Ergebnis 1 bis 7 von 7

Thema: Virus oder Fehlalarm?

  1. #1
    Neues Mitglied
    Registriert seit
    27.10.2008
    Beiträge
    30

    Standard Virus oder Fehlalarm?

    Hallo Zusammen,

    hab jetzt auf meinem System mal nen rkhunter laufen lassen, mit folgendem Ergebnis:


    [ Rootkit Hunter version 1.3.4 ]

    Checking rkhunter data files...
    Checking file mirrors.dat [ No update ]
    Checking file programs_bad.dat [ No update ]
    Checking file backdoorports.dat [ No update ]
    Checking file suspscan.dat [ No update ]
    Checking file i18n/cn [ No update ]
    Checking file i18n/de [ No update ]
    Checking file i18n/en [ No update ]
    Checking file i18n/zh [ No update ]
    Checking file i18n/zh.utf8 [ No update ]
    [ Rootkit Hunter version 1.3.4 ]

    Checking system commands...

    Performing 'strings' command checks
    Checking 'strings' command [ OK ]

    Performing 'shared libraries' checks
    Checking for preloading variables [ None found ]
    Checking for preload file [ Not found ]
    Checking LD_LIBRARY_PATH variable [ Not found ]

    Performing file properties checks
    Checking for prerequisites [ Warning ]
    /bin/awk [ OK ]
    /bin/basename [ OK ]
    /bin/bash [ OK ]
    /bin/cat [ OK ]
    /bin/chmod [ OK ]
    /bin/chown [ OK ]
    /bin/cp [ OK ]
    /bin/csh [ OK ]
    /bin/date [ OK ]
    /bin/df [ OK ]
    /bin/dmesg [ OK ]
    /bin/echo [ OK ]
    /bin/ed [ OK ]
    /bin/egrep [ OK ]
    /bin/fgrep [ OK ]
    /bin/fuser [ OK ]
    /bin/grep [ OK ]
    /bin/ip [ OK ]
    /bin/kill [ OK ]
    /bin/logger [ OK ]
    /bin/login [ OK ]
    /bin/ls [ OK ]
    /bin/lsmod [ OK ]
    /bin/mail [ OK ]
    /bin/mktemp [ OK ]
    /bin/more [ OK ]
    /bin/mount [ OK ]
    /bin/mv [ OK ]
    /bin/netstat [ OK ]
    /bin/ps [ OK ]
    /bin/pwd [ OK ]
    /bin/rpm [ OK ]
    /bin/sed [ OK ]
    /bin/sh [ OK ]
    /bin/sort [ OK ]
    /bin/su [ OK ]
    /bin/touch [ OK ]
    /bin/uname [ OK ]
    /bin/gawk [ OK ]
    /bin/tcsh [ OK ]
    /usr/bin/awk [ OK ]
    /usr/bin/basename [ OK ]
    /usr/bin/chattr [ OK ]
    /usr/bin/chroot [ OK ]
    /usr/bin/csh [ OK ]
    /usr/bin/curl [ OK ]
    /usr/bin/cut [ OK ]
    /usr/bin/diff [ OK ]
    /usr/bin/dirname [ OK ]
    /usr/bin/du [ OK ]
    /usr/bin/ed [ OK ]
    /usr/bin/egrep [ OK ]
    /usr/bin/env [ OK ]
    /usr/bin/fgrep [ OK ]
    /usr/bin/file [ OK ]
    /usr/bin/find [ OK ]
    /usr/bin/grep [ OK ]
    /usr/bin/groups [ Warning ]
    /usr/bin/head [ OK ]
    /usr/bin/id [ OK ]
    /usr/bin/killall [ OK ]
    /usr/bin/last [ OK ]
    /usr/bin/lastlog [ OK ]
    /usr/bin/ldd [ Warning ]
    /usr/bin/less [ OK ]
    /usr/bin/lsattr [ OK ]
    /usr/bin/mail [ OK ]
    /usr/bin/md5sum [ OK ]
    /usr/bin/newgrp [ OK ]
    /usr/bin/passwd [ OK ]
    /usr/bin/perl [ OK ]
    /usr/bin/pstree [ OK ]
    /usr/bin/readlink [ OK ]
    /usr/bin/sed [ OK ]
    /usr/bin/sh [ OK ]
    /usr/bin/sha1sum [ OK ]
    /usr/bin/size [ OK ]
    /usr/bin/sort [ OK ]
    /usr/bin/stat [ OK ]
    /usr/bin/strings [ OK ]
    /usr/bin/tail [ OK ]
    /usr/bin/test [ OK ]
    /usr/bin/top [ OK ]
    /usr/bin/touch [ OK ]
    /usr/bin/tr [ OK ]
    /usr/bin/uniq [ OK ]
    /usr/bin/users [ OK ]
    /usr/bin/vmstat [ OK ]
    /usr/bin/w [ OK ]
    /usr/bin/watch [ OK ]
    /usr/bin/wc [ OK ]
    /usr/bin/wget [ OK ]
    /usr/bin/whatis [ OK ]
    /usr/bin/whereis [ OK ]
    /usr/bin/which [ OK ]
    /usr/bin/who [ OK ]
    /usr/bin/whoami [ OK ]
    /usr/bin/gawk [ OK ]
    /usr/bin/tcsh [ OK ]
    /usr/bin/mailx [ OK ]
    /sbin/checkproc [ OK ]
    /sbin/chkconfig [ Warning ]
    /sbin/depmod [ OK ]
    /sbin/ifconfig [ OK ]
    /sbin/ifdown [ OK ]
    /sbin/ifstatus [ OK ]
    /sbin/ifup [ Warning ]
    /sbin/init [ OK ]
    /sbin/insmod [ OK ]
    /sbin/ip [ OK ]
    /sbin/lsmod [ OK ]
    /sbin/modinfo [ OK ]
    /sbin/modprobe [ OK ]
    /sbin/nologin [ OK ]
    /sbin/rmmod [ OK ]
    /sbin/runlevel [ OK ]
    /sbin/sulogin [ OK ]
    /sbin/sysctl [ OK ]
    /usr/sbin/cron [ OK ]
    /usr/sbin/groupadd [ OK ]
    /usr/sbin/groupdel [ OK ]
    /usr/sbin/groupmod [ OK ]
    /usr/sbin/grpck [ OK ]
    /usr/sbin/pwck [ OK ]
    /usr/sbin/tcpd [ OK ]
    /usr/sbin/useradd [ OK ]
    /usr/sbin/userdel [ OK ]
    /usr/sbin/usermod [ OK ]
    /usr/sbin/vipw [ OK ]
    /usr/sbin/xinetd [ OK ]

