[
MAINHACK
]
Mail Test
BC
Config Scan
HOME
Create...
New File
New Folder
Viewing / Editing File: malware.py
File is not writable. Editing disabled.
""" This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program. If not, see <https://www.gnu.org/licenses/>. Copyright © 2019 Cloud Linux Software Inc. This software is also available under ImunifyAV commercial license, see <https://www.imunify360.com/legal/eula> """ import asyncio from functools import partial from pathlib import Path from defence360agent.contracts.config import Malware, PermissionsConfig from defence360agent.contracts.messages import MessageType from defence360agent.feature_management.constants import AV, AV_REPORT, FULL from defence360agent.feature_management.lookup import feature from imav.malwarelib.config import ( MalwareHitStatus, MalwareScanResourceType, ) from imav.malwarelib.model import MalwareHit from imav.malwarelib.scan.queue_supervisor_sync import ( QueueSupervisorSync as ScanQueue, ) from imav.malwarelib.utils.endpoints import MaliciousEndpointStatus from imav.malwarelib.utils.submit import FALSE_POSITIVE from defence360agent.model.simplification import run_in_executor from defence360agent.rpc_tools.lookup import CommonEndpoints, bind from defence360agent.utils import Scope from imav.malwarelib.subsys.malware import HackerTrapHitsSaver, MalwareAction class MalwareEndpoints(CommonEndpoints): SCOPE = Scope.IM360 def __init__(self, sink): super().__init__(sink) self.queue = ScanQueue(sink=sink) @feature(AV, [FULL, AV_REPORT]) @bind("malware", "malicious", "restore-from-backup") async def restore_from_backup(self, ids, user=None) -> None: """Sends RestoreFromBackupTask message and releases the endpoint.""" hits = MalwareHit.malicious_select(ids, user=user) if hits: await self._sink.process_message( MessageType.RestoreFromBackupTask(hits=hits, initiator=user) )
Save Changes
Cancel / Back
Close ×
Server Info
Hostname: server05.hostinghome.co.in
Server IP: 192.168.74.40
PHP Version: 7.4.33
Server Software: Apache
System: Linux server05.hostinghome.co.in 3.10.0-962.3.2.lve1.5.81.el7.x86_64 #1 SMP Wed May 31 10:36:47 UTC 2023 x86_64
HDD Total: 1.95 TB
HDD Free: 691.31 GB
Domains on IP: N/A (Requires external lookup)
System Features
Safe Mode:
Off
disable_functions:
None
allow_url_fopen:
On
allow_url_include:
Off
magic_quotes_gpc:
Off
register_globals:
Off
open_basedir:
None
cURL:
Enabled
ZipArchive:
Disabled
MySQLi:
Enabled
PDO:
Enabled
wget:
Yes
curl (cmd):
Yes
perl:
Yes
python:
Yes
gcc:
Yes
pkexec:
No
git:
Yes
User Info
Username: itsweb
User ID (UID): 1619
Group ID (GID): 1621
Script Owner UID: 1619
Current Dir Owner: N/A