Warning: Undefined variable $reporternya in /var/www/saksenengku/wp-content/themes/Newspaper/functions.php on line 230
27.8 C
Jakarta
Minggu, 13 Oktober 2024

Install Linux Malware Detect & ClamAV on Debian

LMD (Linux Malware Detect) adalah pendeteksi malware open source untuk sistem operasi Linux. LMD dirancang khusus untuk lingkungan hosting terutama bagi pengguna VPS Hosting standalone bersama untuk mendeteksi dan menghapus ancaman Malware.

Bagi pengguna Debian/ubuntu, LMD tidak tersedia di repositori dasar sebagai paket yang dibuat sebelumnya, tetapi Anda bisa mendapatkan LMD sebagai tarball dari situs web proyek resmi.

Unduh versi terbaru LMD di link Official berikut:
Linux Malware Detect Ver (v1.6.2) merupakan versi yang terbaru

Berikut langkah Instalasinya (Lebih baik menggunakan root access)

1. Download package dengan curl:

root@saksenengku:~# cd /tmp/
root@saksenengku:/tmp# curl -O http://www.rfxn.com/downloads/maldetect-current.tar.gz
  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
                                 Dload  Upload   Total   Spent    Left  Speed
100 1512k  100 1512k    0     0  2302k      0 --:--:-- --:--:-- --:--:-- 2306k

2. Unpack tarball file

root@saksenengku:/tmp# tar -zxvf maldetect-current.tar.gz
root@saksenengku:/tmp# cd maldetect-1.6.2/
root@saksenengku:/tmp/maldetect-1.6.4# ./install.sh
Created symlink /etc/systemd/system/multi-user.target.wants/maldet.service → /usr/lib/systemd/system/maldet.service.
update-rc.d: error: unable to read /etc/init.d/maldet
Linux Malware Detect v1.6.4
            (C) 2002-2019, R-fx Networks <proj@r-fx.org>
            (C) 2019, Ryan MacDonald <ryan@r-fx.org>
This program may be freely redistributed under the terms of the GNU GPL

installation completed to /usr/local/maldetect
config file: /usr/local/maldetect/conf.maldet
exec file: /usr/local/maldetect/maldet
exec link: /usr/local/sbin/maldet
exec link: /usr/local/sbin/lmd
cron.daily: /etc/cron.daily/maldet
maldet(5515): {sigup} performing signature update check...
maldet(5515): {sigup} local signature set is version 201907043616
maldet(5515): {sigup} new signature set 202111222873613 available
maldet(5515): {sigup} downloading https://cdn.rfxn.com/downloads/maldet-sigpack.tgz
maldet(5515): {sigup} downloading https://cdn.rfxn.com/downloads/maldet-cleanv2.tgz
maldet(5515): {sigup} verified md5sum of maldet-sigpack.tgz
maldet(5515): {sigup} unpacked and installed maldet-sigpack.tgz
maldet(5515): {sigup} verified md5sum of maldet-clean.tgz
maldet(5515): {sigup} unpacked and installed maldet-clean.tgz
maldet(5515): {sigup} signature set update completed
maldet(5515): {sigup} 17258 signatures (14436 MD5 | 2039 HEX | 783 YARA | 0 USER)

3. Konfigurasi Maldet
Konfigurasi menggunakan vi atau nano

root@saksenengku:~# vi /usr/local/maldetect/conf.maldet
# Enable Email Alerting
email_alert="1"

# Email Address in which you want to receive scan reports
email_addr="you@domain.com"

# Use with ClamAV
scan_clamscan="1"

# Enable scanning for root-owned files. Set 1 to disable.
scan_ignore_root="0"

# Move threats to quarantine
quarantine_hits="1"

# Clean string based malware injections
quarantine_clean="1"

# Suspend user if malware found. 
quarantine_suspend_user="1"

# Minimum userid value that be suspended
quarantine_suspend_user_minuid="500"

Disamping menggunakan Maldet, anda bisa mix juga dengan menggunakan ClamAV dengan Instalasi sbb:

root@saksenengku:~# apt-get -y install clamav clamav-daemon clamdscan

Secara Default ClamAV dengan LMD sudah aktiv

Baca Juga:  Instalasi Webmin di server AWS EC2

Untuk manual Scan menggunakan Opsi sbb:

root@saksenengku:~# clamscan -i -r ~/

4. Update & check signature Linux VPS anda dengan LMD

root@saksenengku:~# maldet -d
Linux Malware Detect v1.6.4
(C) 2002-2019, R-fx Networks <proj@rfxn.com>
(C) 2019, Ryan MacDonald <ryan@rfxn.com>
This program may be freely redistributed under the terms of the GNU GPL v2