    [Press <ENTER> to continue]

    Checking for rootkits...

    Performing check of known rootkit files and directories
    55808 Trojan - Variant A [ Not found ]
    ADM Worm [ Not found ]
    AjaKit Rootkit [ Not found ]
    aPa Kit [ Not found ]
    Apache Worm [ Not found ]
    Ambient (ark) Rootkit [ Not found ]
    Balaur Rootkit [ Not found ]
    BeastKit Rootkit [ Not found ]
    beX2 Rootkit [ Not found ]
    BOBKit Rootkit [ Not found ]
    CiNIK Worm (Slapper.B variant) [ Not found ]
    Danny-Boy's Abuse Kit [ Not found ]
    Devil RootKit [ Not found ]
    Dica-Kit Rootkit [ Not found ]
    Dreams Rootkit [ Not found ]
    Duarawkz Rootkit [ Not found ]
    Enye LKM [ Not found ]
    Flea Linux Rootkit [ Not found ]
    FreeBSD Rootkit [ Not found ]
    Fuck`it Rootkit [ Not found ]
    GasKit Rootkit [ Not found ]
    Heroin LKM [ Not found ]
    HjC Kit [ Not found ]
    ignoKit Rootkit [ Not found ]
    ImperalsS-FBRK Rootkit [ Not found ]
    IntoXonia-NG Rootkit [ Not found ]
    Irix Rootkit [ Not found ]
    Kitko Rootkit [ Not found ]
    Knark Rootkit [ Not found ]
    Li0n Worm [ Not found ]
    Lockit / LJK2 Rootkit [ Not found ]
    Mood-NT Rootkit [ Not found ]
    MRK Rootkit [ Not found ]
    Ni0 Rootkit [ Not found ]
    Ohhara Rootkit [ Not found ]
    Optic Kit (Tux) Worm [ Not found ]
    Oz Rootkit [ Not found ]
    Phalanx Rootkit [ Not found ]
    Phalanx Rootkit (strings) [ Not found ]
    Phalanx2 Rootkit [ Not found ]
    Phalanx2 Rootkit (extended tests) [ Not found ]
    Portacelo Rootkit [ Not found ]
    R3dstorm Toolkit [ Not found ]
    RH-Sharpe's Rootkit [ Not found ]
    RSHA's Rootkit [ Not found ]
    Scalper Worm [ Not found ]
    Sebek LKM [ Not found ]
    Shutdown Rootkit [ Not found ]
    SHV4 Rootkit [ Not found ]
    SHV5 Rootkit [ Not found ]
    Sin Rootkit [ Not found ]
    Slapper Worm [ Not found ]
    Sneakin Rootkit [ Not found ]
    Suckit Rootkit [ Not found ]
    SunOS Rootkit [ Not found ]
    SunOS / NSDAP Rootkit [ Not found ]
    Superkit Rootkit [ Not found ]
    TBD (Telnet BackDoor) [ Not found ]
    TeLeKiT Rootkit [ Not found ]
    T0rn Rootkit [ Not found ]
    Trojanit Kit [ Not found ]
    Tuxtendo Rootkit [ Not found ]
    URK Rootkit [ Not found ]
    Vampire Rootkit [ Not found ]
    VcKit Rootkit [ Not found ]
    Volc Rootkit [ Not found ]
    X-Org SunOS Rootkit [ Not found ]
    zaRwT.KiT Rootkit [ Not found ]

