Eric,
        We do have clamav installed and operational, but I agree this could
be from something already in a mailbox.  When we configured this machine we
copied a lot of messages from POP accounts to IMAP.

The tmp directory also has "m", "m.1", "m.2" as well as "dude.txt" and all
are infected.

If this is already here, obviously we cannot check it, but I need to make
sure we do not get any others.  So ClamAV should find them, correct.  Could
they arrive via Web anomaly?  We only have the Qmail-Toaster Admin and
Webmail active on this machine.

Cheers

-----Original Message-----
From: Eric Shubert [mailto:e...@shubes.net] 
Sent: Tuesday, 12 April 2011 10:05 AM
To: qmailtoaster-list@qmailtoaster.com
Subject: [qmailtoaster] Re: Perl Bot

On 04/11/2011 04:40 PM, Mike Canty wrote:
> Eric,
>       Thanks for the response.
>
> The Anti-Virus I am using is removing the files, as they are detected, so
> it's a bit hard to tell.  They are actioned late at night, so we are not
> looking then, however, something must be setting them there.
>
> There is one text file still in the "/tmp/" directory, that is infected
and
> this is owned by apache.  So is this a Webmail item?
>
> -rw-r--r-- 1 apache apache 28026 Apr  9 22:18 dude.txt

That's what it appears to be.

I'm a little surprised that clamav did not find this one. Do you have 
that turned off for some reason, or did it miss this? It's possible that 
if you got one in a mailbox that sneaked in before clamav had a 
signature for it, that every time it's opened by the user using webmail 
that it's putting the file back in the /tmp directory.

The filename dude.txt is a little suspicious to me though. I would 
expect SM to use some sort of unique name for an attachment, if that's 
what it is.

I'm thinking now that it's perhaps something not even coming from email. 
Could it be coming from apache via some other route? Do you have apache 
running anything besides the stock QMT stuff? Roundcube perhaps?

> Trying to "cat" the file brought back information from our AV
>
> cat: dude.txt: Operation not permitted
> [root@msrverpd tmp]#
> ********************** Sophos Anti-Virus Alert ***********************
> Virus "Mal/PerlBot-A" detected in file
> "/tmp/dude.txt".
>
> Access to the file has been denied
> Please contact your IT department.
> **********************************************************************
>
> At least we know we are protected.

That's good.

> As for the AV on the mailboxes, are you talking about the server side or
the
> client side?  We run Sophos AV on all clients.

Server side. /home/vpopmail/domains/*/*/Maildir/* files, recursively.

-- 
-Eric 'shubes'


----------------------------------------------------------------------------
-----
Qmailtoaster is sponsored by Vickers Consulting Group
(www.vickersconsulting.com)
    Vickers Consulting Group offers Qmailtoaster support and installations.
      If you need professional help with your setup, contact them today!
----------------------------------------------------------------------------
-----
     Please visit qmailtoaster.com for the latest news, updates, and
packages.
     
      To unsubscribe, e-mail: qmailtoaster-list-unsubscr...@qmailtoaster.com
     For additional commands, e-mail:
qmailtoaster-list-h...@qmailtoaster.com




---------------------------------------------------------------------------------
Qmailtoaster is sponsored by Vickers Consulting Group 
(www.vickersconsulting.com)
    Vickers Consulting Group offers Qmailtoaster support and installations.
      If you need professional help with your setup, contact them today!
---------------------------------------------------------------------------------
     Please visit qmailtoaster.com for the latest news, updates, and packages.
     
      To unsubscribe, e-mail: qmailtoaster-list-unsubscr...@qmailtoaster.com
     For additional commands, e-mail: qmailtoaster-list-h...@qmailtoaster.com


Reply via email to