zoukankan      html  css  js  c++  java
  • Linux的一个问题ircbot进程

    首先该问题目前还不清楚希望知道的人可以回复我mail fengtaotao2012x@163.com

    今天执行一次常规服务器安全抽查的时候发现一台web服务器的一个奇怪的进程 而且更厉害的是cpu使用率高达百分之99

    故事这样的 运行命令top

    内容如下

     1 [root@mail log]# top
     2 Unknown HZ value! (391) Assume 100.
     3 
     4  11:25am  up 15 days, 20:00,  2 users,  load average: 1.76, 1.91, 1.97
     5 139 processes: 133 sleeping, 1 running, 1 zombie, 4 stopped
     6 CPU states:  1.3% user,  0.9% system,  0.0% nice, 97.7% idle
     7 Mem:  2075480K av, 2000952K used,   74528K free,       0K shrd,  193716K buff
     8 Swap: 2096472K av,   32464K used, 2064008K free                 1296772K cached
     9 
    10   PID USER     PRI  NI  SIZE  RSS SHARE STAT  LIB %CPU %MEM   TIME COMMAND
    11  2499 root      25   0  1776  644   536 T       0  6.5  0.0 22094m ircbot
    12  8975 daemon    15   0 20836  10M  3044 S       0  0.3  0.5   0:05 httpd
    13 11465 daemon    15   0 21036  10M  3200 S       0  0.3  0.5   0:03 httpd
    14 14287 daemon    15   0 20464  10M  2992 S       0  0.3  0.5   0:00 httpd
    15 14304 daemon    15   0 20464  10M  2992 S       0  0.3  0.5   0:00 httpd
    16 14305 daemon    15   0 20480  10M  2988 S       0  0.3  0.5   0:00 httpd
    17  2492 root      15   0  127M  19M  4100 S       0  0.1  0.9  49:03 mysqld
    18 12147 daemon    15   0 20792  10M  3024 S       0  0.1  0.5   0:02 httpd
    19 12570 daemon    17   0 20568  10M  3008 S       0  0.1  0.5   0:02 httpd
    20 14307 daemon    15   0 20448  10M  2992 S       0  0.1  0.5   0:00 httpd
    21 14317 daemon    17   0 20448  10M  2972 S       0  0.1  0.4   0:00 httpd
    22     1 root      15   0  2036  644   552 S       0  0.0  0.0   0:04 init
    23     2 root      0K   0     0    0     0 SW      0  0.0  0.0   0:00 migration/0
    24     3 root      34  19     0    0     0 SWN     0  0.0  0.0   0:02 ksoftirqd/0
    25     4 root      0K   0     0    0     0 SW      0  0.0  0.0   0:00 watchdog/0
    26     5 root      0K   0     0    0     0 SW      0  0.0  0.0   0:00 migration/1
    27     6 root      34  19     0    0     0 SWN     0  0.0  0.0   0:01 ksoftirqd/1
    28     7 root      0K   0     0    0     0 SW      0  0.0  0.0   0:00 watchdog/1
    29     8 root      0K   0     0    0     0 SW      0  0.0  0.0   0:00 migration/2
    30     9 root      34  19     0    0     0 SWN     0  0.0  0.0   0:02 ksoftirqd/2
    31    10 root      0K   0     0    0     0 SW      0  0.0  0.0   0:00 watchdog/2
    32    11 root      0K   0     0    0     0 SW      0  0.0  0.0   0:00 migration/3

    当我看到第一行的时候第一感觉就是病毒- -!

     1 [root@mail log]# top
     2 Unknown HZ value! (391) Assume 100.
     3 
     4  11:25am  up 15 days, 20:00,  2 users,  load average: 1.76, 1.91, 1.97
     5 139 processes: 133 sleeping, 1 running, 1 zombie, 4 stopped
     6 CPU states:  1.3% user,  0.9% system,  0.0% nice, 97.7% idle
     7 Mem:  2075480K av, 2000952K used,   74528K free,       0K shrd,  193716K buff
     8 Swap: 2096472K av,   32464K used, 2064008K free                 1296772K cached
     9 
    10   PID USER     PRI  NI  SIZE  RSS SHARE STAT  LIB %CPU %MEM   TIME COMMAND
    11  2499 root      25   0  1776  644   536 T       0  6.5  0.0 22094m ircbot

    这样的数据太吓人了  好吧根据id找下程序的位置

    运行:

