On Thu, Oct 6, 2011 at 11:01 AM, Nilesh Govindarajan <[email protected]> wrote: > One of the servers I manage has a strange problem. > > Every 24h, someone starts a process shows up as perl in the list, but > launching command is /usr/sbin/httpd. > It shows just one process, but when I run something like this: > > ps -C perl -o cmd,pid > > I get some 5-6 processes alternatively with cmd as /usr/sbin/httpd or > /usr/bin/perl. > > The even more interesting thing is, /usr/sbin/httpd does not exist. > I suspect a rootkit, but chkrootkit & rkhunter reported nothing. > > Also, I found a mysterious file: /tmp/ips.txt with following content: > xxx.xxx.xxx.xxx > 127.0.0.1 > addr:xxx.xxx.xxx.xxx > addr: > addr:127.0.0.1 > addr: > > Somebody is aware of a malware/rootkit which creates such files?
No direct experience with Linux rootkits, but you might have better luck if you run a statically-linked copy of busybox that can talk to the kernel, rather than going through a potentially malicious libc. Is this a server running Gentoo or some other distro? -- :wq

