Documents / Sentinel Security / Features

Malware Scan

Malware Scan

Malware Scan analyzes files within your WordPress site using pattern matching to detect malware, backdoors, and malicious scripts.

Why Malware Scanning Is Necessary

When a WordPress site is infected with malware, the following types of damage can occur:

  • SEO Spam: Spam links appear in search results
  • Redirects: Visitors are forwarded to malicious websites
  • Data Theft: Users' credit card information and login credentials are stolen
  • Botnet: The server is used as a launchpad for DDoS attacks
  • Blacklisting: Google marks the site as "dangerous" and removes it from search results
Most malware remains dormant for extended periods without visible symptoms. Regular scanning is the only way to catch infections early.

Detection Patterns

PHP Malware Detection

The following common malware patterns are detected:

PatternDescriptionSeverity
eval(base64_decode(...))Obfuscated code execution🔴 Critical
eval(gzinflate(...))Compressed malicious code🔴 Critical
preg_replace('/.*/e', ...)Code execution via regex🔴 Critical
$_GET/$_POST + evalRemote Code Execution (RCE)🔴 Critical
file_put_contents + external URLDropper (installs additional malware)🔴 Critical
str_rot13, chr() concatenationString obfuscation🟠 High
Long single-line obfuscated codeSuspicious low-readability code🟠 High
PHP inside .ico filesPHP code disguised as images🔴 Critical

WebShell Detection

Signatures for WebShells (malware used to remotely control a server) are also detected:

  • FilesMan, WSO, r57, c99
  • China Chopper
  • Other known WebShell patterns

PHP Files in the Uploads Directory

If executable PHP files are found in the wp-content/uploads/ directory, there is a high probability they are malware. This directory normally contains only images and documents.

Running a Scan

  1. Navigate to SentinelSecurityMalware Scan
  2. Select the scan scope:
  • Quick Scan: PHP files in the uploads/ directory only
  • Standard Scan: Themes + Plugins + Uploads
  • Full Scan: Entire WordPress installation
3. Click Start Scan
  1. Results are displayed in a list

Responding to Detection Results

When malware is detected, the following response options are available:

Review and Investigate

  • View File Contents: Review the detected code with syntax highlighting
  • Report False Positive: Add to the exclusion list if it is a false positive

Take Action

  • Quarantine: Move the file to a quarantine directory (renders it non-executable)
  • Delete: Permanently delete the file
  • Restore: For WordPress core files, overwrite with the official clean version

Important: Always create a backup before deleting or repairing files.

Scheduled Scan Settings

Automated scheduled scans help you detect new malware early.

FrequencyRecommended Use
DailyCritical sites such as e-commerce or membership sites
WeeklyGeneral business websites
MonthlyPersonal sites with low update frequency

Difference from File Integrity Monitoring

AspectMalware ScanFile Integrity Monitoring
Detection MethodPattern matchingHash comparison
PurposeDetect known malware patternsDetect any changes
TargetFile contentsFile hash values
StrengthIdentify infected filesHigh-precision tampering detection
WeaknessDifficult to detect unknown malwareCannot determine if changes are legitimate
Using both features together provides protection against both known and unknown threats.