    Performing additional rootkit checks
    Suckit Rookit additional checks [ OK ]
    Checking for possible rootkit files and directories [ None found ]
    Checking for possible rootkit strings [ None found ]

    Performing malware checks
    Checking running processes for suspicious files [ Skipped ]
    Checking for login backdoors [ None found ]
    Checking for suspicious directories [ None found ]
    Checking for sniffer log files [ None found ]

    Performing trojan specific checks
    Checking for enabled xinetd services [ Warning ]

    Performing Linux specific checks
    Checking loaded kernel modules [ OK ]
    Checking kernel module names [ OK ]

    [Press <ENTER> to continue]

    Checking the network...

    Performing check for backdoor ports
    Checking for UDP port 2001 [ Not found ]
    Checking for TCP port 2006 [ Not found ]
    Checking for TCP port 2128 [ Not found ]
    Checking for TCP port 14856 [ Not found ]
    Checking for TCP port 47107 [ Not found ]
    Checking for TCP port 60922 [ Not found ]

    Performing checks on the network interfaces
    Checking for promiscuous interfaces [ None found ]

    [Press <ENTER> to continue]

    Checking the local host...

    Performing system boot checks
    Checking for local host name [ Found ]
    Checking for system startup files [ Found ]
    Checking system startup files for malware [ None found ]

    Performing group and account checks
    Checking for passwd file [ Found ]
    Checking for root equivalent (UID 0) accounts [ None found ]
    Checking for passwordless accounts [ None found ]
    Checking for passwd file changes [ Warning ]
    Checking for group file changes [ Warning ]
    Checking root account shell history files [ OK ]

    Performing system configuration file checks
    Checking for SSH configuration file [ Found ]
    Checking if SSH root access is allowed [ Warning ]
    Checking if SSH protocol v1 is allowed [ Not allowed ]
    Checking for running syslog daemon [ Found ]
    Checking for syslog configuration file [ Found ]
    Checking if syslog remote logging is allowed [ Not allowed ]

    Performing filesystem checks
    Checking /dev for suspicious file types [ Warning ]
    Checking for hidden files and directories [ Warning ]

    [Press <ENTER> to continue]

    Checking application versions...

    Checking version of GnuPG [ OK ]
    Checking version of Bind DNS [ OK ]
    Checking version of OpenSSL [ OK ]
    Checking version of PHP [ OK ]
    Checking version of ProFTPd [ OK ]
    Checking version of OpenSSH [ OK ]


    System checks summary
    =====================

    File properties checks...
    Required commands check failed
    Files checked: 130
    Suspect files: 4

    Rootkit checks...
    Rootkits checked : 112
    Possible rootkits: 0

    Applications checks...
    Applications checked: 6
    Suspect applications: 0

    The system checks took: 2 minutes and 2 seconds

    All results have been written to the logfile (/var/log/rkhunter.log)

    One or more warnings have been found while checking the system.
    Please check the log file (/var/log/rkhunter.log)

  2. #2
    Neues Mitglied
    Registriert seit
    27.10.2008
    Beiträge
    30

    Standard

    Ein Test mit chkrootkit ergab folgendes:

    INFECTED (PORTS: 465)
    eth0: PF_PACKET(/sbin/dhclient)
    The tty of the following user process(es) were not found
    in /var/run/utmp !
    ! RUID PID TTY CMD
    ! root 3245 tty5 /sbin/mingetty tty5
    ! root 3262 tty6 /sbin/mingetty tty6
    Habe ich wirklich was infiziert, oder können das auch Fehlalarme sein? Wie gehe ich jetzt am besten weiter vor?

