On Thu, Oct 6, 2011 at 11:10 AM, Michael Mol <mike...@gmail.com> wrote:
> On Thu, Oct 6, 2011 at 11:01 AM, Nilesh Govindarajan
> <cont...@nileshgr.com> wrote:
>> One of the servers I manage has a strange problem.
>>
>> Every 24h, someone starts a process shows up as perl in the list, but
>> launching command is /usr/sbin/httpd.
>> It shows just one process, but when I run something like this:
>>
>> ps -C perl -o cmd,pid
>>
>> I get some 5-6 processes alternatively with cmd as /usr/sbin/httpd or
>> /usr/bin/perl.
>>
>> The even more interesting thing is, /usr/sbin/httpd does not exist.
>> I suspect a rootkit, but chkrootkit & rkhunter reported nothing.
>>
>> Also, I found a mysterious file: /tmp/ips.txt with following content:
>> xxx.xxx.xxx.xxx
>> 127.0.0.1
>> addr:xxx.xxx.xxx.xxx
>> addr:
>> addr:127.0.0.1
>> addr:
>>
>> Somebody is aware of a malware/rootkit which creates such files?
>
> No direct experience with Linux rootkits, but you might have better
> luck if you run a statically-linked copy of busybox that can talk to
> the kernel, rather than going through a potentially malicious libc.
>
> Is this a server running Gentoo or some other distro?

Mm. Something else. A process is allowed to modify its argv[0], which
changes what you see when you run commands like 'ps'. However, if you
take a look at what's in /proc for the PID in question, you might be
able get a better idea of the file's origin.


-- 
:wq

Reply via email to