mrwright
New Member
Maybe someone here could shed some light on a problem I have been seeing.
Of course, the system is compromised, and the only true solution here is to wipe and reload. However, I have been seeing more and more of it recently and would like to understand how this is happening.
First off; no unknown users or ssh logins. And this is the true problem for myself.
This has not happened to any of my production systems; most sit behind firewalls anyways. But in the case of publicly facing VPS slices and dedicated systems I been seeing more and more.
Ramon process, no idea where is coming from, called fgrmlhgxlf
top - 13:33:18 up 2 min, 1 user, load average: 0.52, 0.26, 0.10
Tasks: 196 total, 1 running, 195 sleeping, 0 stopped, 0 zombie
Cpu(s): 0.2%us, 0.1%sy, 0.0%ni, 99.7%id, 0.0%wa, 0.0%hi, 0.0%si, 0.0%st
Mem: 32837716k total, 394212k used, 32443504k free, 9948k buffers
Swap: 4188668k total, 0k used, 4188668k free, 60320k cached
PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+ COMMAND
1751 root 20 0 77288 5248 200 S 1.7 0.0 1:40.59 fgrmlhgxlf
1 root 20 0 19232 1488 1220 S 0.3 0.0 0:00.80 init
So the first thing, of course, kill it. BUT a new process of the same kind appears now called bfqirtcejh
[root@test ~]# kill -9 1751
[root@test ~]# top
top - 13:34:35 up 3 min, 1 user, load average: 0.18, 0.21, 0.09
Tasks: 230 total, 1 running, 229 sleeping, 0 stopped, 0 zombie
Cpu(s): 6.1%us, 2.3%sy, 0.0%ni, 90.5%id, 0.0%wa, 0.0%hi, 1.2%si, 0.0%st
Mem: 32837716k total, 439044k used, 32398672k free, 9952k buffers
Swap: 4188668k total, 0k used, 4188668k free, 67688k cached
PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+ COMMAND
2601 root 20 0 197m 13m 196 S 61.3 0.0 0:02.00 bfqirtcejh
1 root 20 0 19232 1496 1220 S 0.0 0.0 0:00.81 init
Digging more into the process itself (note: same type of process but different event named cixtwrhpet)
[root@test tmp]# lsof | grep cixtwrhpe
cixtwrhpe 1715 root cwd DIR 9,2 4096 2 /
cixtwrhpe 1715 root rtd DIR 9,2 4096 2 /
cixtwrhpe 1715 root txt REG 9,2 625718 4328099 /usr/bin/cixtwrhpet
cixtwrhpe 1715 root 0u CHR 1,3 0t0 3829 /dev/null
cixtwrhpe 1715 root 1u CHR 1,3 0t0 3829 /dev/null
cixtwrhpe 1715 root 2u CHR 1,3 0t0 3829 /dev/null
cixtwrhpe 1715 root 3u IPv4 13426 0t0 TCP 172-245-111-138-host.colocrossing.com:46763->103.240.141.54:6002 (ESTABLISHED)
cixtwrhpe 1715 root 4u raw 0t0 14453 00000000:00FF->00000000:0000 st=07
cixtwrhpe 1715 root 5u raw 0t0 14454 00000000:00FF->00000000:0000 st=07
cixtwrhpe 1715 root 6u raw 0t0 14455 00000000:00FF->00000000:0000 st=07
cixtwrhpe 1715 root 7u raw 0t0 14456 00000000:00FF->00000000:0000 st=07
cixtwrhpe 1715 root 8u raw 0t0 14457 00000000:00FF->00000000:0000 st=07
cixtwrhpe 1715 root 9u raw 0t0 14458 00000000:00FF->00000000:0000 st=07
cixtwrhpe 1715 root 10u raw 0t0 14459 00000000:00FF->00000000:0000 st=07
cixtwrhpe 1715 root 11u raw 0t0 14460 00000000:00FF->00000000:0000 st=07
cixtwrhpe 1715 root 12u raw 0t0 14461 00000000:00FF->00000000:0000 st=07
cixtwrhpe 1715 root 13u raw 0t0 14462 00000000:00FF->00000000:0000 st=07
cixtwrhpe 1715 root 14u raw 0t0 14463 00000000:00FF->00000000:0000 st=07
cixtwrhpe 1715 root 15u raw 0t0 14464 00000000:00FF->00000000:0000 st=07
cixtwrhpe 1715 root 16u raw 0t0 14476 00000000:00FF->00000000:0000 st=07
cixtwrhpe 1715 root 17u raw 0t0 14477 00000000:00FF->00000000:0000 st=07
cixtwrhpe 1715 root 18u raw 0t0 14478 00000000:00FF->00000000:0000 st=07
cixtwrhpe 1715 root 19u raw 0t0 14479 00000000:00FF->00000000:0000 st=07
