+4 votes
1.3k views
How to Decode UD64 with Evalhook

in Security by (551k points)
reopened by | 1.3k views

1 Answer

+5 votes
Best answer

How to install evalhook on Centos (WHM)

image

This time I want to share my experience. Okay, about 2 weeks ago, late / evening ... on Facebook there is a share of the ' nuyul ' safelink script. And the script is copied, yeah, as usual, if people share the script about the ' quiz', they will definitely be hacked, I don't know what the goal is. After I searched it turned out that the script was copied on ud64.com , then I tried deobfuscate manually, by changing the eval function to print_r . Until finally I managed to get the original script, that's about 5 minutes, because the length of the string is almost 800-1000 lines, forget about the time. So we just go to the point.

In this experiment I used the additional php extension, evalhook. You have to install Evalhook first and the install tutorial is on the page https://github.com/unreturned/evalhook.

How to install evalhook on Centos (WHM)

If it's already installed, then prepare the script first, which has been copied on ud64.com.

Then type php -d extension=evalhook.so namafile.php enter

image

Do you want to allow execution? just answer y until there is a piece of script

if (strpos ($ i1i, "Obfuscation provided by Unknowndevice64 - Free Online PHP Obfuscator") == false) { 
header ("Location: http://ud64.com/ "); die (); }

If you have seen the code snippet above, it means the script has been deleted.

image


by (551k points)
selected by

Related questions

+3 votes
1 answer
asked Jul 28, 2019 in Linux / Unix by backtothefuture (551k points) | 455 views
Sponsored articles cost $40 per post. You can contact us via Feedback

Most popular questions within the last 30 days

  1. Cell phone location by number: How easy it is to do it in Latam
10,634 questions
10,766 answers
510 comments
3 users