     1 [root@mail log]# ls -l /proc/2499/
     2 total 0
     3 dr-xr-xr-x   2 root     root            0 Jun 19 11:47 attr
     4 -r--------   1 root     root            0 Jun 19 11:47 auxv
     5 -r--r--r--   1 root     root            0 Jun 17 04:02 cmdline
     6 -r--r--r--   1 root     root            0 Jun 19 11:47 cpuset
     7 lrwxrwxrwx   1 root     root            0 Jun 19 11:47 cwd -> /
     8 -r--------   1 root     root            0 Jun 19 11:12 environ
     9 lrwxrwxrwx   1 root     root            0 Jun 19 11:47 exe -> /usr/share/icbm/ircbot
    10 dr-x------   2 root     root            0 Jun 19 11:47 fd
    11 -rw-r--r--   1 root     root            0 Jun 19 11:47 loginuid
    12 -r--------   1 root     root            0 Jun 19 11:47 maps
    13 -rw-------   1 root     root            0 Jun 19 11:47 mem
    14 -r--r--r--   1 root     root            0 Jun 19 11:47 mounts
    15 -r--------   1 root     root            0 Jun 19 11:47 mountstats
    16 -rw-r--r--   1 root     root            0 Jun 19 11:47 oom_adj
    17 -r--r--r--   1 root     root            0 Jun 19 11:47 oom_score
    18 lrwxrwxrwx   1 root     root            0 Jun 19 11:47 root -> /
    19 -r--r--r--   1 root     root            0 Jun 19 11:47 schedstat
    20 -r--------   1 root     root            0 Jun 19 11:47 smaps
    21 -r--r--r--   1 root     root            0 Jun 17 04:02 stat
    22 -r--r--r--   1 root     root            0 Jun 19 10:47 statm
    23 -r--r--r--   1 root     root            0 Jun 19 11:12 status
    24 dr-xr-xr-x   3 root     root            0 Jun 19 11:47 task
    25 -r--r--r--   1 root     root            0 Jun 19 11:47 wchan

    ls -l /proc/2499/ext

     1 [root@mail log]# ls -l /proc/2499/exe 
     2 audit/          conman.old/     httpd/          messages.1      secure.1        spooler.4
     3 boot.log        cron            lastlog         messages.2      secure.2        squid/
     4 boot.log.1      cron.1          mail/           messages.3      secure.3        vbox/
     5 boot.log.2      cron.2          maillog         messages.4      secure.4        wtmp
     6 boot.log.3      cron.3          maillog.1       mysqld.log      setroubleshoot/ wtmp.1
     7 boot.log.4      cron.4          maillog.2       ppp/            spooler         xferlog
     8 boot.log.bak    cups/           maillog.3       prelink/        spooler.1       yum.log
     9 clamav/         dmesg           maillog.4       samba/          spooler.2       
    10 conman/         gdm/            messages        secure          spooler.3    
    1 [root@mail log]# ls -l /proc/2499/exe 
    2 lrwxrwxrwx   1 root     root            0 Jun 19 11:47 /proc/2499/exe -> /usr/share/icbm/ircbot

    这里说明下exe为一个快捷方式Linux为软连接方法为:ln -s xxx xxx     上述的意思为 2499的进程目录会跳转到 /usr/share/icbm/ircbot

     想打开这个文件看下内容不过发现打开的是乱码,cp下来在windows下很多编程工具软件也是打开乱码,可能是动了手脚

    这个是我cp下来的目录http://pan.baidu.com/share/link?shareid=2265703552&uk=4045574093 有兴趣的可以看下

     1 [root@mail ~]# ll -d /usr/share/icbm/
     2 drwxr-xr-x   2 root     root         4096 Apr  8 06:27 /usr/share/icbm/
     3 [root@mail ~]# ll /usr/share/icbm/*
     4 -rwxrwxrwx   1 root     root         1005 Jul 27  2012 /usr/share/icbm/flood.pl
     5 -rwxrwxrwx   1 root     root          135 Dec 14  2010 /usr/share/icbm/geekymedia.repo
     6 -rwxrwxrwx   1 root     root         1384 Oct 27  2012 /usr/share/icbm/getproxies.php
     7 -rwxr-xr-x   1 root     root        27788 Apr  8 01:09 /usr/share/icbm/ircbot
     8 -rwxrwxrwx   1 root     root       204562 Apr  7 09:40 /usr/share/icbm/proxies.txt
     9 -rwxrwxrwx   1 root     root        12700 Sep 18  2012 /usr/share/icbm/rpmforge.rpm
    10 -rwxrwxrwx   1 root     root        17072 Apr 12  2012 /usr/share/icbm/slowloris.pl
    11 -rwxrwxrwx   1 root     root        11087 Oct 26  2012 /usr/share/icbm/syn.pl
    12 -rwxrwxrwx   1 root     root          699 Jul 27  2012 /usr/share/icbm/udp.py
    13 [root@mail ~]# 

