTES lpProcessAttributes,\" fullword ascii\n\t\t$s5 = \"[DllImport(\\\"Advapi32.dll\\\", SetLastError = true)]\" fullword ascii\n\t\t$s9 = \"username = DumpAccountSid(tokUser.User.Sid);\" fullword ascii\n\t\t$s14 = \"//Response.Output.Write(\\\"Opened process PID: {0} : {1}<br>\\\", p\" ascii\n\tcondition:\n\t\t3 of them\n}\n\nrule HawkEye_PHP_Panel {\n\tmeta:\n\t\tdescription = \"Detects HawkEye Keyloggers PHP Panel\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/12/14\"\n\t\tscore = 60\n\tstrings:\n\t\t$s0 = \"$fname = $_GET['fname'];\" ascii fullword\n\t\t$s1 = \"$data = $_GET['data'];\" ascii fullword\n\t\t$s2 = \"unlink($fname);\" ascii fullword\n\t\t$s3 = \"echo \\\"Success\\\";\" fullword ascii\n\tcondition:\n\t\tall of ($s*) and filesize < 600\n}\n\nrule SoakSoak_Infected_Wordpress {\n\tmeta:\n\t\tdescription = \"Detects a SoakSoak infected Wordpress site http://goo.gl/1GzWUX\"\n\t\treference = \"http://goo.gl/1GzWUX\"\n\t\tauthor = \"Florian Roth\"\n\t\tdate = \"2014/12/15\"\n\t\tscore = 60\n\tstrings:\n\t\t$s0 = \"wp_enqueue_script(\\\"swfobject\\\");\" ascii fullword\n\t\t$s1 = \"function FuncQueueObject()\" ascii fullword\n\t\t$s2 = \"add_action(\\\"wp_enqueue_scripts\\\", 'FuncQueueObject');\" ascii fullword\n\tcondition:\n\t\tall of ($s*)\n}\n\nrule Pastebin_Webshell {\n\tmeta:\n\t\tdescription = \"Detects a web shell that downloads content from pastebin.com http://goo.gl/7dbyZs\"\n\t\tauthor = \"Florian Roth\"\n\t\tscore = 70\n\t\tdate = \"13.01.2015\"\n\t\treference = \"http://goo.gl/7dbyZs\"\n\tstrings:\n\t\t$s0 = \"file_get_contents(\\\"http://pastebin.com\" ascii\n\t\t$s1 = \"xcurl('http://pastebin.com/download.php\" ascii\n\t\t$s2 = \"xcurl('http://pastebin.com/raw.php\" ascii\n\n\t\t$x0 = \"if($content){unlink('evex.php');\" ascii\n\t\t$x1 = \"$fh2 = fopen(\\\"evex.php\\\", 'a');\" ascii\n\n\t\t$y0 = \"file_put_contents($pth\" ascii\n\t\t$y1 = \"echo \\\"<login_ok>\" ascii\n\t\t$y2 = \"str_replace('* @package Wordpress',$temp\" ascii\n\tcondition:\n\t\t1 of ($s*) or all of ($x*) or all of ($y*)\n}\n\nrule ASPXspy2 {\n\tmeta:\n\t\tdescription = \"Web shell - file ASPXspy2.aspx\"\n\t\tauthor = \"Florian Roth\"\n\t\treference = \"not set\"\n\t\tdate = \"2015/01/24\"\n\t\thash = \"5642387d92139bfe9ae11bfef6bfe0081dcea197\"\n\tstrings:\n\t\t$s0 = \"string iVDT=\\\"-SETUSERSETUP\\\\r\\\\n-IP=0.0.0.0\\\\r\\\\n-PortNo=52521\\\\r\\\\n-User=bin\" ascii\n\t\t$s1 = \"SQLExec : <asp:DropDownList runat=\\\"server\\\" ID=\\\"FGEy\\\" AutoPostBack=\\\"True\\\" O\" ascii\n\t\t$s3 = \"Process[] p=Process.GetProcesses();\" fullword ascii\n\t\t$s4 = \"Response.Cookies.Add(new HttpCookie(vbhLn,Password));\" fullword ascii\n\t\t$s5 = \"[DllImport(\\\"kernel32.dll\\\",EntryPoint=\\\"GetDriveTypeA\\\")]\" fullword ascii\n\t\t$s6 = \"<p>ConnString : <asp:TextBox id=\\\"MasR\\\" style=\\\"width:70%;margin:0 8px;\\\" CssCl\" ascii\n\t\t$s7 = \"ServiceController[] kQmRu=System.ServiceProcess.ServiceController.GetServices();\" fullword ascii\n\t\t$s8 = \"Copyright &copy; 2009 Bin -- <a href=\\\"http://www.rootkit.net.cn\\\" target=\\\"_bla\" ascii\n\t\t$s10 = \"Response.AddHeader(\\\"Content-Disposition\\\",\\\"attachment;filename=\\\"+HttpUtility.\" ascii\n\t\t$s11 = \"nxeDR.Command+=new CommandEventHandler(this.iVk);\" fullword ascii\n\t\t$s12 = \"<%@ import Namespace=\\\"System.ServiceProcess\\\"%>\" fullword ascii\n\t\t$s13 = \"foreach(string innerSubKey in sk.GetSubKeyNames())\" fullword ascii\n\t\t$s17 = \"Response.Redirect(\\\"http://www.rootkit.net.cn\\\");\" fullword ascii\n\t\t$s20 = \"else if(Reg_Path.StartsWith(\\\"HKEY_USERS\\\"))\" fullword ascii\n\tcondition:\n\t\t6 of them\n}\n\n\n/*\n\tYara Rule Set\n\tAuthor: Florian Roth\n\tDate: 2016-01-11\n\tIdentifier: Web Shell Repo\n\tReference: https://github.com/nikicat/web-malware-collection\n*/\n\nrule Webshell_27_9_c66_c99 {\n\tmeta:\n\t\tdescription = \"Detects Webshell - rule generated from from files 27.9.txt, c66.php, c99-shadows-mod.php, c99.php ...\"\n\t\tauthor = \"Florian Roth\"\n\t\treference = \"https://github.com/nikicat/web-malware-collection\"\n\t\tdate = \"2016-01-11\"\n\t\tscore = 70\n\t\thash1 = \"2b8aed49f50acd0c1b89a399647e1218f2a8545da96631ac0882da28810eecc4\"\n\t\thash2 = \"5d7709a33879d1060a6cff5bae119de7d5a3c17f65415822fd125af56696778c\"\n\t\thash3 = \"c377f9316a4c953602879eb8af1fd7cbb0dd35de6bb4747fa911234082c45596\"\n\t\thash4 = \"80ec7831ae888d5603ed28d81225ed8b256c831077bb8feb235e0a1a9b68b748\"\n\t\thash5 = \"6ce99e07aa98ba6dc521c34cf16fbd89654d0ba59194878dffca857a4c34e57b\"\n\t\thash6 = \"383d771b55bbe5343bab946fd7650fd42de1933c4c8f32449d9a40c898444ef1\"\n\t\thash7 = \"07f9ec716fb199e00a90091ffba4c2ee1a328a093a64e610e51ab9dd6d33357a\"\n\t\thash8 = \"615e768522447558970c725909e064558f33d38e6402c63c92a1a8bc62b64966\"\n\t\thash9 = \"ef3a7cd233a880fc61efc3884f127dd8944808babd1203be2400144119b6057f\"\n\t\thash10 = \"a4db77895228f02ea17ff48976e03100ddfaef7c9f48c1d40462872f103451d5\"\n\tstrings:\n\t\t$s4 = \"if (!empty($unset_surl)) {setcookie(\\\"c99sh_surl\\\"); $surl = \\\"\\\";}\" fullword ascii\n\t\t$s6 = \"@extract($_REQUEST[\\\"c99shcook\\\"]);\" fullword ascii\n\t\t$s7 = \"if (!function_exists(\\\"c99_buff_prepare\\\"))\" fullword ascii\n\tcondition:\n\t\tfilesize < 685KB and 1 of them\n}\n\nrule Webshell_acid_AntiSecShell_3 {\n\tmeta:\n\t\tdescription = \"Detects Webshell Acid\"\n\t\tauthor = \"Florian Roth\"\n\t\treference = \"https://github.com/nikicat/web-malware-collection\"\n\t\tdate = \"2016-01-11\"\n\t\tscore = 70\n\t\thash1 = \"2b8aed49f50acd0c1b89a399647e1218f2a8545da96631ac0882da28810eecc4\"\n\t\thash2 = \"7a69466dbd18182ce7da5d9d1a9447228dcebd365e0fe855d0e02024f4117549\"\n\t\thash3 = \"0202f72b3e8b62e5ebc99164c7d4eb8ec5be6a7527286e9059184aa8321e0092\"\n\t\thash4 = \"d4424c61fe29d2ee3d8503f7d65feb48341ac2fc0049119f83074950e41194d5\"\n\t\thash5 = \"5d7709a33879d1060a6cff5bae119de7d5a3c17f65415822fd125af56696778c\"\n\t\thash6 = \"21dd06ec423f0b49732e4289222864dcc055967922d0fcec901d38a57ed77f06\"\n\t\thash7 = \"c377f9316a4c953602879eb8af1fd7cbb0dd35de6bb4747fa911234082c45596\"\n\t\thash8 = \"816e699014be9a6d02d5d184eb958c49469d687b7c6fb88e878bca64688a19c9\"\n\t\thash9 = \"383d771b55bbe5343bab946fd7650fd42de1933c4c8f32449d9a40c898444ef1\"\n\t\thash10 = \"07f9ec716fb199e00a90091ffba4c2ee1a328a093a64e610e51ab9dd6d33357a\"\n\t\thash11 = \"615e768522447558970c725909e064558f33d38e6402c63c92a1a8bc62b64966\"\n\t\thash12 = \"bbe0f7278041cb3a6338844aa12c3df6b700a12a78b0a58bce3dce14f1c37b96\"\n\t\thash13 = \"d0edca7539ef2d30f0b3189b21a779c95b5815c1637829b5594e2601e77cb4dc\"\n\t\thash14 = \"65e7edf10ffb355bed81b7413c77d13d592f63d39e95948cdaea4ea0a376d791\"\n\t\thash15 = \"ef3a7cd233a880fc61efc3884f127dd8944808babd1203be2400144119b6057f\"\n\t\thash16 = \"ba87d26340f799e65c771ccb940081838afe318ecb20ee543f32d32db8533e7f\"\n\t\thash17 = \"a4db77895228f02ea17ff48976e03100ddfaef7c9f48c1d40462872f103451d5\"\n\t\thash18 = \"1fdf6e142135a34ae1caf1d84adf5e273b253ca46c409b2530ca06d65a55ecbd\"\n\tstrings:\n\t\t$s0 = \"echo \\\"<option value=delete\\\".($dspact == \\\"delete\\\"?\\\" selected\\\":\\\"\\\").\\\">Delete</option>\\\";\" fullword ascii\n\t\t$s1 = \"if (!is_readable($o)) {return \\\"<font color=red>\\\".view_perms(fileperms($o)).\\\"</font>\\\";}\" fullword ascii\n\tcondition:\n\t\tfilesize < 900KB and all of them\n}\n\nrule Webshell_c99_4 {\n\tmeta:\n\t\tdescription = \"Detects C99 Webshell\"\n\t\tauthor = \"Florian Roth\"\n\t\treference = \"https://github.com/nikicat/web-malware-collection\"\n\t\tdate = \"2016-01-11\"\n\t\tscore = 70\n\t\thash1 = \"2b8aed49f50acd0c1b89a399647e1218f2a8545da96631ac0882da28810eecc4\"\n\t\thash2 = \"0202f72b3e8b62e5ebc99164c7d4eb8ec5be6a7527286e9059184aa8321e0092\"\n\t\thash3 = \"d4424c61fe29d2ee3d8503f7d65feb48341ac2fc0049119f83074950e41194d5\"\n\t\thash4 = \"5d7709a33879d1060a6cff5bae119de7d5a3c17f65415822fd125af56696778c\"\n\t\thash5 = \"21dd06ec423f0b49732e4289222864dcc055967922d0fcec901d38a57ed77f06\"\n\t\thash6 = \"c377f9316a4c953602879eb8af1fd7cbb0dd35de6bb4747fa911234082c45596\"\n\t\thash7 = \"816e699014be9a6d02d5d184eb958c49469d687b7c6fb88e878bca64688a19c9\"\n\t\thash8 = \"383d771b55bbe5343bab946fd7650fd42de1933c4c8f32449d9a40c898444ef1\"\n\t\thash9 = \"07f9ec716fb199e00a90091ffba4c2ee1a328a093a64e610e51ab9dd6d33357a\"\n\t\thash10 = \"615e768522447558970c725909e064558f33d38e6402c63c92a1a8bc62b64966\"\n\t\thash11 = \"bbe0f7278041cb3a6338844aa12c3df6b700a12a78b0a58bce3dce14f1c37b96\"\n\t\thash12 = \"ef3a7cd233a880fc61efc3884f127dd8944808babd1203be2400144119b6057f\"\n\t\thash13 = \"a4db77895228f02ea17ff48976e03100ddfaef7c9f48c1d40462872f103451d5\"\n\t\thash14 = \"1fdf6e142135a34ae1caf1d84adf5e273b253ca46c409b2530ca06d65a55ecbd\"\n\tstrings:\n\t\t$s1 = \"displaysecinfo(\\\"List of Attributes\\\",myshellexec(\\\"lsattr -a\\\"));\" fullword ascii\n\t\t$s2 = \"displaysecinfo(\\\"RAM\\\",myshellexec(\\\"free -m\\\"));\" fullword ascii\n\t\t$s3 = \"displaysecinfo(\\\"Where is perl?\\\",myshellexec(\\\"whereis perl\\\"));\" fullword ascii\n\t\t$s4 = \"$ret = myshellexec($handler);\" fullword ascii\n\t\t$s5 = \"if (posix_kill($pid,$sig)) {echo \\\"OK.\\\";}\" fullword ascii\n\tcondition:\n\t\tfilesize < 900KB and 1 of them\n}\n\nrule Webshell_r57shell_2 {\n\tmeta:\n\t\tdescription = \"Detects Webshell R57\"\n\t\tauthor = \"Florian Roth\"\n\t\treference = \"https://github.com/nikicat/web-malware-collection\"\n\t\tdate = \"2016-01-11\"\n\t\tscore = 70\n\t\thash1 = \"e46777e5f1ac1652db3ce72dd0a2475ea515b37a737fffd743126772525a47e6\"\n\t\thash2 = \"aa957ca4154b7816093d667873cf6bdaded03f820e84d8f1cd5ad75296dd5d4d\"\n\t\thash3 = \"aa957ca4154b7816093d667873cf6bdaded03f820e84d8f1cd5ad75296dd5d4d\"\n\t\thash4 = \"756b788401aad4bfd4dbafd15c382d98e3ba079390addb5b0cea7ff7f985f881\"\n\t\thash5 = \"756b788401aad4bfd4dbafd15c382d98e3ba079390addb5b0cea7ff7f985f881\"\n\t\thash6 = \"16b6ec4b80f404f4616e44d8c21978dcdad9f52c84d23ba27660ee8e00984ff2\"\n\t\thash7 = \"59105e4623433d5bf93b9e17d72a43a40a4d8ac99e4a703f1d8851ad1276cd88\"\n\t\thash8 = \"1db0549066f294f814ec14ba4e9f63d88c4460d68477e5895236173df437d2b8\"\n\t\thash9 = \"c6a5148c81411ec9200810619fa5eec6616800a4d76c988431c272bc8679254f\"\n\t\thash10 = \"c6a5148c81411ec9200810619fa5eec6616800a4d76c988431c272bc8679254f\"\n\t\thash11 = \"59ea6cf16ea06ff47cf0e6a398df2eaec4d329707b8c3201fc63cbf0b7c85519\"\n\t\thash12 = \"0e0227a0001b38fb59fc07749e80c9d298ff0e6aca126ea8f4ea68ebc9a3661f\"\n\t\thash13 = \"ef74644065925aa8d64913f5f124fe73d8d289d5f019a104bf5f56689f49ba92\"\n\tstrings:\n\t\t$s1 = \"$connection = @ftp_connect($ftp_server,$ftp_port,10);\" fullword ascii\n\t\t$s2 = \"echo $lang[$language.'_text98'].$suc.\\\"\\\\r\\\\n\\\";\" fullword ascii\n\tcondition:\n\t\tfilesize < 900KB and all of them\n}\n\nrule Webshell_27_9_acid_c99_locus7s {\n\tmeta:\n\t\tdescription = \"Detects Webshell - rule generated from from files 27.9.txt, acid.php, c99_locus7s.txt\"\n\t\tauthor = \"Florian Roth\"\n\t\treference = \"https://github.com/nikicat/web-malware-collection\"\n\t\tdate = \"2016-01-11\"\n\t\tscore = 70\n\t\thash1 = \"2b8aed49f50acd0c1b89a399647e1218f2a8545da96631ac0882da28810eecc4\"\n\t\thash2 = \"7a69466dbd18182ce7da5d9d1a9447228dcebd365e0fe855d0e02024f4117549\"\n\t\thash3 = \"960feb502f913adff6b322bc9815543e5888bbf9058ba0eb46ceb1773ea67668\"\n\t\thash4 = \"07f9ec716fb199e00a90091ffba4c2ee1a328a093a64e610e51ab9dd6d33357a\"\n\t\thash5 = \"bbe0f7278041cb3a6338844aa12c3df6b700a12a78b0a58bce3dce14f1c37b96\"\n\t\thash6 = \"5ae121f868555fba112ca2b1a9729d4414e795c39d14af9e599ce1f0e4e445d3\"\n\t\thash7 = \"ef3a7cd233a880fc61efc3884f127dd8944808babd1203be2400144119b6057f\"\n\t\thash8 = \"ba87d26340f799e65c771ccb940081838afe318ecb20ee543f32d32db8533e7f\"\n\tstrings:\n\t\t$s0 = \"$blah = ex($p2.