@fedora

Страница 724 из 2988
Michael
21.05.2017
07:18:57
I've unplugged the LAN cable, the loads of transmitted datas where getting sooo high

J.
21.05.2017
07:24:19
what is the top process from nethogs ??

Michael
21.05.2017
07:25:08
what is the top process from nethogs ??
still /root/.local/syslogd

Bloo
21.05.2017
07:26:31
Install and run rkhunter?

Google
J.
21.05.2017
07:26:40
no way this is a normal system file.

Michael
21.05.2017
07:26:44
Bloo
21.05.2017
07:26:54
RootKit Hunter?

J.
21.05.2017
07:27:12
system files dont resides at /root/

Bloo
21.05.2017
07:27:52
http://www.chkrootkit.org/ is another option.

Michael
21.05.2017
07:28:09
Bloo
21.05.2017
07:29:20
Syslogd definitely does not store it's data in anyone's home folder, not even root's.

Syslogd writes to /var/log/

J.
21.05.2017
07:30:19
still /root/.local/syslogd
could you, please, upload this file and send it to me?

Michael
21.05.2017
07:30:22
RKHunter has fount 4 suspect files

Bloo
21.05.2017
07:32:19
That folder .local is the XDG "standard" location for USER data files related to installed applications, but no system app like syslogd should be writing to that folder.

Michael
21.05.2017
07:35:26
could you, please, upload this file and send it to me?
ahm, I have a problem. that file is disappeared

Google
J.
21.05.2017
07:36:09
but it shows in nethogs?

Michael
21.05.2017
07:36:57
and it isn't hidden

J.
21.05.2017
07:38:05
ok. its pid still is 16203?

Michael
21.05.2017
07:38:56


Bloo
21.05.2017
07:41:06
That /usr/sbin/rsyslogd looks like the REAL system log daemon. The other in /root/.local looks very much like an infection to me.

J.
21.05.2017
07:41:24
cp /proc/21708/exe /tmp/strange_file

darkabhi@Gnome:~$
21.05.2017
07:41:26
How do i get open terminal on right click ?

darkabhi@Gnome:~$
21.05.2017
07:42:29
Bloo
21.05.2017
07:42:31
so there's a fake syslogd
Sure looks like it to me. I'd kill that process if you can. killall syslogd

Michael
21.05.2017
07:43:22
Sure looks like it to me. I'd kill that process if you can. killall syslogd
thanks, those stopped, now i have to systemctl disable syslogd to avoid them auto-starting?

Bloo
21.05.2017
07:43:58
I'm not sure someone installing a rootkit would use the standard start methods to start it.

Bloo
21.05.2017
07:44:38
You do need to find out how it's starting and disable that, though, for sure, assuming it is an infection like it appears to be.

J.
21.05.2017
07:44:43
done
ok, could you send strange_file to me?

Google
Michael
21.05.2017
07:45:02
Bloo
21.05.2017
07:45:22
May I have a copy, also? Would love to find out what you got there. :)

Michael
21.05.2017
07:45:42
so, can I send it here?

Bloo
21.05.2017
07:46:24
Maybe send it here, wait a moment for those who want it to download it, then delete that message so that nobody gets it accidentally?

Bloo
21.05.2017
07:47:44
Nobody download this file Michael is about to send unless you know how to quarantine possibly malicious software, K? ;)

Michael
21.05.2017
07:49:15
here it is (loading...)

ahm, something is still uploading loads of data, damnit

Bloo
21.05.2017
07:50:28
Did the process restart itself?

Michael
21.05.2017
07:50:41
Bloo
21.05.2017
07:52:41
Yea, it's looking more and more like a virus or other evil thing. "This file is packed with the UPX executable packer" ← It's a 32 bit executable file it would appear.

Michael
21.05.2017
07:53:09
I'm deleting the file now, from the chat

Bloo
21.05.2017
07:54:38
Still looking it over. Not sure what it is yet, but if I can't figure it out, I may try it out in a virtual machine later.

J.
21.05.2017
07:54:39
If I were you, I would nuke this installation and do a clean install.

Michael
21.05.2017
07:56:07
If I were you, I would nuke this installation and do a clean install.
damn, I have all my programs here, and my customizations.. :c

that stupid syslogd is re-making himself everywhere, now it is in /home/mmessaggi/.local/syslogd

Bloo
21.05.2017
07:58:20
Yea, I agree with J. If you must, boot from a LiveCD and rescue your non-executable data and config files, and quarantine any executable stuff you need to rescue then do a clean install.

darkabhi@Gnome:~$
21.05.2017
07:59:37
What's the difference in bashrc in home and bashrc in /etc

?

