On Thu, Oct 6, 2011 at 11:01 AM, Nilesh Govindarajan
<[email protected]> wrote:
> One of the servers I manage has a strange problem.
>
> Every 24h, someone starts a process shows up as perl in the list, but
> launching command is /usr/sbin/httpd.
> It shows just one process, but when I run something like this:
>
> ps -C perl -o cmd,pid
>
> I get some 5-6 processes alternatively with cmd as /usr/sbin/httpd or
> /usr/bin/perl.
>
> The even more interesting thing is, /usr/sbin/httpd does not exist.
> I suspect a rootkit, but chkrootkit & rkhunter reported nothing.
>
> Also, I found a mysterious file: /tmp/ips.txt with following content:
> xxx.xxx.xxx.xxx
> 127.0.0.1
> addr:xxx.xxx.xxx.xxx
> addr:
> addr:127.0.0.1
> addr:
>
> Somebody is aware of a malware/rootkit which creates such files?

No direct experience with Linux rootkits, but you might have better
luck if you run a statically-linked copy of busybox that can talk to
the kernel, rather than going through a potentially malicious libc.

Is this a server running Gentoo or some other distro?


-- 
:wq

Reply via email to