\\\" /tmp/back \\\".$_POST['backconnectip'].\\\" \\\".$_POST['backconnectport'].\\\" &\\\");\" fullword ascii\n\t\t$s1 = \"$_POST['backcconnmsge']=\\\"</br></br><b><font color=red size=3>Error:</font> Can't backdoor host!</b>\\\";\" fullword ascii\n\tcondition:\n\t\tfilesize < 1711KB and 1 of them\n}\n\nrule Webshell_Backdoor_PHP_Agent_r57_mod_bizzz_shell_r57 {\n\tmeta:\n\t\tdescription = \"Detects Webshell - rule generated from from files Backdoor.PHP.Agent.php, r57.mod-bizzz.shell.txt ...\"\n\t\tauthor = \"Florian Roth\"\n\t\treference = \"https://github.com/nikicat/web-malware-collection\"\n\t\tdate = \"2016-01-11\"\n\t\tscore = 70\n\t\thash1 = \"e46777e5f1ac1652db3ce72dd0a2475ea515b37a737fffd743126772525a47e6\"\n\t\thash2 = \"f51a5c5775d9cca0b137ddb28ff3831f4f394b7af6f6a868797b0df3dcdb01ba\"\n\t\thash3 = \"16b6ec4b80f404f4616e44d8c21978dcdad9f52c84d23ba27660ee8e00984ff2\"\n\t\thash4 = \"59105e4623433d5bf93b9e17d72a43a40a4d8ac99e4a703f1d8851ad1276cd88\"\n\t\thash5 = \"6dc417db9e07420a618d44217932ca8baf3541c08d5e68281e1be10af4280e4a\"\n\t\thash6 = \"5d07fdfee2dc6d81da26f05028f79badd10dec066909932129d398627b2f4e94\"\n\t\thash7 = \"1db0549066f294f814ec14ba4e9f63d88c4460d68477e5895236173df437d2b8\"\n\t\thash8 = \"c6a5148c81411ec9200810619fa5eec6616800a4d76c988431c272bc8679254f\"\n\t\thash9 = \"59ea6cf16ea06ff47cf0e6a398df2eaec4d329707b8c3201fc63cbf0b7c85519\"\n\t\thash10 = \"0e0227a0001b38fb59fc07749e80c9d298ff0e6aca126ea8f4ea68ebc9a3661f\"\n\t\thash11 = \"ef74644065925aa8d64913f5f124fe73d8d289d5f019a104bf5f56689f49ba92\"\n\tstrings:\n\t\t$s1 = \"$_POST['cmd'] = which('\" ascii\n\t\t$s2 = \"$blah = ex(\" fullword ascii\n\tcondition:\n\t\tfilesize < 600KB and all of them\n}\n\nrule Webshell_c100 {\n\tmeta:\n\t\tdescription = \"Detects Webshell - rule generated from from files c100 v. 777shell\"\n\t\tauthor = \"Florian Roth\"\n\t\treference = \"https://github.com/nikicat/web-malware-collection\"\n\t\tdate = \"2016-01-11\"\n\t\tscore = 70\n\t\thash1 = \"0202f72b3e8b62e5ebc99164c7d4eb8ec5be6a7527286e9059184aa8321e0092\"\n\t\thash2 = \"d4424c61fe29d2ee3d8503f7d65feb48341ac2fc0049119f83074950e41194d5\"\n\t\thash3 = \"21dd06ec423f0b49732e4289222864dcc055967922d0fcec901d38a57ed77f06\"\n\t\thash4 = \"c377f9316a4c953602879eb8af1fd7cbb0dd35de6bb4747fa911234082c45596\"\n\t\thash5 = \"816e699014be9a6d02d5d184eb958c49469d687b7c6fb88e878bca64688a19c9\"\n\t\thash6 = \"bbe0f7278041cb3a6338844aa12c3df6b700a12a78b0a58bce3dce14f1c37b96\"\n\t\thash7 = \"ef3a7cd233a880fc61efc3884f127dd8944808babd1203be2400144119b6057f\"\n\tstrings:\n\t\t$s0 = \"<OPTION VALUE=\\\"wget http://ftp.powernet.com.tr/supermail/debug/k3\\\">Kernel attack (Krad.c) PT1 (If wget installed)\" fullword ascii\n\t\t$s1 = \"<center>Kernel Info: <form name=\\\"form1\\\" method=\\\"post\\\" action=\\\"http://google.com/search\\\">\" fullword ascii\n\t\t$s3 = \"cut -d: -f1,2,3 /etc/passwd | grep ::\" ascii\n\t\t$s4 = \"which wget curl w3m lynx\" ascii\n\t\t$s6 = \"netstat -atup | grep IST\"  ascii\n\tcondition:\n\t\tfilesize < 685KB and 2 of them\n}\n\nrule Webshell_AcidPoison {\n\tmeta:\n\t\tdescription = \"Detects Poison Sh3ll - Webshell\"\n\t\tauthor = \"Florian Roth\"\n\t\treference = \"https://github.com/nikicat/web-malware-collection\"\n\t\tdate = \"2016-01-11\"\n\t\tscore = 70\n\t\thash1 = \"7a69466dbd18182ce7da5d9d1a9447228dcebd365e0fe855d0e02024f4117549\"\n\t\thash2 = \"7a69466dbd18182ce7da5d9d1a9447228dcebd365e0fe855d0e02024f4117549\"\n\t\thash3 = \"d0edca7539ef2d30f0b3189b21a779c95b5815c1637829b5594e2601e77cb4dc\"\n\t\thash4 = \"d0edca7539ef2d30f0b3189b21a779c95b5815c1637829b5594e2601e77cb4dc\"\n\t\thash5 = \"65e7edf10ffb355bed81b7413c77d13d592f63d39e95948cdaea4ea0a376d791\"\n\t\thash6 = \"65e7edf10ffb355bed81b7413c77d13d592f63d39e95948cdaea4ea0a376d791\"\n\t\thash7 = \"be541cf880a8e389a0767b85f1686443f35b508d1975ee25e1ce3f08fa32cfb5\"\n\t\thash8 = \"be541cf880a8e389a0767b85f1686443f35b508d1975ee25e1ce3f08fa32cfb5\"\n\t\thash9 = \"ba87d26340f799e65c771ccb940081838afe318ecb20ee543f32d32db8533e7f\"\n\t\thash10 = \"ba87d26340f799e65c771ccb940081838afe318ecb20ee543f32d32db8533e7f\"\n\tstrings:\n\t\t$s1 = \"elseif ( enabled(\\\"exec\\\") ) { exec($cmd,$o); $output = join(\\\"\\\\r\\\\n\\\",$o); }\" fullword ascii\n\tcondition:\n\t\tfilesize < 550KB and all of them\n}\n\nrule Webshell_acid_FaTaLisTiCz_Fx_fx_p0isoN_sh3ll_x0rg_byp4ss_256 {\n\tmeta:\n\t\tdescription = \"Detects Webshell - rule generated from from files acid.php, FaTaLisTiCz_Fx.txt, fx.txt, p0isoN.sh3ll.txt, x0rg.byp4ss.txt\"\n\t\tauthor = \"Florian Roth\"\n\t\treference = \"https://github.com/nikicat/web-malware-collection\"\n\t\tdate = \"2016-01-11\"\n\t\tscore = 70\n\t\thash1 = \"7a69466dbd18182ce7da5d9d1a9447228dcebd365e0fe855d0e02024f4117549\"\n\t\thash2 = \"d0edca7539ef2d30f0b3189b21a779c95b5815c1637829b5594e2601e77cb4dc\"\n\t\thash3 = \"65e7edf10ffb355bed81b7413c77d13d592f63d39e95948cdaea4ea0a376d791\"\n\t\thash4 = \"ba87d26340f799e65c771ccb940081838afe318ecb20ee543f32d32db8533e7f\"\n\t\thash5 = \"1fdf6e142135a34ae1caf1d84adf5e273b253ca46c409b2530ca06d65a55ecbd\"\n\tstrings:\n\t\t$s0 = \"<form method=\\\"POST\\\"><input type=hidden name=act