I run an OpenBSD 5.5-stable amd64 server at home. Email, web, etc. Today 
I was doing some maintenance and I found my way to /etc/rc.local. When I 
opened it I saw this:

$ cat rc.local
#       $OpenBSD: rc.local,v 1.44 2011/04/22 06:08:14 ajacoutot Exp $

# Site-specific startup actions, daemons, and other things which
# can be done AFTER your system goes into securemode.  For actions
# which should be done BEFORE your system has gone into securemode
# please see /etc/rc.securelevel.
cd /etc;./sfewfesfs
cd /etc;./gfhjrtfyhuf
cd /etc;./rewgtf3er4t
cd /etc;./sdmfdsfhjfe
cd /etc;./gfhddsfew
cd /etc;./ferwfrre
cd /etc;./dsfrefr

I don't remember adding those lines to my rc.local file.

$ cd /etc && ls -al ./sfewfesfs
-rwsrwsrwt  1 root  wheel  694680 Apr  4 07:47 /etc/sfewfesfs

$ file dsfrefr dsfrefr: ELF 32-bit LSB executable, Intel 80386, version 
1, statically linked, stripped

Seems odd to have a bunch of randomly named executibles running at boot. 
And that they are compiled for 386 (I'm running amd64), and that they have
suid set, and to root.

$ clamscan *
dsfrefr: OK
ferwfrre: OK
gfhddsfew: OK
gfhjrtfyhuf: OK
rc.local: OK
rewgtf3er4t: OK
sdmfdsfhjfe: OK
sfewfesfs: OK
Scanned directories: 0
Scanned files: 8
Infected files: 0
Data scanned: 3.21 MB
Data read: 3.20 MB (ratio 1.00:1)
Time: 10.842 sec (0 m 10 s)

Hmm, ok let's run one.

$ ./dsfrefr                                                                    
./dsfrefr[1]: syntax error: `(' unexpected

That's all any of them say when run.

So...have I been p0wned or does anyone know what innocent thing might be 
happening here? Please CC sc...@ggr.com on any replies, as I'm not 
subscribed to updates from the list.

Reply via email to