maldet(7703): {update} checking for available updates...
maldet(7703): {update} hashing install files and checking against server...
maldet(7703): {update} latest version already installed.
root@saksenengku:~# maldet -u
Linux Malware Detect v1.6.4
            (C) 2002-2019, R-fx Networks <proj@rfxn.com>
            (C) 2019, Ryan MacDonald <ryan@rfxn.com>
This program may be freely redistributed under the terms of the GNU GPL v2

maldet(7843): {sigup} performing signature update check...
maldet(7843): {sigup} local signature set is version 202111222873613
maldet(7843): {sigup} latest signature set already installed.

5. Scanning Linux VPS anda dengan LMD
Commandnya sbb:
maldet -a [folder yang akan di scan]
Defaultnya maldet -a /tmp

Contoh berikut folder yg terkena malware

root@saksenengku:~# maldet -a /tmp
Linux Malware Detect v1.6.4
(C) 2002-2019, R-fx Networks <proj@rfxn.com>
(C) 2019, Ryan MacDonald <ryan@rfxn.com>
This program may be freely redistributed under the terms of the GNU GPL v2

maldet(8051): {scan} signatures loaded: 17258 (14436 MD5 | 2039 HEX | 783 YARA | 0 USER)
maldet(8051): {scan} building file list for /tmp, this might take awhile...
maldet(8051): {scan} setting nice scheduler priorities for all operations: cpunice 19 , ionice 6
maldet(8051): {scan} file list completed in 0s, found 90 files...
maldet(8051): {scan} found clamav binary at /usr/bin/clamscan, using clamav scanner engine...
maldet(8051): {scan} scan of /tmp (90 files) in progress...
maldet(8051): {clean} could not find clean rule for hit php.gzbase64.inject or file /usr/local/maldetect/quarantine/rfxn.yara.510915085 no longer exists.
maldet(8051): {scan} processing scan results for hits: 1 hits 0 cleanedmaldet(8051): {clean} could not find clean rule for hit php.gzbase64.inject or file /usr/local/maldetect/quarantine/gzbase64.inject.unclassed.228613307 no longer exists.
maldet(8051): {scan} processing scan results for hits: 2 hits 0 cleanedmaldet(8051): {clean} could not find clean rule for hit php.gzbase64.inject or file /usr/local/maldetect/quarantine/maldetect-current.tar.gz.2215023982 no longer exists.
maldet(8051): {scan} processing scan results for hits: 3 hits 0 cleaned
maldet(8051): {scan} scan completed on /tmp: files 90, malware hits 3, cleaned hits 0, time 1s
maldet(8051): {scan} scan report saved, to view run: maldet --report 211125-1101.8051

Ulangi lagi Scanning nya sampai semua benar-benar clean tidak ada malware hit

maldet(8580): {scan} scan completed on /tmp: files 84, malware hits 0, cleaned hits 0, time 1s
maldet(8580): {scan} scan report saved, to view run: maldet --report 211125-1103.8580

Menampilkan Report yang terkena malware sbb:

root@saksenengku:~# maldet --report 211125-1101.8051
HOST:      saksenengku.com
SCAN ID:   211125-1101.8051
STARTED:   Nov 25 2021 11:01:05 +0700
COMPLETED: Nov 25 2021 11:01:06 +0700
ELAPSED:   1s [find: 0s]

PATH:          /tmp
TOTAL FILES:   90
TOTAL HITS:    3
TOTAL CLEANED: 0

FILE HIT LIST:
{HEX}php.gzbase64.inject.452 : /tmp/maldetect-1.6.4/files/sigs/rfxn.yara => /usr/local/maldetect/quarantine/rfxn.yara.510915085
{HEX}php.gzbase64.inject.452 : /tmp/maldetect-1.6.4/files/clean/gzbase64.inject.unclassed => /usr/local/maldetect/quarantine/gzbase64.inject.unc$
{HEX}php.gzbase64.inject.452 : /tmp/maldetect-current.tar.gz => /usr/local/maldetect/quarantine/maldetect-current.tar.gz.2215023982
===============================================
Linux Malware Detect v1.6.4 < proj@rfxn.com >

Semoga Artikel ini berguna & membantu teman-teman yang menggunakan VPS Linux khususnya yang terkena serangan Malware

Baca Juga:  Eksploitasi berbahaya Chrome zero-day ditemukan, perbarui browser Anda sekarang

Salam

Saksenengku Network

LMD (Linux Malware Detect) adalah pendeteksi malware open source untuk sistem operasi Linux. LMD dirancang khusus untuk lingkungan hosting terutama bagi pengguna VPS Hosting standalone bersama untuk mendeteksi dan menghapus ancaman Malware.

