I am running OSSEC and I just received this message Jan 19:
Code:
OSSEC HIDS Notification.
2010 Jan 19 07:36:36
Received From: warhorse->rootcheck
Rule: 510 fired (level 7) -> "Host-based anomaly detection event (rootcheck)."
Portion of the log(s):
Port '44378'(tcp) hidden. Kernel-level rootkit or trojaned version of netstat.
It seems similar to this issue:
http://www.mail-archive.com/ossec-list@ ... 02059.htmlI followed those suggestions and here are the results of the investigation.
Nmap reports this (note diff port number than e-mail):
Code:
Starting Nmap 5.00 ( http://nmap.org ) at 2010-01-20 18:56 Central Standard Time
Stats: 0:00:01 elapsed; 0 hosts completed (0 up), 1 undergoing Ping Scan
Ping Scan Timing: About 12.50% done; ETC: 18:56 (0:00:00 remaining)
Interesting ports on <hostname> (<IP>):
PORT STATE SERVICE
33477/tcp filtered unknown
Nmap done: 1 IP address (1 host up) scanned in 2.06 seconds
Strings reports nothing:
Code:
# strings /bin/netstat | grep 33477
# strings /bin/netstat | grep 44378
#
The inode numbers appear to be in the correct range:
Code:
ls -asli /bin | sort
...
32846 48 -rwxr-xr-x 1 root root 46616 Oct 31 23:23 chgrp
32847 8 -rwxr-xr-x 1 root root 5400 Jun 5 2009 mountpoint
32848 108 -rwxr-xr-x 1 root root 105064 Jun 5 2009 netstat
32849 60 -rwxr-xr-x 1 root root 55304 Oct 31 23:22 sed
32850 4 -rwxr-xr-x 1 root root 61 Jun 5 2009 gunzip
...
Is there any other investigation I should do? Is it safe to conclude that the server has NOT been actually compromised? I am guessing that the rule is firing off because of large numbers of SMTP incoming connections...
Thanks!