Google
Bloo
21.05.2017
08:00:13
"upx: strange_file: CantUnpackException: header corrupted 2" ← Strange file for sure.

What's the difference in bashrc in home and bashrc in /etc
bashrc in home overrides settings in the /etc/bashrc (systemwide) for a single user (the one who's home it's in). It's for user customization of personal bash preferences and shell variables.

darkabhi@Gnome:~$
21.05.2017
08:02:46
? Thanks

Bloo
21.05.2017
08:03:53
? Thanks
Welcome. :)

J.
21.05.2017
08:04:36


Michael
21.05.2017
08:04:56
what the-..

Bloo
21.05.2017
08:05:14
Evil!

Admin
ERROR: S client not available

Bloo
21.05.2017
08:05:25
Botnet node?

J. Neto: You testing that in a VM there? That was gonna be my next test.

J.
21.05.2017
08:07:19
Botnet node?
dont know.

Michael
21.05.2017
08:07:22
Botnet node?
so maybe that's why my poor i7-6700 gets with 100% on all the 8vCore in idle?

Bloo
21.05.2017
08:07:59
yes. a disconnected VM.
Right on. Saves me from spinning one up. So it IS indeed something sinister then. Good to know. :)

J.
21.05.2017
08:09:19
but you could branch your own investigation. I am no security expert, just curious. :)

Bloo
21.05.2017
08:09:51
ClamAV doesn't see it as malicious, but that's probably because it's obscured by the compression. :(

I'm no expert, either, but I've studied network security in my spare time out of curiosity for a while now, so I know how to stay safe while playin' with this kinda stuff. Pretty dickish move to put stuff like this out there, for sure.

Glad you caught it, Michael. It's probably either a spam-bot or a DDOS bot.

Michael
21.05.2017
08:12:19
Glad you caught it, Michael. It's probably either a spam-bot or a DDOS bot.
but it resists to my killall, that stupid program .-.

Bloo
21.05.2017
08:12:58
killall -9 syslogd even? (Force kill?)

Google
Bloo
21.05.2017
08:13:24
The -9 puts a little extra "oomph" behind the kill.

Michael
21.05.2017
08:13:37
killall -9 syslogd even? (Force kill?)
nothing, it's working as root

Bloo
21.05.2017
08:13:50
Yea, the killall has to be given as root, too.

Michael
21.05.2017
08:14:03
Yea, the killall has to be given as root, too.
yep, I did, but it doesn't work

Bloo
21.05.2017
08:14:58
Brutal. Yea, it's an evil thing then. You'll have to boot up a LiveCD to clean it, I suspect. Only way to be REALLY certain though, is a clean install.

Bloo
21.05.2017
08:17:30
Sorry you got a nasty like that, but glad you caught it. Might be good to find out where it came from if you can, so you don't get re-infected on the new clean setup.

J.
21.05.2017
08:17:53


Bloo
21.05.2017
08:17:59
If you ran any software from any unusual sources, that'd likely be a first suspect.

Yeah, that's way too many syslogd processes to be the real deal, and syslogd isn't the default on many distros these days, anyhow. rsyslogd is.

Nice work testing this evil beast. I'ma go ahead and keep a copy of this thing archived so I can wireshark it later. Find out more about it. :)

J.
21.05.2017
08:23:14
it looks for lua and related libs (http, crypto, torrent). I'll send the strace log.

Michael
21.05.2017
08:23:30
welcome!

Bloo
21.05.2017
08:24:00
it looks for lua and related libs (http, crypto, torrent). I'll send the strace log.
Wow! Evil. So it sounds like it's setting up shop in any system it gets into.

Michael
21.05.2017
08:24:11
I'm using my dad's Fedora laptop tu write a LiveUSB, my old one is destroyed, rip it.

Michael
21.05.2017
08:25:10
Wow! Evil. So it sounds like it's setting up shop in any system it gets into.
maybe it went on my system because I have public static IP enabled..

Bloo
21.05.2017
08:26:37
maybe it went on my system because I have public static IP enabled..
If it's not well secured at the outside (firewalled properly) then it *could* be one way something like that could get in, yea. Especially if you're running any open services which may have unpatched vulnerabilities.

Страница 724 из 2988