value=\\\"ls\\\">\" fullword ascii\n\t\t$s2 = \"foreach($quicklaunch2 as $item) {\" fullword ascii\n\tcondition:\n\t\tfilesize < 882KB and all of them\n}\n\nrule Webshell_Ayyildiz {\n\tmeta:\n\t\tdescription = \"Detects Webshell - rule generated from from files Ayyildiz Tim  -AYT- Shell v 2.1 Biz.txt, Macker's Private PHPShell.php, matamu.txt, myshell.txt, PHP Shell.txt\"\n\t\tauthor = \"Florian Roth\"\n\t\treference = \"https://github.com/nikicat/web-malware-collection\"\n\t\tdate = \"2016-01-11\"\n\t\tscore = 70\n\t\thash1 = \"0e25aec0a9131e8c7bd7d5004c5c5ffad0e3297f386675bccc07f6ea527dded5\"\n\t\thash2 = \"9c43aada0d5429f8c47595f79a7cdd5d4eb2ba5c559fb5da5a518a6c8c7c330a\"\n\t\thash3 = \"2ebf3e5f5dde4a27bbd60e15c464e08245a35d15cc370b4be6b011aa7a46eaca\"\n\t\thash4 = \"77a63b26f52ba341dd2f5e8bbf5daf05ebbdef6b3f7e81cec44ce97680e820f9\"\n\t\thash5 = \"61c4fcb6e788c0dffcf0b672ae42b1676f8a9beaa6ec7453fc59ad821a4a8127\"\n\tstrings:\n\t\t$s0 = \"echo \\\"<option value=\\\\\\\"\\\". strrev(substr(strstr(strrev($work_dir), \\\"/\\\"), 1)) .\\\"\\\\\\\">Parent Directory</option>\\\\n\\\";\" fullword ascii\n\t\t$s1 = \"echo \\\"<option value=\\\\\\\"$work_dir\\\\\\\" selected>Current Directory</option>\\\\n\\\";\" fullword ascii\n\tcondition:\n\t\tfilesize < 112KB and all of them\n}\n\nrule Webshell_zehir {\n\tmeta:\n\t\tdescription = \"Detects Webshell - rule generated from from files elmaliseker.asp, zehir.asp, zehir.txt, zehir4.asp, zehir4.txt\"\n\t\tauthor = \"Florian Roth\"\n\t\treference = \"https://github.com/nikicat/web-malware-collection\"\n\t\tdate = \"2016-01-11\"\n\t\tscore = 70\n\t\thash1 = \"16e1e886576d0c70af0f96e3ccedfd2e72b8b7640f817c08a82b95ff5d4b1218\"\n\t\thash2 = \"0c5f8a2ed62d10986a2dd39f52886c0900a18c03d6d279207b8de8e2ed14adf6\"\n\t\thash3 = \"cb9d5427a83a0fc887e49f07f20849985bd2c3850f272ae1e059a08ac411ff66\"\n\t\thash4 = \"b57bf397984545f419045391b56dcaf7b0bed8b6ee331b5c46cee35c92ffa13d\"\n\t\thash5 = \"febf37a9e8ba8ece863f506ae32ad398115106cc849a9954cbc0277474cdba5c\"\n\tstrings:\n\t\t$s1 = \"for (i=1; i<=frmUpload.max.value; i++) str+='File '+i+': <input type=file name=file'+i+'><br>';\" fullword ascii\n\t\t$s2 = \"if (frmUpload.max.value<=0) frmUpload.max.value=1;\" fullword ascii\n\tcondition:\n\t\tfilesize < 200KB and 1 of them\n}\n"
  },
  {
    "path": "rules/xunjian.yar",
    "content": "/*\nshuoshuren\n2020.9.7\n*/\ninclude \"./malware/MALW_BackdoorSSH.yar\"\ninclude \"./malware/MALW_BlackRev.yar\"\ninclude \"./malware/MALW_PE_sections.yar\"\ninclude \"./webshells/WShell_APT_Laudanum.yar\"\ninclude \"./webshells/WShell_ASPXSpy.yar\"\ninclude \"./webshells/WShell_Drupalgeddon2_icos.yar\"\ninclude \"./webshells/WShell_PHP_Anuna.yar\"\ninclude \"./webshells/WShell_PHP_in_images.yar\"\ninclude \"./webshells/WShell_THOR_Webshells.yar\"\ninclude \"./utils/wget.yar\"\ninclude \"./malware/ddg.yar\"\ninclude \"./malware/h2miner.yar\"\ninclude \"./malware/lsdminer.yar\"\ninclude \"./malware/rainbowminer.yar\"\ninclude \"./malware/skipmap.yar\"\ninclude \"./malware/startminer.yar\"\ninclude \"./malware/sysupdataminer.yar\"\ninclude \"./malware/teamtnt.yar\"\ninclude \"./malware/watchbogminer.yar\"\n"
  },
  {
    "path": "whohk.py",
    "content": "# -*- coding:utf-8 -*- -\r\nimport os\r\nimport re\r\nimport time\r\nimport psutil\r\nimport yara\r\nimport sys\r\nimport socket\r\nimport struct\r\nimport prettytable as pt\r\nimport argparse\r\n\r\n\r\n# 检查是否root运行\r\ndef checkroot():\r\n    if os.popen(\"whoami\").read() != 'root\\n':\r\n        print('[\\033[1;33mwaring\\033[0m]检测到当前为非root权限，部分功能可能受限哦~')\r\n\r\ndef system_state():  # 系统状态\r\n    cpu = '{}{}'.format(str(psutil.cpu_percent(1)), '%')\r\n    mem = '{}{}'.format(str(psutil.virtual_memory()[2]), '%')\r\n    disk = '{}{}'.format(psutil.disk_usage('/')[3], '%')\r\n    login=os.popen(\"who\").read()\r\n    system_state = pt.PrettyTable()\r\n    system_state.field_names = ['CPU', 'MEM', 'DISK','ONLINE']\r\n    system_state.add_row([cpu, mem, disk,login.replace('    ',' ').replace('   ',' ')])\r\n    return system_state\r\n\r\n########查外连模块#############\r\nclass CzIp:  # 读取解析纯真IP数据库的类\r\n    def __init__(self, db_file='config/qqwry.dat'):\r\n        self.f_db = open(db_file, \"rb\")\r\n        bs = self.f_db.read(8)\r\n        (self.first_index, self.last_index) = struct.unpack('II', bs)\r\n        self.index_count = int((self.last_index - self.first_index) / 7 + 1)\r\n        self.cur_start_ip = None\r\n        self.cur_end_ip_offset = None\r\n        self.cur_end_ip = None\r\n\r\n    def _get_area_addr(self, offset=0):\r\n        if offset:\r\n            self.f_db.seek(offset)\r\n        bs = self.f_db.read(1)\r\n        (byte,) = struct.unpack('B', bs)\r\n        if byte == 0x01 or byte == 0x02:\r\n            p = self.getLong3()\r\n            if p:\r\n                return self.get_offset_string(p)\r\n            else:\r\n                return \"\"\r\n        else:\r\n            self.f_db.seek(-1, 1)\r\n            return self.get_offset_string(offset)\r\n\r\n    def _get_addr(self, offset):\r\n        '''\r\n        获取offset处记录区地址信息(包含国家和地区)\r\n        如果是中国ip，则是 \"xx省xx市 xxxxx地区\" 这样的形式\r\n        (比如:\"福建省 电信\", \"澳大利亚 墨尔本Goldenit有限公司\")\r\n        :param offset:\r\n        :return:str\r\n        '''\r\n        self.f_db.seek(offset + 4)\r\n        bs = self.f_db.read(1)\r\n        (byte,) = struct.unpack('B', bs)\r\n        if byte == 0x01:  # 重定向模式1\r\n            country_offset = self.getLong3()\r\n            self.f_db.seek(country_offset)\r\n            bs = self.f_db.read(1)\r\n            (b,) = struct.unpack('B', bs)\r\n            if b == 0x02:\r\n                