![]() Server : Apache System : Linux server2.corals.io 4.18.0-348.2.1.el8_5.x86_64 #1 SMP Mon Nov 15 09:17:08 EST 2021 x86_64 User : corals ( 1002) PHP Version : 7.4.33 Disable Function : exec,passthru,shell_exec,system Directory : /proc/self/root/usr/local/maldetect.bk1361510/maldetect.bk1570306/internals/ |
#!/usr/bin/perl # ## # Linux Malware Detect v1.6.6.1 # (C) 2002-2023, R-fx Networks <[email protected]> # (C) 2023, Ryan MacDonald <[email protected]> # This program may be freely redistributed under the terms of the GNU GPL v2 ## # use warnings; if ($#ARGV < "1") { print "usage: hexfile string\n"; exit; } $hexfile = $ARGV[0]; $instr = $ARGV[1]; $dat_hexstring = $hexfile; open(DAT, $dat_hexstring) || die("Could not open $dat_hexstring"); @raw_data=<DAT>; close(DAT); foreach $hexptr (@raw_data) { chomp($hexptr); ($ptr,$name)=split(/:/,$hexptr); if ( grep(/$ptr/, $instr) ) { print "$ptr $name \n"; exit; } }