  3. #3
    Forenbarbar Avatar von alariel
    Registriert seit
    02.03.2007
    Ort
    Hennef
    Beiträge
    3.434

    Standard

    Port Description: SMTP over TLS/SSL (was ssmtp)
    Schau doch von Hand nach, ob die angemäkelten Binaries auch da liegen, wo sie gesucht werden... bzw, ob die Permissions mit dem Rest in /usr/bin konform gehen.

    Aus dem Protokoll an sich würde ich jetzt nix ableiten können.
    Nebenbei, ist das ein dedizierter Server oder ein Virtueller?
    Klickibunti, zur Dunklen Seite dieser Weg Dich führt!
    Isediatur ignoratia vestra ac stupitiatae causa!
    Barbar - und stolz darauf!! ~***~ Nam et ipsa scientia potestas est!

  4. #4
    Neues Mitglied
    Registriert seit
    27.10.2008
    Beiträge
    30

    Standard

    OK, Port 465 ist SMTPS

    Die Permissions sind gleich den anderen Binaries in den Verzeichnissen.

    Ist nen dedizierter Server.

    Kann man sonst noch irgendwie prüfen oder testen?

  5. #5
    Forenbarbar Avatar von alariel
    Registriert seit
    02.03.2007
    Ort
    Hennef
    Beiträge
    3.434

    Standard

    Mich würd mal interessieren, wieso da die Warnings kommen... Hm...

    Ansonsten fiele mir auch auf Anhieb nichts ein zwecks weiterer Prüfung. Aber ich bin immer noch der Meinung, dass aus diesen Protokollen nichts darauf hindeutet.
    Klickibunti, zur Dunklen Seite dieser Weg Dich führt!
    Isediatur ignoratia vestra ac stupitiatae causa!
    Barbar - und stolz darauf!! ~***~ Nam et ipsa scientia potestas est!

  6. #6
    Neues Mitglied
    Registriert seit
    27.10.2008
    Beiträge
    30

    Standard

    Hab mal Herrn Google gefragt. rkhunter und chkrootkit sind da wohl ein wenig überempfindlich. Hab mir die Files mal genauer angeschaut, kann aber auch nichts Verdächtiges entdecken. Ich bin aber wohl auch nicht der Einzige, bei dem das Problem auftaucht. Scheint aber wirklich nichts ernstes zu sein.

    Trotzdem, vielen Dank fürs Bemühen!

    Wenns irgendwo ne Forumsbewertung gäbe, würdet Ihr von mir ne 1+ bekommen!!!

  7. #7
    Mitglied
    Registriert seit
    02.01.2008
    Ort
    Schläfrig-Holzbein
    Beiträge
    987

    Standard

    Zitat Zitat von Heloaenderer Beitrag anzeigen
    Wenns ne Forumsbewertung gäbe...
    Pekunia non olet
    Don't pay the ferryman,
    Until he gets you to the other side (Chris De Burgh)

Ähnliche Themen

  1. Spam oder Virus?
    Von BernhardL im Forum 1.2 international
    Antworten: 2
    Letzter Beitrag: 31.08.2007, 16:07
  2. [dreister Fake mit Virus ]Re: Submit a Virus Sample
    Von webeinspunktnull im Forum 1.2 international
    Antworten: 1
    Letzter Beitrag: 03.04.2004, 01:16
  3. Fake oder was???Subject: Da albanise Virus
    Von webeinspunktnull im Forum 4.2 Diskussion
    Antworten: 4
    Letzter Beitrag: 29.09.2003, 01:06
  4. Antworten: 1
    Letzter Beitrag: 03.06.2003, 18:55
  5. [???]Antigen found VIRUS= HTML.MimeExploit.Klez (CA(Vet)) virus
    Von webeinspunktnull im Forum 1.1 deutschsprachig
    Antworten: 4
    Letzter Beitrag: 12.01.2003, 21:28

Lesezeichen

Lesezeichen

Berechtigungen

  • Neue Themen erstellen: Nein
  • Themen beantworten: Nein
  • Anhänge hochladen: Nein
  • Beiträge bearbeiten: Nein
  •  
Partnerlink:
REDDOXX Anti-Spam Lösungen