As a bit of background, it seems that our server got infected with something and is being used to open a ton of TCP connections over a large range if IPs. I'm halfway through trying to track down how our server got infected now; my tale of woe has been outlined at 398639 for anyone who wants some additional information.
The current issue is I've found an Apache command "con.shs" that is routinely taking up 100% of our CPU (it's definitely possible it's related to our server compromise).
My question is if anyone knew what "con.shs" is and why it's running at 100%? No Google search has returned anything that might help.
We're running Centos 5.7 Final, and Apache 2.2.3 (with PHP and MySQL).
exefile is in/dev/shm, andcmdlinecontains/bin/bashs190.480, so it definitely looks suspicious. My problem now is what to do with that information. Do I delete those files? Is it possible to find out how it was installed? – dKen Jun 14 '12 at 13:22ps auxwf(orpstree) to see what forked it, and close that hole./dev/shmis a temporary filesystem, it'll get deleted on reboot anyway, so you need to stop it coming back. – Jay Jun 14 '12 at 13:55/usr/sbin/httpdforked the process, which isn't overly useful. Next step I guess is to find out which files were edited when the compromise occurred and see if I can track down the offending file (if there is one), before I blast everything away and rebuild? Have you got any reading suggestions for tracing issues like this? – dKen Jun 14 '12 at 14:16/tmpor/dev/shm. If this is the case, they are probably actively exploiting some kind of bug that allows them to do remote code execution but not be able to write this data to disk anywhere persistent. Take a look at youraccess_logfile and see if there's anything obvious (perhaps evenerror_logif their attack wasn't blind and used that fact). – Jay Jun 14 '12 at 15:07