Using the source above I was interested in what kind of executable this might be:
[root@test tmp]# file /usr/bin/cixtwrhpet
/usr/bin/cixtwrhpet: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, for GNU/Linux 2.6.9, not stripped
How about network process, this was from the bfqirtcejh process, note the same pid " 2601/cat resolv.con"
[root@test ~]# netstat -antop
Active Internet connections (servers and established)
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name Timer
tcp 0 0 0.0.0.0:22 0.0.0.0:* LISTEN 1654/sshd off (0.00/0/0)
tcp 0 0 127.0.0.1:25 0.0.0.0:* LISTEN 1732/master off (0.00/0/0)
tcp 0 1 172.245.111.138:45799 103.240.141.54:6002 SYN_SENT 2627/netstat -antop on (0.64/0/0)
tcp 0 64 172.245.111.138:22 98.159.218.194:62690 ESTABLISHED 2143/sshd probe (0.45/0/0)
tcp 0 300 172.245.111.138:45800 103.240.141.54:6002 ESTABLISHED 2613/netstat -an on (0.54/0/0)
tcp 0 0 172.245.111.138:45313 103.240.141.54:6002 ESTABLISHED 2601/cat resolv.con keepalive (43.08/0/0)
tcp 1 0 172.245.111.138:45798 103.240.141.54:6002 CLOSE_WAIT 2617/bash keepalive (59.62/0/0)
tcp 0 1 172.245.111.138:45797 103.240.141.54:6002 SYN_SENT 2609/whoami on (0.33/1/0)
tcp 0 1 172.245.111.138:45794 103.240.141.54:6002 SYN_SENT 2622/id on (0.10/1/0)
tcp 0 300 172.245.111.138:45791 103.240.141.54:6002 ESTABLISHED 2612/pwd probe (1.33/0/0)
tcp 0 0 :::22 :::* LISTEN 1654/sshd off (0.00/0/0)
tcp 0 0 ::1:25 :::* LISTEN 1732/master off (0.00/0/0)
Even more weird 103.240.141.54 is owned by ClearDDoS Technologies in Hong Kong.
Anyone have an idea how this trojan like pos got installed without access and/or any more knowledge on it. My searching has come up with almost nothing. Maybe some kind of Fork bomb but still doesn't explain how it gets introduced into the system initially.
Thanks!
Of course, the system is compromised, and the only true solution here is to wipe and reload. However, I have been seeing more and more of it recently and would like to understand how this is happening.
First off; no unknown users or ssh logins. And this is the true problem for myself.
This has not happened to any of my production systems; most sit behind firewalls anyways. But in the case of publicly facing VPS slices and dedicated systems I been seeing more and more.
Ramon process, no idea where is coming from, called fgrmlhgxlf
top - 13:33:18 up 2 min, 1 user, load average: 0.52, 0.26, 0.10
Tasks: 196 total, 1 running, 195 sleeping, 0 stopped, 0 zombie
Cpu(s): 0.2%us, 0.1%sy, 0.0%ni, 99.7%id, 0.0%wa, 0.0%hi, 0.0%si, 0.0%st
Mem: 32837716k total, 394212k used, 32443504k free, 9948k buffers
Swap: 4188668k total, 0k used, 4188668k free, 60320k cached
PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+ COMMAND
1751 root 20 0 77288 5248 200 S 1.7 0.0 1:40.59 fgrmlhgxlf
1 root 20 0 19232 1488 1220 S 0.3 0.0 0:00.80 init
So the first thing, of course, kill it. BUT a new process of the same kind appears now called bfqirtcejh
[root@test ~]# kill -9 1751
[root@test ~]# top
top - 13:34:35 up 3 min, 1 user, load average: 0.18, 0.21, 0.09
Tasks: 230 total, 1 running, 229 sleeping, 0 stopped, 0 zombie
Cpu(s): 6.1%us, 2.3%sy, 0.0%ni, 90.5%id, 0.0%wa, 0.0%hi, 1.2%si, 0.0%st
Mem: 32837716k total, 439044k used, 32398672k free, 9952k buffers
Swap: 4188668k total, 0k used, 4188668k free, 67688k cached
PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+ COMMAND
2601 root 20 0 197m 13m 196 S 61.3 0.0 0:02.00 bfqirtcejh
1 root 20 0 19232 1496 1220 S 0.0 0.0 0:00.81 init