country_addr = self.get_offset_string(self.getLong3())\r\n                self.f_db.seek(country_offset + 4)\r\n            else:\r\n                country_addr = self.get_offset_string(country_offset)\r\n            area_addr = self._get_area_addr()\r\n        elif byte == 0x02:  # 重定向模式2\r\n            country_addr = self.get_offset_string(self.getLong3())\r\n            area_addr = self._get_area_addr(offset + 8)\r\n        else:  # 字符串模式\r\n            country_addr = self.get_offset_string(offset + 4)\r\n            area_addr = self._get_area_addr()\r\n        return country_addr + \" \" + area_addr\r\n\r\n    def dump(self, first, last):\r\n        '''\r\n        打印数据库中索引为first到索引为last(不包含last)的记录\r\n        :param first:\r\n        :param last:\r\n        :return:\r\n        '''\r\n        if last > self.index_count:\r\n            last = self.index_count\r\n        for index in range(first, last):\r\n            offset = self.first_index + index * 7\r\n            self.f_db.seek(offset)\r\n            buf = self.f_db.read(7)\r\n            (ip, of1, of2) = struct.unpack(\"IHB\", buf)\r\n            address = self._get_addr(of1 + (of2 << 16))\r\n\r\n    def _set_ip_range(self, index):\r\n        offset = self.first_index + index * 7\r\n        self.f_db.seek(offset)\r\n        buf = self.f_db.read(7)\r\n        (self.cur_start_ip, of1, of2) = struct.unpack(\"IHB\", buf)\r\n        self.cur_end_ip_offset = of1 + (of2 << 16)\r\n        self.f_db.seek(self.cur_end_ip_offset)\r\n        buf = self.f_db.read(4)\r\n        (self.cur_end_ip,) = struct.unpack(\"I\", buf)\r\n\r\n    def get_addr_by_ip(self, ip):\r\n        '''\r\n        通过ip查找其地址\r\n        :param ip: (int or str)\r\n        :return: str\r\n        '''\r\n        if type(ip) == str:\r\n            ip = self.str2ip(ip)\r\n        L = 0\r\n        R = self.index_count - 1\r\n        while L < R - 1:\r\n            M = int((L + R) / 2)\r\n            self._set_ip_range(M)\r\n            if ip == self.cur_start_ip:\r\n                L = M\r\n                break\r\n            if ip > self.cur_start_ip:\r\n                L = M\r\n            else:\r\n                R = M\r\n        self._set_ip_range(L)\r\n        # version information, 255.255.255.X, urgy but useful\r\n        if ip & 0xffffff00 == 0xffffff00:\r\n            self._set_ip_range(R)\r\n        if self.cur_start_ip <= ip <= self.cur_end_ip:\r\n            address = self._get_addr(self.cur_end_ip_offset)\r\n        else:\r\n            address = \"未找到该IP的地址\"\r\n        return address\r\n\r\n    def get_ip_range(self, ip):\r\n        '''\r\n        返回ip所在记录的IP段\r\n        :param ip: ip(str or int)\r\n        :return: str\r\n        '''\r\n        if type(ip) == str:\r\n            ip = self.str2ip(ip)\r\n        self.get_addr_by_ip(ip)\r\n        range = self.ip2str(self.cur_start_ip) + ' - ' \\\r\n                + self.ip2str(self.cur_end_ip)\r\n        return range\r\n\r\n    def get_offset_string(self, offset=0):\r\n        '''\r\n        获取文件偏移处的字符串(以'\\0'结尾)\r\n        :param offset: 偏移\r\n        :return: str\r\n        '''\r\n        if offset:\r\n            self.f_db.seek(offset)\r\n        bs = b''\r\n        ch = self.f_db.read(1)\r\n        (byte,) = struct.unpack('B', ch)\r\n        while byte != 0:\r\n            bs += ch\r\n            ch = self.f_db.read(1)\r\n            (byte,) = struct.unpack('B', ch)\r\n        return bs.decode('gbk')\r\n\r\n    def ip2str(self, ip):\r\n        '''\r\n        整数IP转化为IP字符串\r\n        :param ip:\r\n        :return:\r\n        '''\r\n        return str(ip >> 24) + '.' + str((ip >> 16) & 0xff) + '.' + str((ip >> 8) & 0xff) + '.' + str(ip & 0xff)\r\n\r\n    def str2ip(self, s):\r\n        '''\r\n        IP字符串转换为整数IP\r\n        :param s:\r\n        :return:\r\n        '''\r\n        (ip,) = struct.unpack('I', socket.inet_aton(s))\r\n        return ((ip >> 24) & 0xff) | ((ip & 0xff) << 24) | ((ip >> 8) & 0xff00) | ((ip & 0xff00) << 8)\r\n\r\n    def getLong3(self, offset=0):\r\n        '''\r\n        3字节的数值\r\n        :param offset:\r\n        :return:\r\n        '''\r\n        if offset:\r\n            self.f_db.seek(offset)\r\n        bs = self.f_db.read(3)\r\n        (a, b) = struct.unpack('HB', bs)\r\n        return (b << 16) + a\r\n\r\n\r\ndef network():  # 获取对外网络连接情况\r\n    addr_list = str(psutil.net_connections()).split('sconn')\r\n    iptb = pt.PrettyTable()\r\n    iptb.field_names = ['进程名', 'IP', '端口', 'PID', '归属地址']\r\n    for addr in addr_list:\r\n        try:\r\n            if re.findall(r'raddr', addr) != []:  # 如果存在远程地址，就取出来\r\n                remote = addr.split('raddr')[-1]\r\n                local = addr.split('laddr')[-1]\r\n                ip = re.findall(r'ip=\\'(.+?)\\'', remote)[0]\r\n                port = re.findall(r'port=(.+?)\\)', local)[0]\r\n                pid = re.findall(r'pid=(.+?)\\)', remote)[0]\r\n                process = psutil.Process(int(pid)).name()\r\n                if ip != '127.0.0.1' and ip != '::1':\r\n                    IP_addr = CzIp().get_addr_by_ip(ip)\r\n                    iptb.add_row([process, ip, port, pid, IP_addr])\r\n        except:\r\n            pass\r\n    network = iptb\r\n    return network\r\n\r\n\r\n################日志分析模块#####################\r\ndef ostype():  # 判断系统类型和版本\r\n    try:\r\n        os_info = os.popen(\"cat /proc/version\").read()\r\n        sysnum = int(re.findall(r' (\\d+?)