What app is this about, and its version: Rallly 4.5.6~ynh1 What YunoHost version are you running: YunoHost 12.1.36 What type of hardware are you using: Old laptop or computer
Describe your issue
Rallly latest version. Now a miner is active, using 50% of the CPU. Maybe the miner was there before the Rallly update. Rallly was the latest update.
Share relevant logs or error messages
this is the output of “sudo ps aux | grep c3” on the machine:
I suppose we can try to dig where this “hash” thing is coming from and at what time it was created exactly …
We can find out what’s the current working directory of this process (assuming it’s still running using it’s PID 250519) :
readlink -e /proc/250519/cwd
and then you can ls -l followed by the corresponding directory which should give an idea of the content and the creation/modification date, in particular the program called “hash”
Not sure how you ended up finding this btw but this bit is “obfuscated” base64 that download some scripts from a chinese server and runs it … thanksfully that’s “only” as the rallly user and not as root …
If you want we can dig further since the code is supposedly downloaded into /tmp/test.sh, we can cat /tmp/test.sh to display the content and learn a bit about what it does - though i would assume that’s what did set up the crypto miner
Anyway, back to the “hash” program in /var/www/rally : we see that the modification date is Nov 2023, but considering that the upgrade completely replaces the /var/www/rallly folder, I would assume that it was put there after the upgrade itself (or maybe there’s a cron job or something somewhere that re-setup the cryptominer)
Also considering it ended up in the .next folder, it points to being related to the React / Next.JS exploit as mentioned by @clacos earlier
Not sure how to properly deal with this exactly, I would say at least uninstall rallly (which should also delete the user, which the virus only has access to supposedly), and then we should do some extensive check for anything suspsicious
It would also be interesting to know how you found out about the issue in the first place ? Was it because of high CPU usage slowing down the rest of the system ? Like you did a top / htop and ended up seeing this program ?
Yes, I found it because the App “NetData” showed a high CPU usage on the server of constant 50% (2 of 4 cores), which I confirmed with htop and top. There I saw the miner application.
1.) I killed the hash process with kill -9 250519 and saw directly maybe 10 new processes with the name xmrig-6.24.0
2.) I made an upgrade from version 4.5.6 to version 4.5.8 of rallly - available now.
3.) the output of the “web” folder now is missing the xmrig-6.24.0 binary.