On Thu 06 Oct 2011 09:06:06 PM IST, Alberto Luaces wrote: > Nilesh Govindarajan writes: > >> One of the servers I manage has a strange problem. >> >> Every 24h, someone starts a process shows up as perl in the list, but >> launching command is /usr/sbin/httpd. >> It shows just one process, but when I run something like this: >> >> ps -C perl -o cmd,pid >> >> I get some 5-6 processes alternatively with cmd as /usr/sbin/httpd or >> /usr/bin/perl. >> >> The even more interesting thing is, /usr/sbin/httpd does not exist. >> I suspect a rootkit, but chkrootkit & rkhunter reported nothing. >> >> Also, I found a mysterious file: /tmp/ips.txt with following content: >> xxx.xxx.xxx.xxx >> 127.0.0.1 >> addr:xxx.xxx.xxx.xxx >> addr: >> addr:127.0.0.1 >> addr: >> >> Somebody is aware of a malware/rootkit which creates such files? > > I had some of that recently. The attacker used a instance of phpmyadmin > to inject into its URL a wget command to download a perl script from > another site. Look for `wget' into apache logs. >
@all Apache was never installed & I don't see any reason to install it because nginx satisfies my needs. I grepped for the string wget in all logs and php files, found some, but they were for libssh2 in wordpress code. @Michael, I thought of doing that, but before I discovered the file, I'd already killed the processes. Will check later when the process is relaunched sometime later. -- Nilesh Govindarajan http://nileshgr.com