Is this a compromise? Cron /root/chkrootkit.sh | grep -v .packlist
Here are the details of the email:
find: /proc/15118: No such file or directory
find: /proc/15141: No such file or directory
find: /proc/16388: No such file or directory
find: /proc/16392: No such file or directory
/usr/lib/php/.channels /usr/lib/php/.channels/.alias /usr/lib/php/.registry /usr/lib/php/.registry/.channel.__uri /usr/lib/php/.registry/.channel.doc.php.net /usr/lib/php/.registry/.channel.pecl.php.net
INFECTED (PORTS: 465)
so i did a quick check on the server for what is listening on port 465
root@host [/]# fuser -vn tcp 465
USER PID ACCESS COMMAND
465/tcp: mailnull 1046 F…. exim
Which confirmed that exim is in fact using this port.
For those who do not know what is fuser (“fuser – identify processes using files or sockets ” please refer to this page:
http://linux.about.com/library/cmd/blcmdl1_fuser.htm