On Thu, Oct 6, 2011 at 11:10 AM, Michael Mol <mike...@gmail.com> wrote: > On Thu, Oct 6, 2011 at 11:01 AM, Nilesh Govindarajan > <cont...@nileshgr.com> wrote: >> One of the servers I manage has a strange problem. >> >> Every 24h, someone starts a process shows up as perl in the list, but >> launching command is /usr/sbin/httpd. >> It shows just one process, but when I run something like this: >> >> ps -C perl -o cmd,pid >> >> I get some 5-6 processes alternatively with cmd as /usr/sbin/httpd or >> /usr/bin/perl. >> >> The even more interesting thing is, /usr/sbin/httpd does not exist. >> I suspect a rootkit, but chkrootkit & rkhunter reported nothing. >> >> Also, I found a mysterious file: /tmp/ips.txt with following content: >> xxx.xxx.xxx.xxx >> 127.0.0.1 >> addr:xxx.xxx.xxx.xxx >> addr: >> addr:127.0.0.1 >> addr: >> >> Somebody is aware of a malware/rootkit which creates such files? > > No direct experience with Linux rootkits, but you might have better > luck if you run a statically-linked copy of busybox that can talk to > the kernel, rather than going through a potentially malicious libc. > > Is this a server running Gentoo or some other distro?
Mm. Something else. A process is allowed to modify its argv[0], which changes what you see when you run commands like 'ps'. However, if you take a look at what's in /proc for the PID in question, you might be able get a better idea of the file's origin. -- :wq