mirror of
https://github.com/sqall01/LSMS.git
synced 2024-11-17 01:28:25 +01:00
62 lines
1.4 KiB
Python
Executable file
62 lines
1.4 KiB
Python
Executable file
#!/usr/bin/env python3
|
|
|
|
# written by sqall
|
|
# twitter: https://twitter.com/sqall01
|
|
# blog: https://h4des.org
|
|
# github: https://github.com/sqall01
|
|
#
|
|
# Licensed under the MIT License.
|
|
|
|
"""
|
|
Short summary:
|
|
Search running programs whose binary was deleted. Indicator of malicious programs.
|
|
|
|
Requirements:
|
|
None
|
|
"""
|
|
|
|
import os
|
|
|
|
from lib.util import output_finding
|
|
|
|
# Read configuration.
|
|
try:
|
|
from config.config import ALERTR_FIFO, FROM_ADDR, TO_ADDR
|
|
from config.search_deleted_exe import ACTIVATED
|
|
except:
|
|
ALERTR_FIFO = None
|
|
FROM_ADDR = None
|
|
TO_ADDR = None
|
|
ACTIVATED = True
|
|
|
|
|
|
def search_deleted_exe_files():
|
|
|
|
# Decide where to output results.
|
|
print_output = False
|
|
if ALERTR_FIFO is None and FROM_ADDR is None and TO_ADDR is None:
|
|
print_output = True
|
|
|
|
if not ACTIVATED:
|
|
if print_output:
|
|
print("Module deactivated.")
|
|
return
|
|
|
|
# Get all suspicious ELF files.
|
|
fd = os.popen("ls -laR /proc/*/exe 2> /dev/null | grep -v memfd: | grep \\(deleted\\)")
|
|
suspicious_exe_raw = fd.read().strip()
|
|
fd.close()
|
|
|
|
suspicious_exes = []
|
|
if suspicious_exe_raw.strip():
|
|
suspicious_exes.extend(suspicious_exe_raw.strip().split("\n"))
|
|
|
|
if suspicious_exes:
|
|
message = "Deleted executable file(s) found:\n\n"
|
|
message += "\n".join(suspicious_exes)
|
|
|
|
output_finding(__file__, message)
|
|
|
|
|
|
if __name__ == '__main__':
|
|
search_deleted_exe_files()
|