Bagi pengguna Debian/ubuntu, LMD tidak tersedia di repositori dasar sebagai paket yang dibuat sebelumnya, tetapi Anda bisa mendapatkan LMD sebagai tarball dari situs web proyek resmi.

Unduh versi terbaru LMD di link Official berikut:
Linux Malware Detect Ver (v1.6.2) merupakan versi yang terbaru

Berikut langkah Instalasinya (Lebih baik menggunakan root access)

1. Download package dengan curl:

root@saksenengku:~# cd /tmp/
root@saksenengku:/tmp# curl -O http://www.rfxn.com/downloads/maldetect-current.tar.gz
  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
                                 Dload  Upload   Total   Spent    Left  Speed
100 1512k  100 1512k    0     0  2302k      0 --:--:-- --:--:-- --:--:-- 2306k

2. Unpack tarball file

root@saksenengku:/tmp# tar -zxvf maldetect-current.tar.gz
root@saksenengku:/tmp# cd maldetect-1.6.2/
root@saksenengku:/tmp/maldetect-1.6.4# ./install.sh
Created symlink /etc/systemd/system/multi-user.target.wants/maldet.service → /usr/lib/systemd/system/maldet.service.
update-rc.d: error: unable to read /etc/init.d/maldet
Linux Malware Detect v1.6.4
            (C) 2002-2019, R-fx Networks <proj@r-fx.org>
            (C) 2019, Ryan MacDonald <ryan@r-fx.org>
This program may be freely redistributed under the terms of the GNU GPL

installation completed to /usr/local/maldetect
config file: /usr/local/maldetect/conf.maldet
exec file: /usr/local/maldetect/maldet
exec link: /usr/local/sbin/maldet
exec link: /usr/local/sbin/lmd
cron.daily: /etc/cron.daily/maldet
maldet(5515): {sigup} performing signature update check...
maldet(5515): {sigup} local signature set is version 201907043616
maldet(5515): {sigup} new signature set 202111222873613 available
maldet(5515): {sigup} downloading https://cdn.rfxn.com/downloads/maldet-sigpack.tgz
maldet(5515): {sigup} downloading https://cdn.rfxn.com/downloads/maldet-cleanv2.tgz
maldet(5515): {sigup} verified md5sum of maldet-sigpack.tgz
maldet(5515): {sigup} unpacked and installed maldet-sigpack.tgz
maldet(5515): {sigup} verified md5sum of maldet-clean.tgz
maldet(5515): {sigup} unpacked and installed maldet-clean.tgz
maldet(5515): {sigup} signature set update completed
maldet(5515): {sigup} 17258 signatures (14436 MD5 | 2039 HEX | 783 YARA | 0 USER)

3. Konfigurasi Maldet
Konfigurasi menggunakan vi atau nano

root@saksenengku:~# vi /usr/local/maldetect/conf.maldet
# Enable Email Alerting
email_alert="1"

# Email Address in which you want to receive scan reports
email_addr="you@domain.com"

# Use with ClamAV
scan_clamscan="1"

# Enable scanning for root-owned files. Set 1 to disable.
scan_ignore_root="0"

# Move threats to quarantine
quarantine_hits="1"

# Clean string based malware injections
quarantine_clean="1"

# Suspend user if malware found. 
quarantine_suspend_user="1"

# Minimum userid value that be suspended
quarantine_suspend_user_minuid="500"

Disamping menggunakan Maldet, anda bisa mix juga dengan menggunakan ClamAV dengan Instalasi sbb:

root@saksenengku:~# apt-get -y install clamav clamav-daemon clamdscan

Secara Default ClamAV dengan LMD sudah aktiv

Baca Juga:  Sepertiga dari 12 Kerentanan yang Dieksploitasi Berada di Produk Microsoft

Untuk manual Scan menggunakan Opsi sbb:

root@saksenengku:~# clamscan -i -r ~/

4. Update & check signature Linux VPS anda dengan LMD

root@saksenengku:~# maldet -d
Linux Malware Detect v1.6.4
(C) 2002-2019, R-fx Networks <proj@rfxn.com>
(C) 2019, Ryan MacDonald <ryan@rfxn.com>
This program may be freely redistributed under the terms of the GNU GPL v2

maldet(7703): {update} checking for available updates...
maldet(7703): {update} hashing install files and checking against server...
maldet(7703): {update} latest version already installed.
root@saksenengku:~# maldet -u
Linux Malware Detect v1.6.4
            (C) 2002-2019, R-fx Networks <proj@rfxn.com>
            (C) 2019, Ryan MacDonald <ryan@rfxn.com>
This program may be freely redistributed under the terms of the GNU GPL v2

maldet(7843): {sigup} performing signature update check...
maldet(7843): {sigup} local signature set is version 202111222873613
maldet(7843): {sigup} latest signature set already installed.

