1585f7d132
Changes to be committed: new file: ZabbixSetup.bat new file: ZabbixWin.sls new file: sanitSalt.sh new file: sanitize.sls new file: ubuVpnSrv.sls
59 lines
2.0 KiB
Bash
Executable File
59 lines
2.0 KiB
Bash
Executable File
#!/bin/bash
|
|
## Executing this script is not a guarantee for a secure host!
|
|
## This script is a collection of the junk I have found on my hosts and what
|
|
## the SaltStack community gave as input. We have seen this attack evolve.
|
|
## Please have a very close look at your systems and consider reinstalling them
|
|
## to be absolutely sure you are free of malware.
|
|
|
|
# 2020.05.05
|
|
# script trovato dopo attacco su server salt e gestiti
|
|
# https://gist.github.com/itskenny0/df20bdb24a2f49b318a91195634ed3c6#file-cleanup-sh
|
|
|
|
# remove crontab persistence
|
|
for i in 54.36.185.99 217.8.117.137 176.31.60.91 217.12.210.192 54.36.185.99 54.36.185.99 89.223.121.139 torsocks anagima3 sa.sh$ c.sh$ selcdn.ru; do
|
|
crontab -l | sed "/$i/d" | crontab -
|
|
done
|
|
# warning! these IPs change! please manually verify your crontab with crontab -l
|
|
# to make sure there are no other malicious entries
|
|
|
|
# remove ssh public key added by v5
|
|
sed -i '/PbNwmJNcFwSLF12fFBoF\/$/d' /root/.ssh/authorized_keys
|
|
|
|
# remove all the trash
|
|
rm /tmp/salt-minions
|
|
rm /tmp/salt-store
|
|
rm /var/tmp/salt-store
|
|
rm /etc/selinux/config
|
|
rm -rf /tmp/.ICE*
|
|
rm -rf /var/tmp/.ICE*
|
|
rm /root/.wget-hsts
|
|
|
|
# create apparmor profiles to prevent execution
|
|
echo 'profile salt-store /var/tmp/salt-store { }' | tee /etc/apparmor.d/salt-store
|
|
apparmor_parser -r -W /etc/apparmor.d/salt-store
|
|
|
|
echo 'profile salt-minions /tmp/salt-minions { }' | tee /etc/apparmor.d/salt-minions
|
|
apparmor_parser -r -W /etc/apparmor.d/salt-minions
|
|
|
|
# reenable nmi watchdog
|
|
sysctl kernel.nmi_watchdog=1
|
|
echo '1' >/proc/sys/kernel/nmi_watchdog
|
|
sed -i '/kernel.nmi_watchdog/d' /etc/sysctl.conf
|
|
|
|
# disable hugepages
|
|
sysctl -w vm.nr_hugepages=0
|
|
|
|
# enable apparmor
|
|
systemctl enable apparmor
|
|
systemctl start apparmor
|
|
|
|
# kill processes and reenabler
|
|
kill -9 $(ps faux | grep /tmp/.ICE | grep -v grep | awk '{print $2}')
|
|
ps aux | grep ICEd | grep -v grep | cut -c5-15 | xargs -n 1 kill -9
|
|
killall -9 salt-minions
|
|
killall -9 salt-store
|
|
|
|
# fix syslog
|
|
touch /var/log/syslog
|
|
service rsyslog restart
|