[BlueOnyx:14475] Re: updatedb strange behavior
Michael Stauber
mstauber at blueonyx.it
Fri Feb 7 10:02:12 -05 2014
Hi Dirk,
>> 2.) Verify the integrity of your PS command via "rpm -V procps".
>> It should come back blank without flagging any of the files that this RPM contains.
>
> rpm -V procps
> S.5....T. /bin/ps
Ok, so /bin/ps has been replaced. Probably with a trojaned version that
hides the suspicious processes.
>> 4.) Use "lsof" to see which files, pipes, devices and/or sockets are
>> held open by the process with the PID you noted:
>
> lsof -nl|grep 19806
> updatedb 19806 0 cwd DIR 253,0 4096 2 /
> updatedb 19806 0 rtd DIR 253,0 4096 2 /
> updatedb 19806 0 txt REG 253,0 592464 67098 /root/gpu/updatedb (deleted)
> updatedb 19806 0 mem REG 253,0 156928 303158 /lib64/ld-2.12.so
> updatedb 19806 0 mem REG 253,0 1926800 303663 /lib64/libc-2.12.so
> updatedb 19806 0 mem REG 253,0 145896 305799 /lib64/libpthread-2.12.so
> updatedb 19806 0 mem REG 253,0 47064 306403 /lib64/librt-2.12.so
> updatedb 19806 0 0r CHR 1,3 0t0 3662 /dev/null
> updatedb 19806 0 1w CHR 1,3 0t0 3662 /dev/null
> updatedb 19806 0 2w CHR 1,3 0t0 3662 /dev/null
> updatedb 19806 0 3u IPv4 273202025 0t0 TCP <myip>:57006->184.106.96.142:domain (ESTABLISHED)
Dead give away:
/root/gpu/updatedb (deleted)
There is a process running, but the program which launched that process
has been deleted? That's *really* fishy. Programs that behave nice don't
do this.
Also, I don't recognize the directory /root/gpu/ as legitimate. Might be
worth to check out what else is in that directory.
> TCP <myip>:57006->184.106.96.142:domain (ESTABLISHED)
Why is that deleted program (which is still running) holding open a TCP
connection to port 53 on the IP 184.106.96.142?
I'd suggest to fire up tcpdump to examine the network traffic related to
that fishy IP:
tcpdump -i eth0 -n|grep 184.106.96.142
Replace eth0 with the network interface that faces to the internet.
Might be venet0 in an OpenVZ VPS.
>> 5.) If lsof says it's the same /usr/bin/updatedb, we verify its integrity as well:
>
> rpm -q --whatprovides /usr/bin/updatedb
> mlocate-0.22.2-4.el6.x86_64
Looks good.
>> 6.) You also might want to check the directory /proc/<PID>/
>
> ls -la /proc/13816
> lrwxrwxrwx 1 root root 0 Feb 7 07:50 exe -> /root/gpu/updatedb (deleted)
Same as above. It tells us where the program responsible for that
process was located. And that it's no longer there.
So we have two conclusions here:
1.) System binaries have been replaced, and the attacker had stuff
launched out of /root/gpu/ - for both he needed "root" access.
2.) The box is holding up a network connection to 184.106.96.142, which
is a "Rackspace Hosting" IP. They're in San Antonio, Texas.
I'd call that one up as a total loss which needs reinstallation. That's
of course the official "party line", because once a box has been rooted
you never know what kind of easter eggs you might overlook even after a
very thorough cleaning.
Sorry for the bad news, Dirk.
--
With best regards
Michael Stauber
More information about the Blueonyx
mailing list