Catch Chicken Live screenshot (South African ant masterpiece)

Source: Internet
Author: User


First, log in to the system and check the overall status of the system through the top command

650) this.width=650; "src=" Http://s2.51cto.com/wyfs02/M02/7D/9E/wKiom1brpiCDUC0-AABRjMuIT0Q267.png "title=" 1.png " alt= "Wkiom1brpicduc0-aabrjmuit0q267.png"/>

There must be a problem finding the first process that consumes a lot of CPU resources

As seen from the file name, this is not a normal system process.

Pass through process ID to determine the location of the execution file, the operation is as follows:

650) this.width=650; "src=" Http://s2.51cto.com/wyfs02/M02/7D/9B/wKioL1brprCzu8f8AAA5DBY8cm8722.png "style=" float: none; "title=" 2.png "alt=" Wkiol1brprczu8f8aaa5dby8cm8722.png "/>


Further review the file information under/usr/bin

650) this.width=650; "src=" Http://s5.51cto.com/wyfs02/M01/7D/9B/wKioL1brprHTgOLWAAA9bFZoYVo607.png "style=" float: none; "title=" 3.png "alt=" Wkiol1brprhtgolwaaa9bfzoyvo607.png "/>

Look at the first file, very unusual, mainly look at the file attributes


Continue to view the system process through the PS command and discover

650) this.width=650; "src=" Http://s5.51cto.com/wyfs02/M00/7D/9E/wKiom1brpiGxzDCTAAAwplmYocQ099.png "style=" float: none; "title=" 4.png "alt=" Wkiom1brpigxzdctaaawplmyocq099.png "/>

Look at the Packers program.

/usr/bin/dpkgd/ps-ef

650) this.width=650; "src=" Http://s5.51cto.com/wyfs02/M00/7D/9B/wKioL1brprHjHW2PAAAlYkaM9vk039.png "style=" float: none; "title=" 5.png "alt=" Wkiol1brprhjhw2paaalykam9vk039.png "/>

See, these are the orders of the Packers.

What the PS command sees is actually an illusion.

And see if crontab has daemon information.

650) this.width=650; "src=" Http://s5.51cto.com/wyfs02/M00/7D/9B/wKioL1brprHSJoDKAAAgRQtdW4A079.png "style=" float: none; "title=" 6.png "alt=" Wkiol1brprhsjodkaaagrqtdw4a079.png "/>

Found something strange, look at that kill.sh process, executed every 3 minutes

Asked to know that this is not a human-set daemon

650) this.width=650; "src=" Http://s2.51cto.com/wyfs02/M01/7D/9E/wKiom1brpiKS5iBOAAAyodulCos413.png "style=" float: none; "title=" 7.png "alt=" Wkiom1brpiks5iboaaayodulcos413.png "/>

Catch the content to see:


650) this.width=650; "src=" Http://s2.51cto.com/wyfs02/M02/7D/9E/wKiom1brpiLgcR4zAAAlHjdOFmE679.png "style=" float: none; "title=" 8.png "alt=" Wkiom1brpilgcr4zaaalhjdofme679.png "/>



You see the content, you should be able to read


A simple shell.

Grab the network card and set up the status, so even if you down the network card, he can automatically start

Following

Continue to see DMESG information


650) this.width=650; "src=" Http://s2.51cto.com/wyfs02/M02/7D/9E/wKiom1brpiLhu3_JAABp4mcXAyk568.png "style=" float: none; "title=" 9.png "alt=" Wkiom1brpilhu3_jaabp4mcxayk568.png "/>

This is the kernel queue is too large, the broiler contract causes the connection queue to be covered with information


A development machine, it is impossible to have such a large flow of

This is the basic information.


Then we'll start killing these Trojans.

Rm. sshd file

And then

650) this.width=650; "src=" Http://s2.51cto.com/wyfs02/M02/7D/9B/wKioL1brprPRgilWAAArYkrOmvA645.png "style=" float: none; "title=" 10.png "alt=" Wkiol1brprprgilwaaarykromva645.png "/>

And then delete the contents of the shell.


