Answer the question
In order to leave comments, you need to log in
Are there really viruses on Archa?
Sobsna, because of my wild paranoia, I’m afraid to leave my computer next to my stepfather (you never know what he’ll do there), and once I left it for literally a minute (forgetting to lock the screen, but she covered the lid) and immediately ran to look for the virus through rkhunter. Here is the log with warnings
[[email protected] ~]$ sudo cat /var/log/rkhunter.log | grep -A5 "\[ Warning \]"
[sudo] пароль для phoenix:
[21:23:59] /usr/bin/egrep [ Warning ]
[21:23:59] Warning: The command '/usr/bin/egrep' has been replaced by a script: /usr/bin/egrep: POSIX shell script, ASCII text executable
[21:23:59] /usr/bin/env [ OK ]
[21:24:00] /usr/bin/fgrep [ Warning ]
[21:24:00] Warning: The command '/usr/bin/fgrep' has been replaced by a script: /usr/bin/fgrep: POSIX shell script, ASCII text executable
[21:24:01] /usr/bin/file [ OK ]
[21:24:01] /usr/bin/find [ OK ]
[21:24:02] /usr/bin/fsck [ OK ]
[21:24:02] /usr/bin/fuser [ OK ]
--
[21:24:12] /usr/bin/ldd [ Warning ]
[21:24:12] Warning: The command '/usr/bin/ldd' has been replaced by a script: /usr/bin/ldd: Bourne-Again shell script, ASCII text executable
[21:24:13] /usr/bin/less [ OK ]
[21:24:13] /usr/bin/logger [ OK ]
[21:24:14] /usr/bin/login [ OK ]
[21:24:14] /usr/bin/ls [ OK ]
--
[21:25:18] /usr/bin/vendor_perl/GET [ Warning ]
[21:25:18] Warning: The command '/usr/bin/vendor_perl/GET' has been replaced by a script: /usr/bin/vendor_perl/GET: Perl script text executable
[21:25:53] /usr/lib/systemd/systemd [ OK ]
[21:25:53] /etc/rkhunter.conf [ OK ]
[21:27:50]
[21:27:50] Info: Starting test name 'rootkits'
--
[21:33:11] Checking for suspicious (large) shared memory segments [ Warning ]
[21:33:11] Warning: The following suspicious (large) shared memory segments have been found:
[21:33:11] Process: /usr/lib/libreoffice/program/soffice.bin PID: 2389 Owner: phoenix Size: 16MB (configured size allowed: 1,0MB)
[21:33:11] Process: /opt/sublime_text/sublime_text PID: 1772 Owner: phoenix Size: 64MB (configured size allowed: 1,0MB)
[21:33:12]
[21:33:12] Info: Starting test name 'trojans'
--
[21:35:14] Checking for passwd file changes [ Warning ]
[21:35:14] Warning: Unable to check for passwd file differences: no copy of the passwd file exists.
[21:35:14]
[21:35:14] Info: Starting test name 'group_changes'
[21:35:14] Checking for group file changes [ Warning ]
[21:35:14] Warning: Unable to check for group file differences: no copy of the group file exists.
[21:35:14] Checking root account shell history files [ OK ]
[21:35:15]
[21:35:15] Info: Starting test name 'system_configs'
[21:35:15] Performing system configuration file checks
--
[21:35:15] Checking if SSH root access is allowed [ Warning ]
[21:35:16] Warning: The SSH configuration option 'PermitRootLogin' has not been set.
The default value may be 'yes', to allow root access.
[21:35:16] Checking if SSH protocol v1 is allowed [ Warning ]
[21:35:16] Warning: The SSH configuration option 'Protocol' has not been set.
The default value may be '2,1', to allow the use of protocol version 1.
[21:35:16] Checking for other suspicious configuration settings [ None found ]
[21:35:16]
[21:35:16] Info: Starting test name 'system_configs_syslog'
--
[21:35:36] Checking for hidden files and directories [ Warning ]
[21:35:36] Warning: Hidden file found: /etc/.#gshadowdU1eh2: ASCII text
[21:35:36] Warning: Hidden file found: /etc/.updated: ASCII text
[21:35:36] Warning: Hidden file found: /usr/share/man/man5/.k5login.5.gz: gzip compressed data, max compression, from Unix, truncated
[21:35:37] Warning: Hidden file found: /usr/share/man/man5/.k5identity.5.gz: gzip compressed data, max compression, from Unix, truncated
[21:35:37] Checking for missing log files [ Skipped ]
Answer the question
In order to leave comments, you need to log in
Put the same system on a virtual machine and try to specifically infect this machine with a virus yourself, so purposefully spend a couple of hours for this, and after nothing succeeds, calm down and do not torment the system.
I envy your stepfather's skill, if he pulled off such a business in a couple of minutes :)
paranoia needs to be treated, otherwise it won’t take long to go to the psychiatric hospital
"Here it is, here it is, here it is spring
Like paranoia!" (C) Nikolai
Noskov moreover, egrep and fgrep are simple scripts to make sure that they are not viruses - just look at them, yopt
#!/bin/sh
exec /bin/grep -F "[email protected]"
Kill it and forget it!
And do not take out your brain with non-existent problems!
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question