涉嫌后门的服务端是:https://www.mcbbs.net/thread-1472695-1-8.html
插件

onEnable方法:

init方法:

如图所示,接码后为:

最后直接执行:

来完成恶意代码的远程分发。
---
以下帖子的下载链接失效,一并列出
https://www.mcbbs.net/thread-688277-1-13.html
https://www.mcbbs.net/thread-1416393-1-2.html
https://www.mcbbs.net/thread-1455470-1-14.html
https://www.mcbbs.net/thread-1294240-1-17.html
https://www.mcbbs.net/thread-1045943-1-1.html
插件

onEnable方法:

init方法:

如图所示,接码后为:

最后直接执行:

来完成恶意代码的远程分发。
---
以下帖子的下载链接失效,一并列出
https://www.mcbbs.net/thread-688277-1-13.html
https://www.mcbbs.net/thread-1416393-1-2.html
https://www.mcbbs.net/thread-1455470-1-14.html
https://www.mcbbs.net/thread-1294240-1-17.html
https://www.mcbbs.net/thread-1045943-1-1.html