I was cleaning my server today and found a file in directory /usr/local/src/
File Attributes:
Name: 0
Size: 975MBs
Type: Binary (I tried to cat the file)
Location: /usr/local/src/
Permissions:
-rw-r--r-- 1 root root 1005054631 Nov 19 2000 0
I also tried to check if that file is used by any of the process using
fuser 0
but that returned nothing.
I have not added this file manually. I don't know how that file was created in the server. Is the server infected or does Ubuntu write these kinds of files automatically?
How can I check how that file was created & what that file is doing there?
Tried binwalk command to check the file, Below is the output.
DECIMAL HEXADECIMAL DESCRIPTION
--------------------------------------------------------------------------------
168065817 0xA047B19 MySQL ISAM compressed data file Version 5
220920175 0xD2AF96F IMG0 (VxWorks) header, size: 1088485285
304382083 0x12248083 MySQL ISAM index file Version 7
358147067 0x1558E3FB MySQL ISAM index file Version 8
362565535 0x159C4F9F MySQL ISAM compressed data file Version 2
487768270 0x1D12C0CE COBALT boot rom data (Flat boot rom or file system)
529883861 0x1F9562D5 rzip compressed data - version 112.123 (-1629463256 bytes)
718008653 0x2ACBF14D MySQL MISAM compressed data file Version 1
778034453 0x2E5FDD15 MySQL ISAM compressed data file Version 4
778229381 0x2E62D685 MySQL MISAM index file Version 10
784771028 0x2EC6A7D4 MySQL MISAM compressed data file Version 10
file 0
can be used to identify the file (based on it's contents). Usingcat
on a 975 MB file should have been funny... – pim Aug 24 '17 at 08:050: ISO Media
– Ankit Arora Aug 24 '17 at 08:07md5sum 0
then search the result in google, I bet on a linux install media iso. – pim Aug 24 '17 at 08:11