5. Scanning Linux VPS anda dengan LMD
Commandnya sbb:
maldet -a [folder yang akan di scan]
Defaultnya maldet -a /tmp

Contoh berikut folder yg terkena malware

root@saksenengku:~# maldet -a /tmp
Linux Malware Detect v1.6.4
(C) 2002-2019, R-fx Networks <proj@rfxn.com>
(C) 2019, Ryan MacDonald <ryan@rfxn.com>
This program may be freely redistributed under the terms of the GNU GPL v2

maldet(8051): {scan} signatures loaded: 17258 (14436 MD5 | 2039 HEX | 783 YARA | 0 USER)
maldet(8051): {scan} building file list for /tmp, this might take awhile...
maldet(8051): {scan} setting nice scheduler priorities for all operations: cpunice 19 , ionice 6
maldet(8051): {scan} file list completed in 0s, found 90 files...
maldet(8051): {scan} found clamav binary at /usr/bin/clamscan, using clamav scanner engine...
maldet(8051): {scan} scan of /tmp (90 files) in progress...
maldet(8051): {clean} could not find clean rule for hit php.gzbase64.inject or file /usr/local/maldetect/quarantine/rfxn.yara.510915085 no longer exists.
maldet(8051): {scan} processing scan results for hits: 1 hits 0 cleanedmaldet(8051): {clean} could not find clean rule for hit php.gzbase64.inject or file /usr/local/maldetect/quarantine/gzbase64.inject.unclassed.228613307 no longer exists.
maldet(8051): {scan} processing scan results for hits: 2 hits 0 cleanedmaldet(8051): {clean} could not find clean rule for hit php.gzbase64.inject or file /usr/local/maldetect/quarantine/maldetect-current.tar.gz.2215023982 no longer exists.
maldet(8051): {scan} processing scan results for hits: 3 hits 0 cleaned
maldet(8051): {scan} scan completed on /tmp: files 90, malware hits 3, cleaned hits 0, time 1s
maldet(8051): {scan} scan report saved, to view run: maldet --report 211125-1101.8051

Ulangi lagi Scanning nya sampai semua benar-benar clean tidak ada malware hit

maldet(8580): {scan} scan completed on /tmp: files 84, malware hits 0, cleaned hits 0, time 1s
maldet(8580): {scan} scan report saved, to view run: maldet --report 211125-1103.8580

Menampilkan Report yang terkena malware sbb:

root@saksenengku:~# maldet --report 211125-1101.8051
HOST:      saksenengku.com
SCAN ID:   211125-1101.8051
STARTED:   Nov 25 2021 11:01:05 +0700
COMPLETED: Nov 25 2021 11:01:06 +0700
ELAPSED:   1s [find: 0s]

PATH:          /tmp
TOTAL FILES:   90
TOTAL HITS:    3
TOTAL CLEANED: 0

FILE HIT LIST:
{HEX}php.gzbase64.inject.452 : /tmp/maldetect-1.6.4/files/sigs/rfxn.yara => /usr/local/maldetect/quarantine/rfxn.yara.510915085
{HEX}php.gzbase64.inject.452 : /tmp/maldetect-1.6.4/files/clean/gzbase64.inject.unclassed => /usr/local/maldetect/quarantine/gzbase64.inject.unc$
{HEX}php.gzbase64.inject.452 : /tmp/maldetect-current.tar.gz => /usr/local/maldetect/quarantine/maldetect-current.tar.gz.2215023982
===============================================
Linux Malware Detect v1.6.4 < proj@rfxn.com >

Semoga Artikel ini berguna & membantu teman-teman yang menggunakan VPS Linux khususnya yang terkena serangan Malware

Baca Juga:  Apple pushed out pembaruan keamanan diam-diam ke macOS minggu ini

Salam

Saksenengku Network

Untuk mendapatkan Berita & Review menarik Saksenengku Network
Google News

Artikel Terkait

Populer

Artikel Terbaru