On Wed, 16 Jun 2010 19:02:38 +0200 Udo Rader 
<udo.ra...@bestsolution.at> wrote:
>ok, I see you already have met the kit in question ;-)

Seen this malware a couple of times, yes.


>From what I see, there is not much difference between the two
>infections, except maybe that I only see 23 files (instead of the 
25)

File count depends on the package and if it ran previously but 
contents will mostly be the same: scanner, flooder, bot and maybe a 
simple process hider.


>and maybe that the kit was installed in /tmp/lib. In there it was
>further hidden inside a ".,." directory, giving /tmp/lib/.,.
>
>Maybe just something to be added to "suspicious directories".

Not necessary as 'suspscan' will pick it up fine as long as you 
provide directory names where processes may write temporary files. 
BTW running 'suspscan' is only a *postmortem* action and finding 
the malware only an *indication* of more serious problems. It would 
be good to (first make backups, weed out problematic scripts or 
installations, update software to current and then) harden the web 
stack and run say 'Logwatch' (and extending Logwatch capabilities 
to include common downloaders is quite easy: 
http://www.linuxquestions.org/questions/blog/unspawn-2450/logwatch-
webserver-logs-php-malarky-2308/).


HTH,
unSpawn
--


------------------------------------------------------------------------------
ThinkGeek and WIRED's GeekDad team up for the Ultimate 
GeekDad Father's Day Giveaway. ONE MASSIVE PRIZE to the 
lucky parental unit.  See the prize list and enter to win: 
http://p.sf.net/sfu/thinkgeek-promo
_______________________________________________
Rkhunter-users mailing list
Rkhunter-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/rkhunter-users

Reply via email to