I am currently serving a client with a unmanaged VPS running cpanel / whm and I have full root access. I seem to keep getting rid of this particular malware script issue, but it keeps coming back.
I've eliminated the obvious files that were infected, even did a thorough scan with jamss.php to find and eliminate some files that had injected code, now when running this command:
grep cwd /var/log/exim_mainlog | grep -v /var/spool | awk -F"cwd=" '{print $2}' | awk '{print $1}' | sort | uniq -c | sort -n
I get a listing like so:
1 /home/*siteuser*/public_html/*sitename*
4 /usr/local/cpanel/logs
11 /root
476 /etc/csf
13990 /usr/local/cpanel/whostmgr/docroot
50844 /
75844 /home/*siteuser*/public_html/*sitename*/templates/beez3/language
The last line, I found a script and was able to eliminate it, however, mail keeps churning and the second to the last line seems to be the culprit. That number keeps increasing on refresh, but it does not show a path, but rather just a "/" meaning root?
Any assistance to track down would be greatly appreciated!
I've eliminated the obvious files that were infected, even did a thorough scan with jamss.php to find and eliminate some files that had injected code, now when running this command:
grep cwd /var/log/exim_mainlog | grep -v /var/spool | awk -F"cwd=" '{print $2}' | awk '{print $1}' | sort | uniq -c | sort -n
I get a listing like so:
1 /home/*siteuser*/public_html/*sitename*
4 /usr/local/cpanel/logs
11 /root
476 /etc/csf
13990 /usr/local/cpanel/whostmgr/docroot
50844 /
75844 /home/*siteuser*/public_html/*sitename*/templates/beez3/language
The last line, I found a script and was able to eliminate it, however, mail keeps churning and the second to the last line seems to be the culprit. That number keeps increasing on refresh, but it does not show a path, but rather just a "/" meaning root?
Any assistance to track down would be greatly appreciated!