650) this.width=650; "src=" Http://s1.51cto.com/wyfs02/M00/7D/9E/wKiom1brpiOgY1vxAAAtaL8o-7g485.png "style=" float: none; "title=" 11.png "alt=" Wkiom1brpiogy1vxaaatal8o-7g485.png "/>

I have not deleted here, changed the path

After this operation, it is found that the PS command is not available

It doesn't matter, it's hard to fail us

Reinstall the PS command via Yum


How to find out which package PS is, the basic command is very important

650) this.width=650; "src=" Http://s4.51cto.com/wyfs02/M01/7D/9E/wKiom1brpiPziBzmAAAgAQi4qFs064.png "style=" float: none; "title=" 12.png "alt=" Wkiom1brpipzibzmaaagaqi4qfs064.png "/>


Well, the installation is done, again Ps-ef

Found different, and the way to show the process is not the same, because the current is the real system state


Kill the PID first, and then delete the kill.sh file from the previous crontab.

650) this.width=650; "src="/e/u261/themes/default/images/spacer.gif "style=" Background:url ("/e/u261/lang/zh-cn/ Images/localimage.png ") no-repeat center;border:1px solid #ddd;" alt= "Spacer.gif"/>650 "this.width=650;" src= "http ://s2.51cto.com/wyfs02/m00/7d/9b/wkiol1brqghqnbe6aaah6igu8-u514.png "title=" 13.png "alt=" Wkiol1brqghqnbe6aaah6igu8-u514.png "/>

It seems that the Kill method does not work, there is a daemon, as long as the process is closed, it automatically restarts
"Doctor" South Africa ma 2016/3/18 15:02:30

so I'm going to order this.
"Doctor" South Africa ma 2016/3/18 15:02:45

kill-stop 4440
"Doctor" South Africa ma 2016/3/18 15:03:21

does it stop coming out?
"Doctor" South Africa ma 2016/3/18 15:03:28

and then continue observing the script .
"Doctor" South Africa ma 2016/3/18 15:03:30

650) this.width=650; "src="/e/u261/themes/default/images/spacer.gif "style=" Background:url ("/e/u261/lang/zh-cn/ Images/localimage.png ") no-repeat center;border:1px solid #ddd;" alt= "Spacer.gif"/>650 "this.width=650;" src= "http ://s2.51cto.com/wyfs02/m01/7d/9e/wkiom1brqqccakkpaaatbyilt8u228.png "title=" 16.png "alt=" Wkiom1brqqccakkpaaatbyilt8u228.png "/>"Doctor" South Africa ma 2016/3/18 15:03:56

actually the culprit here cp/lib/libkill.so/lib/libkill.so.6




"Dr." South Africa MA 2016/3/18 15:05:08

650) this.width=650; "src="/e/u261/themes/default/images/spacer.gif "style=" Background:url ("/e/u261/lang/zh-cn/ Images/localimage.png ") no-repeat center;border:1px solid #ddd;" alt= "Spacer.gif"/> Now the world is quiet 650) this.width=650; " Src= "Http://s5.51cto.com/wyfs02/M01/7D/9B/wKioL1brqa6SSK0jAAAtBYilT8U419.png" title= "17.png" alt= " Wkiol1brqa6ssk0jaaatbyilt8u419.png "/>" PhD "South Africa MA 2016/3/18 15:05:16

But the problem is far from over.


"Dr." South Africa MA 2016/3/18 15:06:59

Let's do the finishing work and clear the back door.

