LSMS/scripts/search_non_kthreads.py

101 lines
2.9 KiB
Python
Raw Normal View History

2021-12-27 13:52:26 +01:00
#!/usr/bin/env python3
# written by sqall
# twitter: https://twitter.com/sqall01
# blog: https://h4des.org
# github: https://github.com/sqall01
#
2021-12-30 20:48:17 +01:00
# Licensed under the MIT License.
2021-12-27 13:52:26 +01:00
"""
Short summary:
Malware will name itself with [brackets] to impersonate a Linux kernel thread.
Any Linux process that looks like a [kernel thread] should have an empty maps file.
Site note:
2022-01-05 20:16:57 +01:00
when using ps auxwf | grep "\\[" they are children of [kthreadd]
2021-12-27 13:52:26 +01:00
Requirements:
None
Reference:
https://twitter.com/CraigHRowland/status/1232399132632813568
https://www.sandflysecurity.com/blog/detecting-linux-kernel-process-masquerading-with-command-line-forensics/
"""
import os
2022-01-05 20:16:57 +01:00
from lib.util import output_error, output_finding
# Read configuration.
2021-12-27 13:52:26 +01:00
try:
from config.config import ALERTR_FIFO, FROM_ADDR, TO_ADDR
from config.search_non_kthreads import NON_KTHREAD_WHITELIST, ACTIVATED
except:
ALERTR_FIFO = None
FROM_ADDR = None
TO_ADDR = None
NON_KTHREAD_WHITELIST = []
ACTIVATED = True
def search_suspicious_process():
# Decide where to output results.
print_output = False
if ALERTR_FIFO is None and FROM_ADDR is None and TO_ADDR is None:
print_output = True
if not ACTIVATED:
if print_output:
print("Module deactivated.")
return
# Iterate over all processes that have a "[".
fd = os.popen("ps auxw | grep \\\\[ | awk '{print $2}'")
pids_raw = fd.read().strip()
fd.close()
for pid in pids_raw.split("\n"):
# Get process name of pid.
fd = os.popen("ps u -p %s" % pid)
ps_output = fd.read().strip()
fd.close()
fd = os.popen("ps u -p %s | awk '{$1=$2=$3=$4=$5=$6=$7=$8=$9=$10=\"\"; print $0}'" % pid)
process_name_raw = fd.read().strip()
fd.close()
for process_name in process_name_raw.split("\n"):
process_name = process_name.strip()
# Ignore COMMAND since it is part of the headline of ps output.
if process_name == "COMMAND":
continue
# Check if we have whitelisted the process
# (e.g., [lxc monitor] /var/lib/lxc satellite).
elif process_name in NON_KTHREAD_WHITELIST:
continue
# Only consider process names that start with a "["
# (e.g., "avahi-daemon: running [towelie.local]"" does not)
elif process_name.startswith("["):
file_path = "/proc/%s/maps" % pid
try:
with open(file_path, 'rt') as fp:
data = fp.read()
if data == "":
continue
except Exception as e:
2022-01-05 20:16:57 +01:00
output_error(__file__, str(e))
2021-12-27 13:52:26 +01:00
continue
2022-01-05 20:16:57 +01:00
message = "Process with pid '%s' suspicious.\n\n" % pid
message += ps_output
output_finding(__file__, message)
2021-12-27 13:52:26 +01:00
if __name__ == '__main__':
search_suspicious_process()