\\.', os_info, re.S)[0])  # 取出版本号\r\n        system = ''\r\n        try:\r\n            system = re.search('CentOS', os_info).group()\r\n        except:\r\n            pass\r\n        try:\r\n            system = re.search('Ubuntu', os_info).group()\r\n        except:\r\n            pass\r\n        try:\r\n            system = re.search('openSUSE', os_info).group()\r\n        except:\r\n            pass\r\n        try:\r\n            system = re.search('Red Hat', os_info).group()\r\n        except:\r\n            pass\r\n        try:\r\n            system = re.search('Debian', os_info).group()\r\n        except:\r\n            pass\r\n    except:\r\n        print('\\033[1;33m提示：系统类型获取失败，请手动输入系统类型和版本号\\033[0m')\r\n        print(\"\\033[1;33m系统类型只能'CentOS'，'Ubuntu'，'openSUSE'，'Red Hat'，'Debian' 其中一个，注意空格和大小写，输入其他无效\\033[0m\")\r\n        print(\"\\033[1;33m版本号请输入整数，如：6\\033[0m\")\r\n        system = input('系统类型：')\r\n        sysnum = int(input('版本号：'))\r\n    return system, sysnum\r\n\r\n\r\ndef pid_fileinfo(pid):  # 根据pid获取进程路径等信息\r\n    fileinfo = os.popen(\"ls -all /proc/{} |grep \\\"exe ->\\\"\".format(pid)).read()\r\n    return fileinfo\r\n\r\ndef log_burp_ip(system):  # 定位有哪些IP在爆破\r\n    burp_ip = \"\"\r\n    if system == 'CentOS' or system == 'Red Hat':\r\n        burp_ip = os.popen(\r\n            \"grep \\\"Failed\\\" /var/log/secure*|grep -E -o \\\"(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\\.(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\\.(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\\.(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\\\"|uniq -c\").read()\r\n    elif system == 'Ubuntu' or system == 'Debian':\r\n        burp_ip = os.popen(\r\n            \"grep \\\"Failed\\\" /var/log/auth.log*|grep -E -o \\\"(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\\.(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\\.(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\\.(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\\\"|uniq -c\").read()\r\n    elif system == 'openSUSE':\r\n        burp_ip = os.popen(\r\n            \"grep \\\"Failed\\\" /var/log/messages*|grep -E -o \\\"(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\\.(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\\.(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\\.(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\\\"|uniq -c\").read()\r\n    return burp_ip\r\n\r\n\r\ndef log_burp_user(system):  # 被爆破用户名是什么\r\n    burp_user = ''\r\n    if system == 'CentOS' or system == 'Red Hat':\r\n        burp_user = os.popen(\r\n            \"grep \\\"Failed\\\" /var/log/secure*|perl -e 'while($_=<>){ /for(.*?) from/; print \\\"$1\\n\\\";}'|uniq -c|sort -nr\").read()\r\n    elif system == 'Ubuntu' or system == 'Debian':\r\n        burp_user = os.popen(\r\n            \"grep \\\"Failed\\\" /var/log/auth.log*|perl -e 'while($_=<>){ /for(.*?) from/; print \\\"$1\\n\\\";}'|uniq -c|sort -nr\").read()\r\n    elif system == 'openSUSE':\r\n        burp_user = os.popen(\r\n            \"grep \\\"Failed\\\" /var/log/messages*|perl -e 'while($_=<>){ /for(.*?) from/; print \\\"$1\\n\\\";}'|uniq -c|sort -nr\").read()\r\n    return burp_user\r\n\r\n\r\ndef log_success_ip(system):  # 登录成功的 IP 有哪些\r\n    success_ip = ''\r\n    if system == 'CentOS' or system == 'Red Hat':\r\n        success_ip = os.popen(\r\n            \"grep \\\"Accepted \\\" /var/log/secure* | awk '{print $11}' | sort | uniq -c | sort -nr | more\").read()\r\n    elif system == 'Ubuntu' or system == 'Debian':\r\n        success_ip = os.popen(\r\n            \"grep \\\"Accepted \\\" /var/log/auth.log* | awk '{print $11}' | sort | uniq -c | sort -nr | more\").read()\r\n    elif system == 'openSUSE':\r\n        success_ip = os.popen(\r\n            \"grep \\\"Accepted \\\" /var/log/messages* | awk '{print $11}' | sort | uniq -c | sort -nr | more\").read()\r\n    return success_ip\r\n\r\n\r\ndef log_success_info(system):  # 登录成功的日期、用户名、IP\r\n    success_info = ''\r\n    if system == 'CentOS' or system == 'Red Hat':\r\n        success_info = os.popen(\"grep \\\"Accepted \\\" /var/log/secure* | awk '{print $1,$2,$3,$9,$11}'\").read()\r\n    elif system == 'Ubuntu' or system == 'Debian':\r\n        success_info = os.popen(\"grep \\\"Accepted \\\" /var/log/auth.log* | awk '{print $1,$2,$3,$9,$11}'\").read()\r\n    elif system == 'openSUSE':\r\n        success_info = os.popen(\"grep \\\"Accepted \\\" /var/log/messages* | awk '{print $1,$2,$3,$9,$11}'\").read()\r\n    return success_info\r\n\r\n\r\ndef cron():  # 所有用户的定时任务\r\n    cmd = os.popen(\"cd /var/spool/cron && ls\").read()  # 直接到定时任务保存的位置看有没有\r\n    timingtask_list = re.split(r'\\n', cmd)\r\n    del (timingtask_list[-1])  # 删除最后一个空值\r\n    if timingtask_list != []:\r\n        all_timingtask = ''\r\n        for user in timingtask_list:\r\n            path = \"cat /var/spool/cron/{0}\".format(user)\r\n            info = os.popen(path).read()\r\n            timingtask = '\\033[1;33m用户【{0}】的定时任务有：\\033[0m\\n{1}\\n'.format(user, info)\r\n            all_timingtask = all_timingtask + timingtask\r\n    else:\r\n        all_timingtask = '\\033[1;33m没有定时任务\\033[0m'\r\n    return all_timingtask\r\n\r\n\r\ndef cron_file(day):  # 按时间检查crontab文件或脚本\r\n    cron.d = os.popen(\"find /etc/cron.d/ -mtime -{}\".format(day)).read()\r\n    cron.hourly = os.popen(\"find /etc/cron.hourly/ -mtime -{}\".format(day)).read()\r\n    cron.daily = os.popen(\"find /etc/cron.daily/ -mtime -{}\".format(day)).read()\r\n    cron.weekly = os.popen(\"find /etc/cron.weekly/ -mtime -{}\".format(day)).read()\r\n    cron.monthly = os.popen(\"find /etc/cron.monthly/ -mtime -{}\".format(day)).read()\r\n    cron_file_output = \"\\033[1;33m------------------------------/etc/cron.d/-------------------------------\\033[0m\\n{}\\n\\033[1;33m---------------------------/etc/cron.hourly/-----------------------------\\033[0m\\n{}\\n\\033[1;33m----------------------------/etc/cron.daily/-----------------------------\\033[0m\\n{}\\n\\033[1;33m---------------------------/etc/cron.weekly/-----------------------------\\033[0m\\n{}\\n\\033[1;33m---------------------------/etc/cron.monthly/----------------------------\\033[0m\\n{}\\n\".format(\r\n        cron.d, cron.hourly, cron.daily, cron.weekly, cron.monthly)\r\n    return cron_file_output\r\n\r\n\r\ndef starup(day):  # 按检查启动项\r\n    rc_local = os.popen(\"cat /etc/rc.local\").read()\r\n    init_d = os.popen(\"find /etc/init.d/ -mtime -{}\".format(day)).read()\r\n    rc0_d = os.popen(\"find /etc/rc0.d/ -mtime -{}\".format(day)).read()\r\n    rc1_d = os.popen(\"find /etc/rc1.d/ -mtime -{}\".format(day)).read()\r\n    rc2_d = os.popen(\"find /etc/rc2.d/ -mtime -{}\".format(day)).read()\r\n    rc3_d = os.popen(\"find /etc/rc3.d/ -mtime -{}\".format(day)).read()\r\n    rc4_d = os.popen(\"find /etc/rc4.d/ -mtime -{}\".format(day)).read()\r\n    rc5_d = os.popen(\"find /etc/rc5.d/ -mtime -{}\".format(day)).read()\r\n    rc6_d = os.popen(\"find /etc/rc6.d/ -mtime -{}\".format(day)).read()\r\n    rc_d = os.popen(\"find /etc/init/rc.d/ -mtime -{}\".format(day)).read()\r\n    starup_output = \"\\033[1;33m------------------------------/etc/rc.local------------------------------\\033[0m\\n{}\\n\\033[1;33m-------------------------------/etc/init.d/------------------------------\\033[0m\\n{}\\n\\033[1;33m-------------------------------/etc/rc0.d/-------------------------------\\033[0m\\n{}\\n\\033[1;33m-------------------------------/etc/rc1.d/-------------------------------\\033[0m\\n{}\\n\\033[1;33m-------------------------------/etc/rc2.d/-------------------------------\\033[0m\\n{}\\n\\033[1;33m-------------------------------/etc/rc3.d/-------------------------------\\033[0m\\n{}\\n\\033[1;33m-------------------------------/etc/rc4.d/-------------------------------\\033[0m\\n{}\\n\\033[1;33m-------------------------------/etc/rc5.d/-------------------------------\\033[0m\\n{}\\n\\033[1;33m-------------------------------/etc/rc6.d/-------------------------------\\033[0m\\n{}\\n\\033[1;33m-----------------------------/etc/init/rc.d/-----------------------------\\033[0m\\n\".format(\r\n        rc_local, init_d, rc0_d, rc1_d, rc2_d, rc3_d, rc4_d, rc5_d, rc6_d, rc_d)\r\n    return starup_output\r\n\r\ndef osfile(day):#查看系统进程是否被劫持\r\n    osfile=os.popen(\"find /usr/bin/ /usr/sbin/ /bin/ /usr/local/bin/ -mtime -{}\".format(day)).read()\r\n    return osfile\r\n\r\ndef changefile(all):#查看系统中指定类型文件的修改\r\n    changefile=os.popen(\"find {} -mtime -{} -name \\\"*.{}\\\"\".format(all[0],all[1],all[2])).read()\r\n    return changefile\r\n\r\ndef permfile(all):#查看系统中指定权限的文件\r\n    permfile=os.popen(\"find {} -name \\\"*.{}\\\" -perm {}\".format(all[0],all[1],all[2])).read()\r\n    return permfile\r\n\r\ndef account_check():  # 检查账户情况\r\n    account_list = []\r\n    cmd = os.popen(\"cat /etc/passwd | grep '/bin/bash'\").read()\r\n    user_list = re.split(r'\\n', cmd)[:-1]\r\n    result=''\r\n    for i in user_list:\r\n        user=re.findall('(.+?):',i)[0]\r\n        account_list.append(user)\r\n        user_info=os.popen(\"chage --list {}\".format(user)).read().replace(' ','')\r\n        result+=\"\\033[1;33m可登录的账户：\\033[0m{0}\\n\\033[1;33m账户详情：\\033[0m\\n{1}\\n\".format(user,user_info)\r\n\r\n    anonymous_account = os.popen(\"awk -F: 'length($2)==0 {print $1}' /etc/shadow\").read()\r\n    account = '{0}\\n\\033[1;33m空口令用户：\\033[0m\\n{1}\\n'.format(result, anonymous_account)\r\n    return account_list,account\r\n\r\ndef history():\r\n    history=\"\"\r\n    user_list=account_check()[0]\r\n    try:\r\n        for user in user_list:\r\n            if user!='root':\r\n                minggan=os.popen(\"cat /home/{}/.bash_history |grep -E \\\"wget|curl|http|rsync|sftp|ssh|scp|rcp|python|java|chmod|ftp|bash｜zip|tar\\\"\".format(user)).read()\r\n                history+=\"\\033[1;33m{}用户下的敏感历史命令：\\033[0m\\n{}\\n\".format(user,minggan)\r\n            else:\r\n                minggan = os.popen(\"cat /root/.bash_history |grep -E \\\"wget|curl|http|rsync|sftp|ssh|scp|rcp|python|java|chmod|ftp|bash｜zip|tar\\\"\").read()\r\n                history += \"\\033[1;33m{}用户下的敏感历史命令：\\033[0m\\n{}\\n\".format(user, minggan)\r\n    except:\r\n        pass\r\n    return history\r\n\r\ndef webshell_scan(path):\r\n    webshell = pt.PrettyTable()\r\n    webshell.field_names = ['Path', 'LastChange']\r\n    webshell.align[\"Path\"] = \"l\"  # 路径字段靠右显示\r\n    rule = yara.compile(filepath=r'rules/webshell.yar')\r\n    print('\\033[1;34m读取待检测文件中...\\033[0m')\r\n    all = os.popen(\"find \" + path).read().split('\\n')\r\n    file_list = []  # 过滤后的文件列表\r\n    print('\\033[1;32m读取完毕，开始过滤...\\033[0m')\r\n    for file in all:  # 过滤掉部分文件\r\n        try:\r\n            fsize = os.path.getsize(file) / float(1024 * 1024)\r\n        except:\r\n            fsize = 6\r\n        if fsize <= 5:  # 只检测小于5M的文件\r\n            file_list.append(file)\r\n    print('\\033[1;32m过滤完毕，开始扫描...