"Dr." South Africa MA 2016/3/18 15:09:59

Lock down/etc/crontab file with Chartt +i first

"Dr." South Africa MA 2016/3/18 15:11:06

Then find the most recently generated suspicious file, and then delete the

650) this.width=650; "src=" Http://s1.51cto.com/wyfs02/M01/7D/9E/wKiom1brqk3SQgfOAAAzeRwBdyg077.png "title=" 18.png "alt=" Wkiom1brqk3sqgfoaaazerwbdyg077.png "/>

"Dr." South Africa MA 2016/3/18 15:11:20

Note the use of this command
"Dr." South Africa MA 2016/3/18 15:11:31

Through the output you can see that those are suspicious processes

"Dr." South Africa MA 2016/3/18 15:12:56

A very interesting question was found during the removal process.

650) this.width=650; "src=" Http://s2.51cto.com/wyfs02/M01/7D/9C/wKioL1brqzXz1UfaAAAdSbeDNyU658.png "title=" 19.png "alt=" Wkiol1brqzxz1ufaaaadsbednyu658.png "/>


"Doctor" South African Ant
Look at this, point to the place.
15:15:23
"Dr." South Africa MA 2016/3/18 15:15:23

Obviously, these files and the pointing files are deleted.
"Dr." South Africa MA 2016/3/18 15:17:18

Of course, this can't stay.

650) this.width=650; "src=" Http://s4.51cto.com/wyfs02/M02/7D/9F/wKiom1brrO7hEdO_AAAgjJ_HIJ8065.png "title=" 20.png "alt=" Wkiom1brro7hedo_aaagjj_hij8065.png "/>

"Dr." South Africa MA 2016/3/18 15:17:23

By deleting

650) this.width=650; "src=" Http://s2.51cto.com/wyfs02/M01/7D/9F/wKiom1brrUCRiZ6qAAASSlBO724854.png "title=" 21.png "alt=" Wkiom1brrucriz6qaaasslbo724854.png "/>

"Dr." South Africa MA 2016/3/18 15:22:25

/usr/bin, there's absolutely no going to leave suspicious files.
"Dr." South Africa MA 2016/3/18 15:22:31

Find the latest files to
"Dr." South Africa MA 2016/3/18 15:23:51

You can delete the file, execute the last command
"Dr." South Africa MA 2016/3/18 15:23:58

Kill-9 4440
"Dr." South Africa MA 2016/3/18 15:24:11

Just the last Trojan file

650) this.width=650; "src=" Http://s5.51cto.com/wyfs02/M02/7D/9F/wKiom1brrXiDRDUkAAAe5iKBkxc246.png "title=" 22.png "alt=" Wkiom1brrxidrdukaaae5ikbkxc246.png "/>

"Dr." South Africa MA 2016/3/18 15:26:12

Now look at whether or not new files will be generated,

650) this.width=650; "src=" Http://s3.51cto.com/wyfs02/M00/7D/9C/wKioL1brrkPxhYw3AAAhWXysO0c938.png "title=" 23.png "alt=" Wkiol1brrkpxhyw3aaahwxyso0c938.png "/>

"Dr." South Africa MA 2016/3/18 15:26:29

It's not coming back.

650) this.width=650; "src="/e/u261/themes/default/images/spacer.gif "style=" Background:url ("/e/u261/lang/zh-cn/ Images/localimage.png ") no-repeat center;border:1px solid #ddd;" alt= "Spacer.gif"/>650 "this.width=650;" src= "http ://s5.51cto.com/wyfs02/m01/7d/9c/wkiol1brrp_rzhafaabr6jvnyty645.png "title=" 24.png "alt=" WKioL1brrp_ Rzhafaabr6jvnyty645.png "/>

650) this.width=650; "src="/e/u261/themes/default/images/spacer.gif "style=" Background:url ("/e/u261/lang/zh-cn/ Images/localimage.png ") no-repeat center;border:1px solid #ddd;" alt= "Spacer.gif"/>


This article is from the "lake and Laughter" blog, please make sure to keep this source http://hashlinux.blog.51cto.com/9647696/1752589

Catch Chicken Live (South African ant masterpiece)

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.