1 |
On Oct 6, 2011 12:57 PM, "Nilesh Govindarajan" <contact@××××××××.com> wrote: |
2 |
> |
3 |
> On Thu 06 Oct 2011 09:06:06 PM IST, Alberto Luaces wrote: |
4 |
> > Nilesh Govindarajan writes: |
5 |
> > |
6 |
> >> One of the servers I manage has a strange problem. |
7 |
> >> |
8 |
> >> Every 24h, someone starts a process shows up as perl in the list, but |
9 |
> >> launching command is /usr/sbin/httpd. |
10 |
> >> It shows just one process, but when I run something like this: |
11 |
> >> |
12 |
> >> ps -C perl -o cmd,pid |
13 |
> >> |
14 |
> >> I get some 5-6 processes alternatively with cmd as /usr/sbin/httpd or |
15 |
> >> /usr/bin/perl. |
16 |
> >> |
17 |
> >> The even more interesting thing is, /usr/sbin/httpd does not exist. |
18 |
> >> I suspect a rootkit, but chkrootkit & rkhunter reported nothing. |
19 |
> >> |
20 |
> >> Also, I found a mysterious file: /tmp/ips.txt with following content: |
21 |
> >> xxx.xxx.xxx.xxx |
22 |
> >> 127.0.0.1 |
23 |
> >> addr:xxx.xxx.xxx.xxx |
24 |
> >> addr: |
25 |
> >> addr:127.0.0.1 |
26 |
> >> addr: |
27 |
> >> |
28 |
> >> Somebody is aware of a malware/rootkit which creates such files? |
29 |
> > |
30 |
> > I had some of that recently. The attacker used a instance of phpmyadmin |
31 |
> > to inject into its URL a wget command to download a perl script from |
32 |
> > another site. Look for `wget' into apache logs. |
33 |
> > |
34 |
> |
35 |
> @all |
36 |
> Apache was never installed & I don't see any reason to install it |
37 |
> because nginx satisfies my needs. I grepped for the string wget in all |
38 |
> logs and php files, found some, but they were for libssh2 in wordpress |
39 |
> code. |
40 |
> @Michael, |
41 |
> I thought of doing that, but before I discovered the file, I'd already |
42 |
> killed the processes. Will check later when the process is relaunched |
43 |
> sometime later. |
44 |
|
45 |
You might crank up service log levels in anticipation, too, and prod your |
46 |
firewall to log unusual-but-allowed connections, too. |