On 2/9/2018 4:00 PM, Randall Chamberlin wrote:
I am experiencing this too.  For me the "solr" user is running "fs-manager"
from with the directory "/var/tmp/.X1M-Unix.  There is a "config.json",
"out.log" and "xmrig.log" file present.  The json looks like this:
{
     "algo": "cryptonight",
     "av": 0,
     "background": true,
     "colors": false,
     "cpu-affinity": null,
     "cpu-priority": null,
     "donate-level": 2,
     "log-file": "xmrig.log",
     "max-cpu-usage": 85,
     "print-time": 60,
     "retries": 2,
     "retry-pause": 3,
     "safe": false,
     "syslog": false,
     "threads": null,
     "pools": [
                 {
             "url": "pool-proxy.com:8080",
             "user": "user",
             "pass": "x",
             "keepalive": true,
             "nicehash": false
         }
     ]
}

Further research with this new information suggests that this is a part of a cryptomining botnet.  If you think you can trust the following link, here's some information:

https://malware.news/t/inside-one-xmrig-botnet-miner/17692

The xmrig software is an actual legitimate cryptomining program, but it is apparently being installed on vulnerable webservers by malware and generating profit for those who created the malware.

If this is malware as I suspect, you're going to need to figure out what parts of your system are publicly accessible and vulnerable, patch them, and clean up the malware.  Alternatively you could completely rebuild the server with newer software versions so it's completely clean and cannot be infected again.

Thanks,
Shawn

Reply via email to