    发现的问题是 这里面只有 

     7 -rwxr-xr-x   1 root     root        27788 Apr  8 01:09 /usr/share/icbm/ircbot
     8 -rwxrwxrwx   1 root     root       204562 Apr  7 09:40 /usr/share/icbm/proxies.txt
    这两个是在今年的4月份先后出现的。
    目前也只能先将其rm -f掉了,当然我有beckup
    等待网友们的热心支援! 问了几个老运维说 入侵以后最好是把资料CP出来然后重做系统,但我不想那样,希望找到一个优的方法。
    删除掉以后 reboot了下 开机半小时 使用top 命令查看服务器的进程稳定下来了,而且 free -m查看 swap的使用为0了
     1   1:48pm  up 3 min,  1 user,  load average: 0.33, 0.31, 0.13
     2 105 processes: 103 sleeping, 2 running, 0 zombie, 0 stopped
     3 CPU states:  0.7% user,  0.0% system,  0.0% nice, 99.2% idle
     4 Mem:  2075480K av,  665456K used, 1410024K free,       0K shrd,   16496K buff
     5 Swap: 2096472K av,       0K used, 2096472K free                  297804K cached
     6 
     7   PID USER     PRI  NI  SIZE  RSS SHARE STAT  LIB %CPU %MEM   TIME COMMAND
     8  2592 daemon    15   0 20792  10M  3020 S       0  0.3  0.5   0:00 httpd
     9  2701 daemon    15   0 20464  10M  2992 S       0  0.3  0.5   0:00 httpd
    10  2711 daemon    15   0 20448  10M  2992 S       0  0.3  0.5   0:00 httpd
    11  2712 daemon    16   0 20980  10M  3004 R       0  0.3  0.5   0:00 httpd
    12  2729 daemon    15   0 20464  10M  2992 S       0  0.3  0.5   0:00 httpd
    13  2511 root      15   0  124M  16M  3640 S       0  0.1  0.8   0:00 mysqld
    14  2588 daemon    15   0 20804  10M  3008 S       0  0.1  0.5   0:00 httpd
    15  2590 daemon    15   0 20804  10M  3012 S       0  0.1  0.5   0:00 httpd
    16  2591 daemon    15   0 20464  10M  3008 S       0  0.1  0.5   0:00 httpd
    17  2703 daemon    15   0 20464  10M  3024 S       0  0.1  0.5   0:00 httpd
    18  2714 daemon    17   0 20464  10M  3000 S       0  0.1  0.5   0:00 httpd
    19  3058 root      15   0  2940 1840  1632 R       0  0.1  0.0   0:00 top
    20     1 root      15   0  2036  644   552 S       0  0.0  0.0   0:01 init
    21     2 root      0K   0     0    0     0 SW      0  0.0  0.0   0:00 migration/0
    22     3 root      34  19     0    0     0 SWN     0  0.0  0.0   0:00 ksoftirqd/0
    23     4 root      0K   0     0    0     0 SW      0  0.0  0.0   0:00 watchdog/0
    24     5 root      0K   0     0    0     0 SW      0  0.0  0.0   0:00 migration/1
    25     6 root      34  19     0    0     0 SWN     0  0.0  0.0   0:00 ksoftirqd/1
    26     7 root      0K   0     0    0     0 SW      0  0.0  0.0   0:00 watchdog/1
    27     8 root      0K   0     0    0     0 SW      0  0.0  0.0   0:00 migration/2
    28     9 root      39  19     0    0     0 SWN     0  0.0  0.0   0:00 ksoftirqd/2
    29    10 root      0K   0     0    0     0 SW      0  0.0  0.0   0:00 watchdog/2
    30    11 root      0K   0     0    0     0 SW      0  0.0  0.0   0:00 migration/3
    31    12 root      34  19     0    0     0 SWN     0  0.0  0.0   0:00 ksoftirqd/3
    32    13 root      0K   0     0    0     0 SW      0  0.0  0.0   0:00 watchdog/3
    33 [root@mail ~]# free -m
    34              total       used       free     shared    buffers     cached
    35 Mem:          2026        649       1377          0         16        290
    36 -/+ buffers/cache:        342       1684
    37 Swap:         2047          0       2047

    在使用 top -p 2499  没有了。

    不过还是很担心 因为怕病毒修改了系统的bin文件 哎还是精简测下这几天的服务器吧!

     到目前为止的检测还算正常

  • 相关阅读:
    前端线上项目汇总
    gulp构建工具学习汇总
    ES6知识点汇总
    页游技术点汇总中
    前后端方案汇总
    vim常用命令
    互联网哲学
    js调试技巧汇总中
    windows下Docker安装MySQL
    RabbitMQ几个常用面试题
  • 原文地址:https://www.cnblogs.com/patf/p/3143957.html
Copyright © 2011-2022 走看看