\\033[0m')\r\n    for i in range(len(file_list)):\r\n        sys.stdout.write('\\033[K' + '\\r')\r\n        print('\\r','[{0}/{1}]检测中,耐心等待哦~'.format(str(i), str(len(file_list))),end=' ')\r\n        try:\r\n            with open(file_list[i], 'rb') as f:\r\n                matches = rule.match(data=f.read())\r\n        except:\r\n            matches = []\r\n        try:\r\n            if matches != []:\r\n                time_chuo = time.localtime(os.path.getmtime(file_list[i]))  # 最后修改时间戳\r\n                lasttime = time.strftime(\"%Y--%m--%d %H:%M:%S\", time_chuo)  # 最后修改时间\r\n                warning = ('\\033[1;31m\\n告警：检测到标签{0}，文件位置{1}\\033[0m'.format(matches, file_list[i]))\r\n                webshell.add_row([file_list[i], lasttime])\r\n                print(warning)\r\n        except:\r\n            pass\r\n    print('\\033[1;32m\\n所有文件扫描完成，结果如下：\\n\\033[0m')\r\n    print(webshell)\r\n\r\ndef file_scan(path):\r\n    webshell = pt.PrettyTable()\r\n    webshell.field_names = ['Path', 'LastChange']\r\n    webshell.align[\"Path\"] = \"l\"  # 路径字段靠右显示\r\n    rule = yara.compile(filepath=r'rules/xunjian.yar')\r\n    print('\\033[1;34m读取待检测文件中...\\033[0m')\r\n    all = os.popen(\"find \" + path).read().split('\\n')\r\n    file_list = []  # 过滤后的文件列表\r\n    print('\\033[1;32m读取完毕，开始过滤...\\033[0m')\r\n    for file in all:  # 过滤掉部分文件\r\n        try:\r\n            fsize = os.path.getsize(file) / float(1024 * 1024)\r\n        except:\r\n            fsize = 6\r\n        if fsize <= 5:  # 只检测小于5M的文件\r\n            file_list.append(file)\r\n    print('\\033[1;32m过滤完毕，开始扫描...\\033[0m')\r\n    for i in range(len(file_list)):\r\n        sys.stdout.write('\\033[K' + '\\r')\r\n        print('\\r','[{0}/{1}]检测中,耐心等待哦~'.format(str(i), str(len(file_list))),end=' ')\r\n        try:\r\n            with open(file_list[i], 'rb') as f:\r\n                matches = rule.match(data=f.read())\r\n        except:\r\n            matches = []\r\n        try:\r\n            if matches != []:\r\n                time_chuo = time.localtime(os.path.getmtime(file_list[i]))  # 最后修改时间戳\r\n                lasttime = time.strftime(\"%Y--%m--%d %H:%M:%S\", time_chuo)  # 最后修改时间\r\n                warning = ('\\033[1;31m\\n告警：检测到标签{0}，文件位置{1}\\033[0m'.format(matches, file_list[i]))\r\n                webshell.add_row([file_list[i], lasttime])\r\n                print(warning)\r\n        except:\r\n            pass\r\n    print('\\033[1;32m\\n所有文件扫描完成，结果如下：\\n\\033[0m')\r\n    print(webshell)\r\n\r\n################################################\r\nparser = argparse.ArgumentParser(description='本工具可帮你快速定位很多关键问题，将化复杂繁琐的命令为简单。\\n应急响应工具为辅，但不要只依赖于工具哦')\r\nparser.add_argument(\"-user\", action='store_true',help='用于查看系统可登录账户和空口令账户（无参数）')\r\nparser.add_argument(\"-history\", action='store_true',help='用于查看所有用户的敏感历史命令（无参数）')\r\nparser.add_argument(\"-cron\", action='store_true',help='用于查看所有用户的定时任务（无参数）')\r\nparser.add_argument(\"-ip\", action='store_true',help='用于查看外连ip（无参数）')\r\nparser.add_argument(\"--pid\", type=str,metavar='1234',help='用于定位进程物理路径（参数为pid号）')\r\nparser.add_argument(\"--ssh-fip\", action='store_true',help='用于查看ssh登录失败的ip和次数（无参数）')\r\nparser.add_argument(\"--ssh-fuser\", action='store_true',help='用于查看ssh登录失败的用户和次数（无参数）')\r\nparser.add_argument(\"--ssh-sip\", action='store_true',help='用于查看ssh登录成功的ip和次数（无参数）')\r\nparser.add_argument(\"--ssh-sinfo\", action='store_true',help='用于查看ssh登录成功的用户详情（无参数）')\r\nparser.add_argument(\"--file-cron\", type=str,metavar='7',help='用于查看系统各个级别定时任务目录中，n天内被修改的文件（参数为天数）')\r\nparser.add_argument(\"--file-starup\", type=str,metavar='7',help='用于查看系统启动项目录中，n天内被修改的文件（参数为天数）')\r\nparser.add_argument(\"--file-os\", type=str,metavar='7',help='用于查看系统重要目录中，n天内被修改的文件（参数为天数）')\r\nparser.add_argument(\"--file-change\", nargs=3,metavar=('/www', '7', 'php'),help='用于查看在n天内指定目录中指定后缀的被修改的文件（参数为物理路径、天数、后缀）')\r\nparser.add_argument(\"--file-perm\", nargs=3,metavar=('/www', 'jsp', '777'),help='用于查看指定目录下指定后缀指定权限的文件（参数为物理路径、后缀、天数）')\r\nparser.add_argument(\"--s-backdoor\", type=str,metavar='/home',help='用于检测指定路径下的恶意样本（参数为物理路径）')\r\nparser.add_argument(\"--s-webshell\", type=str,metavar='/var/www',help='用于检测指定路径下的webshell（参数为物理路径）')\r\nargs = parser.parse_args()\r\n\r\n\r\nsys_tup = ostype()  # 判断系统类型\r\nsystem = sys_tup[0]\r\nsysnum = sys_tup[1]\r\n\r\nbanner = '''\\033[1;34m\r\n           ██╗    ██╗██╗  ██╗ ██████╗ ██████╗ ██╗  ██╗██╗  ██╗\r\n           ██║    ██║██║  ██║██╔═══██╗╚════██╗██║  ██║██║ ██╔╝\r\n           ██║ █╗ ██║███████║██║   ██║  ▄███╔╝███████║█████╔╝ \r\n           ██║███╗██║██╔══██║██║   ██║  ▀▀══╝ ██╔══██║██╔═██╗ \r\n           ╚███╔███╔╝██║  ██║╚██████╔╝  ██╗   ██║  ██║██║  ██╗\r\n            ╚══╝╚══╝ ╚═╝  ╚═╝ ╚═════╝   ╚═╝   ╚═╝  ╚═╝╚═╝  ╚═╝\r\n        \r\n           公众号：台下言书     作者：说书人     版本：v1.1\\033[0m\r\n           \r\n\\033[1;36m-------------------------------系统信息----------------------------------\\033[0m\r\n{}\r\n\\033[1;36m-------------------------------output------------------------------------\\033[0m\r\n'''.format(system_state())\r\nprint(banner)\r\ncheckroot()\r\n\r\nif args.ip:\r\n    print(network())\r\nelif args.pid:\r\n    print(pid_fileinfo(args.pid))\r\nelif args.ssh_fip:\r\n    print(log_burp_ip(system))\r\nelif args.ssh_fuser:\r\n    print(log_burp_user(system))\r\nelif args.ssh_sip:\r\n    print(log_success_ip(system))\r\nelif args.ssh_sinfo:\r\n    print(log_success_info(system))\r\nelif args.cron:\r\n    print(cron())\r\nelif args.file_cron:\r\n    print(cron_file(args.file_cron))\r\nelif args.file_starup:\r\n    print(starup(args.file_starup))\r\nelif args.file_os:\r\n    print(osfile(args.file_os))\r\nelif args.file_change:\r\n    print(changefile(args.file_change))\r\nelif args.file_perm:\r\n    print(permfile(args.file_perm))\r\nelif args.user:\r\n    print(account_check()[1])\r\nelif args.history:\r\n    print(history())\r\nelif args.s_backdoor:\r\n    file_scan(args.s_backdoor)\r\nelif args.s_webshell:\r\n    webshell_scan(args.s_webshell)\r\nelse:\r\n    print(\"\\033[1;33m可以带上参数 -h 或者 --help 来查看工具使用说明哦~\\033[0m\")\r\nprint(\"\\033[1;36m-------------------------------------------------------------------------\\033[0m\")"
  }
]