Currently #analyzing a multistage payload #Wordpress malware, that is being #emailed to siteowners at the moment as a fix for a #cve ... basically it ends upp creating #remoteshell with root privs and have some utils to dump out #mysql, #postgre and #mssql #databases among other things.
I'm amazed that they have not obfuscated this harder. The main script that is the wordpress plugin have some mangled function names, the payloads are just base64 and zlib and those files is not mangeeled.