looks like a worm to me.From: Fredrik Bergström (email@example.com)
- Next message: \: "Re: web downoload robots"
- Previous message: Marek Pedziwiatr: "Re: web downoload robots"
- Next in thread: Kasper Dupont: "Re: looks like a worm to me."
- Reply: Kasper Dupont: "Re: looks like a worm to me."
- Messages sorted by: [ date ] [ thread ] [ subject ] [ author ] [ attachment ]
From: firstname.lastname@example.org (Fredrik Bergström) Date: Thu, 20 Dec 2001 13:38:38 GMT
Some days ago when I logged into one of my servers, just to make some
small adjustments to a database. I to my surprise found that I could
not login as root.
Strange I thought, and called my friend who also have root access, but
he had not changed the root password.
A cold feeling swept down my back, and lots of C code scrolled by my
eyes. This server was set up for reinstallation some weeks ago, but I
had not come around doing that. And it was a standard Slackware 7
installation with about 11 months of playing around with different
I ran a 'ps ax' but found nothing special, or wait a minute, the list
was quite short for this machine. Its usually lots of processes going.
I went into /etc and after running "ls -ltr" (large, time, reverse) I
found that the files host, ftpaccess, ftpusers, shadow, inetd.conf was
changed on the same date and time. A file rc.d/rc.sysinit was allso
Since I was not root, I could not find anything more because all those
files was root.root . I waited some hours, and then I got cold feet.
I took the bus to the server room where the server is located, and
'linux init=/bin/bash rw' on lilo's ass. An 'passwd' and 'sync' later
I had a new root password.
Okay, looking around the system now I found that the commands ps, ls,
netstat, named, inetd, crond and a couple more was modified.
With the ps out of order I ran a 'cat /proc/*/stat' to see what
processes the machine was running. The commands 'snif' and 'ras2xm'
looked a bit interesting, and so I hurried to shut them down.
Back to the /etc/rc.d/rc.sysinit file, this file did not have the +x
flag set, and therefore slackware did not run it on boot.
Good thing, this file contained one row '/usr/bin/sourcemask'.
# cat /usr/bin/sourcemask
cd /usr/man/man1/".. "/.dir
./snif >chipsul &
/usr/bin/ras2xm -p 5139 -q
The sourcemask script starts the sniffer and the other ( possible
scanning tool? ) I could not find any info anywhere about those
programs or their uses, and I dare not to run them outside a
To continue, now I had found all the stuff. Or so I thought. The
/usr/man/man1/".. "/.dir did contain tools to backdoor and
bufferoverflow sshd, bind and wuftpd servers and other hacking stuff.
I searched a bit on the net, and found a nice thought about running
'find / -nouser -o -nogroup' to find suspicious files on the server.
And of it went, and it found a couple of files and one directory in
/dev/ttyp/ contained two directories '.backup' and 'other'. .backup
old version of ps, ls, inetd, inetd.conf, named and netstat. And the
'other' directory contained two scripts that seemed to configure the
appearance of the hacked ls, ps and netstat commands.
The fun in this was that /dev also contained some other files with
some fun information inside:
server:/dev# cat hdbp
server:/dev# cat hdaq
server:/dev# cat hdap
server:/dev# cat xmx
3 defauths dcs
server:/dev# cat xdta
The IP 126.96.36.199-241 is a Computer Club (Internet Cafe like) in
Another fun detail was that with the hacker tools came two core-dump
files containing the ENV of the conputers they where run on.
i686 ./scan 148 111 243 USERNAME=root ENV=/root/.bashrc HISTSIZE=1000
HOSTNAME=pirates.crsc.k12.ar.us LOGNAME=root HISTFILESIZE=1000
SSH_TTY=/dev/pts/0 MAIL=/var/spool/mail/root TERM=xterm HOSTTYPE=i386
INPUTRC=/etc/inputrc SHELL=/bin/bash USER=root
SSH_CLIENT=188.8.131.52 1380 5139 OSTYPE=Linux SHLVL=2 _=./scan
i686 ./ben 184.108.40.206 LESSOPEN=|/usr/bin/lesspipe.sh %s
USERNAME=root ENV=/root/.bashrc HISTSIZE=1000 HOSTNAME=jun-zhi.com.tw
LOGNAME=root SSH_TTY=/dev/pts/4 MAIL=/var/spool/mail/root TERM=xterm
KDEDIR=/usr HOME=/root INPUTRC=/etc/inputrc SHELL=/bin/bash USER=root
QTDIR=/usr/lib/qt-2.1.0 LANG=en_US SSH_CLIENT=220.127.116.11 1189 3
OSTYPE=Linux _=./ben SHLVL=2
The IP 18.104.22.168 is located somewhere in BOTOSANI, Romania.
Okay. I don't have a chance framing someone for this. And I don't
know if I want to. I have had some fun days playing and searching all
over the net for clues. And thought that I would be fun to write a
(long) posting to this newsgroup about it.
I would love some input from you all about this, I could not find any
info about the files. I found some old usenet postings on Japanese
about the file ras2xm but thats all. Is this a worm or a hacker?
Regards, Fredrik Bergström.