No description
Find a file
2024-11-26 12:40:51 +05:30
kinsing_cleanup.sh Update kinsing_cleanup.sh 2024-11-26 12:40:51 +05:30
README.md Add README.md 2024-11-26 12:38:46 +05:30

I've created a comprehensive Bash script to help clean up a CyberPanel server infected with Kinsing malware. Let me break down the key features of this script:

Script Features

  1. Root Privilege Check: Ensures the script is run with root permissions
  2. Logging: Logs all actions to /var/log/kinsing_cleanup.log
  3. Backup: Creates a backup of critical system files before cleanup
  4. Systematic Cleanup: Follows the steps you outlined in your guide
  5. Process Termination: Kills suspicious processes
  6. Service Removal: Stops and disables suspicious services
  7. Security Scanning: Installs and runs chkrootkit and rkhunter
  8. File Tracking: Creates a list of recently modified files

Usage Instructions

  1. Save the script to a file (e.g., kinsing_cleanup.sh)
  2. Make it executable: chmod +x kinsing_cleanup.sh
  3. Run with sudo: sudo ./kinsing_cleanup.sh

Precautions

  • Always review the script before running
  • Understand each step
  • Have a backup of your critical data
  • Test in a staging environment first if possible

Additional Recommendations

  1. After running the script, thoroughly review:
    • /var/log/kinsing_cleanup.log
    • /root/kinsing_recent_files.txt
    • Results of the rkhunter scan
  2. Consider changing all passwords
  3. Review network logs and access patterns
  4. If possible, restore from a known clean backup

Disclaimer

This script is provided as-is. While it aims to help clean up the Kinsing malware, every infection is unique. Professional security consultation is recommended for complex scenarios.