Send mail to scripts owner (victims)
Posted: 14 Jun 2011, 11:15
scan report can mail to upload script owner's (victims's) email
so user can take a look into it.
so user can take a look into it.
Peer support forums for ConfigServer Scripts
https://mail.forum.configserver.com/
Code: Select all
From: support@XXXXX.COM
To: [user]
CC: [to]
Subject: Security Scan detected possible infection. (Hits:[hits]) (Viruses:[viruses]) (Fingerprints:[fingerprints])
Time : [time]
User Contact: [user]
Our security scanner has detected a potential problem with your site. A file recently
uploaded or installed on your site, may have been quarantined because it triggered one of our
filters. More information is listed below, however, you can contact us for more details on the
file(s) in question.
If you did NOT recently upload or make any changes to your site, (see date/time stamp above),
then please immediately change any and all passwords for your online accounts.
Please also scan your computer(s) immediately for infections, and remove any you find.
If you don't already have them, please download and install the following 2 (FREE) programs
to help you in finding and eradicating any infections.
Spybot S&D (Search & Destroy): www.safer-networking.org/dl/
Malware Bytes Anti-Malware: http://www.malwarebytes.org/lp/malware_lp_form/
Below is for internal use only:
[text]
Thank you,
SUPPORT
Code: Select all
2012-11-20 14:22:53 1TauLN-0000MD-T5 <= root@web22.xxxx.com H=(localhost.localdomain) [127.0.0.1]:49058 I=[127.0.0.1]:25 P=esmtp S=2385 T="Security Scan detected possible infection. (Hits:1) (Viruses:0) (Fingerprints:1)" from <root@web22.xxxx.com> for root@xxxx.com
2012-11-20 14:22:53 cwd=/var/spool/exim 3 args: /usr/sbin/exim -Mc 1TauLN-0000MD-T5
2012-11-20 14:22:53 1TauLN-0000MD-T5 SMTP connection identification H=localhost A=127.0.0.1 P=49058 M=1TauLN-0000MD-T5 U=root ID=0 S=root B=authenticated_local_user
2012-11-20 14:22:54 1TauLN-0000MD-T5 => root@xxxx.com F=<root@web22.xxxx.com> P=<root@web22.xxxx.com> R=lookuphost T=remote_smtp S=2857 H=smtp.xxxx.com [xxx.xxx.xxx.xxx]:25 X=TLSv1:DHE-RSA-AES256-SHA:256 CV=no DN="/C=US/ST=XXXXX/L=XXXXXXXXXX/O=XXXX.COM, Inc./CN=smtp-a.xxxx.com/emailAddress=nobody@xxxx.com" C="250 Ok: queued as 190361700F7" QT=1s DT=0s
2012-11-20 14:22:54 1TauLN-0000MD-T5 Completed QT=1s
Code: Select all
----------- SCAN REPORT -----------
(/usr/sbin/cxs --www --smtp --options mMOLfSGchexdnwZDR --Wstart --filemax 50000 --ignore /etc/cxs/cxs.ignore --sizemax 500000 --xtra /etc/cxs/cxs.xtra --summary --Wrateignore 0 --quarantine /backups/quarantined_by_cxs --Wloglevel 0 --voptions mfhexT --mail cpadmin@xxxx.com --logfile /var/log/cxs.log --quiet --timemax 30 --qoptions mMchv --template cxs.template --doptions Mv --virusscan --Wsleep 3 --report /var/log/cxs.scan --Wmaxchild 3 --allusers --throttle 4 --clamdsock /var/clamd --Wrefresh 7 --exploitscan)
cxswatch Scanning /home/USERNAME/public_html/masrer/media/swf.php:
# (quarantined to /quarantined_by_cxs/scan/USERNAME/swf.php.1356696985_1) ClamAV detected virus = [Trojan.PHP-43]:
'/home/USERNAME/public_html/masrer/media/swf.php'
----------- SCAN SUMMARY -----------
Scanned directories: 0
Scanned files: 1
Ignored items: 0
Suspicious matches: 1
Viruses found: 1
Fingerprint matches: 0
Data scanned: 0.02 MB
Scan Time: 0.013 sec (including 2 throttle sleeps)
Code: Select all
cxswatch Scanning /home/USERNAME/public_html/masrer/media/swf.php:
# (quarantined to /quarantined_by_cxs/scan/USERNAME/swf.php.1356696985_1) ClamAV detected virus = [Trojan.PHP-43]:
'/home/USERNAME/public_html/masrer/media/swf.php'
----------- SCAN SUMMARY -----------
Scanned directories: 0
Scanned files: 1
Ignored items: 0
Suspicious matches: 1
Viruses found: 1
Fingerprint matches: 0
Data scanned: 0.02 MB
Scan Time: 0.013 sec (including 2 throttle sleeps)