On Oct 6, 2011 12:57 PM, "Nilesh Govindarajan" <[email protected]> wrote:
>
> On Thu 06 Oct 2011 09:06:06 PM IST, Alberto Luaces wrote:
> > Nilesh Govindarajan writes:
> >
> >> One of the servers I manage has a strange problem.
> >>
> >> Every 24h, someone starts a process shows up as perl in the list, but
> >> launching command is /usr/sbin/httpd.
> >> It shows just one process, but when I run something like this:
> >>
> >> ps -C perl -o cmd,pid
> >>
> >> I get some 5-6 processes alternatively with cmd as /usr/sbin/httpd or
> >> /usr/bin/perl.
> >>
> >> The even more interesting thing is, /usr/sbin/httpd does not exist.
> >> I suspect a rootkit, but chkrootkit & rkhunter reported nothing.
> >>
> >> Also, I found a mysterious file: /tmp/ips.txt with following content:
> >> xxx.xxx.xxx.xxx
> >> 127.0.0.1
> >> addr:xxx.xxx.xxx.xxx
> >> addr:
> >> addr:127.0.0.1
> >> addr:
> >>
> >> Somebody is aware of a malware/rootkit which creates such files?
> >
> > I had some of that recently. The attacker used a instance of phpmyadmin
> > to inject into its URL a wget command to download a perl script from
> > another site. Look for `wget' into apache logs.
> >
>
> @all
> Apache was never installed & I don't see any reason to install it
> because nginx satisfies my needs. I grepped for the string wget in all
> logs and php files, found some, but they were for libssh2 in wordpress
> code.
> @Michael,
> I thought of doing that, but before I discovered the file, I'd already
> killed the processes. Will check later when the process is relaunched
> sometime later.

You might crank up service log levels in anticipation, too, and prod your
firewall to log unusual-but-allowed connections, too.

Reply via email to