Digging more into the process itself (note: same type of process but different event named cixtwrhpet)
[root@test tmp]# lsof | grep cixtwrhpe
cixtwrhpe 1715 root cwd DIR 9,2 4096 2 /
cixtwrhpe 1715 root rtd DIR 9,2 4096 2 /
cixtwrhpe 1715 root txt REG 9,2 625718 4328099 /usr/bin/cixtwrhpet
cixtwrhpe 1715 root 0u CHR 1,3 0t0 3829 /dev/null
cixtwrhpe 1715 root 1u CHR 1,3 0t0 3829 /dev/null
cixtwrhpe 1715 root 2u CHR 1,3 0t0 3829 /dev/null
cixtwrhpe 1715 root 3u IPv4 13426 0t0 TCP 172-245-111-138-host.colocrossing.com:46763->103.240.141.54:6002 (ESTABLISHED)
cixtwrhpe 1715 root 4u raw 0t0 14453 00000000:00FF->00000000:0000 st=07
cixtwrhpe 1715 root 5u raw 0t0 14454 00000000:00FF->00000000:0000 st=07
cixtwrhpe 1715 root 6u raw 0t0 14455 00000000:00FF->00000000:0000 st=07
cixtwrhpe 1715 root 7u raw 0t0 14456 00000000:00FF->00000000:0000 st=07
cixtwrhpe 1715 root 8u raw 0t0 14457 00000000:00FF->00000000:0000 st=07
cixtwrhpe 1715 root 9u raw 0t0 14458 00000000:00FF->00000000:0000 st=07
cixtwrhpe 1715 root 10u raw 0t0 14459 00000000:00FF->00000000:0000 st=07
cixtwrhpe 1715 root 11u raw 0t0 14460 00000000:00FF->00000000:0000 st=07
cixtwrhpe 1715 root 12u raw 0t0 14461 00000000:00FF->00000000:0000 st=07
cixtwrhpe 1715 root 13u raw 0t0 14462 00000000:00FF->00000000:0000 st=07
cixtwrhpe 1715 root 14u raw 0t0 14463 00000000:00FF->00000000:0000 st=07
cixtwrhpe 1715 root 15u raw 0t0 14464 00000000:00FF->00000000:0000 st=07
cixtwrhpe 1715 root 16u raw 0t0 14476 00000000:00FF->00000000:0000 st=07
cixtwrhpe 1715 root 17u raw 0t0 14477 00000000:00FF->00000000:0000 st=07
cixtwrhpe 1715 root 18u raw 0t0 14478 00000000:00FF->00000000:0000 st=07
cixtwrhpe 1715 root 19u raw 0t0 14479 00000000:00FF->00000000:0000 st=07
Using the source above I was interested in what kind of executable this might be:
[root@test tmp]# file /usr/bin/cixtwrhpet
/usr/bin/cixtwrhpet: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, for GNU/Linux 2.6.9, not stripped
How about network process, this was from the bfqirtcejh process, note the same pid " 2601/cat resolv.con"
[root@test ~]# netstat -antop
Active Internet connections (servers and established)
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name Timer
tcp 0 0 0.0.0.0:22 0.0.0.0:* LISTEN 1654/sshd off (0.00/0/0)
tcp 0 0 127.0.0.1:25 0.0.0.0:* LISTEN 1732/master off (0.00/0/0)
tcp 0 1 172.245.111.138:45799 103.240.141.54:6002 SYN_SENT 2627/netstat -antop on (0.64/0/0)
tcp 0 64 172.245.111.138:22 98.159.218.194:62690 ESTABLISHED 2143/sshd probe (0.45/0/0)
tcp 0 300 172.245.111.138:45800 103.240.141.54:6002 ESTABLISHED 2613/netstat -an on (0.54/0/0)
tcp 0 0 172.245.111.138:45313 103.240.141.54:6002 ESTABLISHED 2601/cat resolv.con keepalive (43.08/0/0)
tcp 1 0 172.245.111.138:45798 103.240.141.54:6002 CLOSE_WAIT 2617/bash keepalive (59.62/0/0)
tcp 0 1 172.245.111.138:45797 103.240.141.54:6002 SYN_SENT 2609/whoami on (0.33/1/0)
tcp 0 1 172.245.111.138:45794 103.240.141.54:6002 SYN_SENT 2622/id on (0.10/1/0)
tcp 0 300 172.245.111.138:45791 103.240.141.54:6002 ESTABLISHED 2612/pwd probe (1.33/0/0)
tcp 0 0 :::22 :::* LISTEN 1654/sshd off (0.00/0/0)
tcp 0 0 ::1:25 :::* LISTEN 1732/master off (0.00/0/0)
Even more weird 103.240.141.54 is owned by ClearDDoS Technologies in Hong Kong.
Anyone have an idea how this trojan like pos got installed without access and/or any more knowledge on it. My searching has come up with almost nothing. Maybe some kind of Fork bomb but still doesn't explain how it gets introduced into the system initially.
Thanks!