Maldet is also known as Linux Malware Detect virus scanner for Linux. Linux Malware Detect (LMD) is a malware scanner for Linux released under the GNU GPLv2 license, that is designed around the threats faced in shared hosted environments. It uses threat data from network edge intrusion detection systems to extract malware that is actively being used in attacks and generates signatures for detection. In addition, threat data is also derived from user submissions with the LMD checkout feature and from malware community resources. The signatures that LMD uses are MD5 file hashes and HEX pattern matches, they are also easily exported to any number of detection tools such as ClamAV. To install LMD, download the package and run the enclosed script

Download maldetect package using wget

cd /usr/local/src/ 
tar -xzf maldetect-current.tar.gz 
cd maldetect-* 
sh ./ or sudo sh ./

or, in one line…

cd /usr/local/src/;
tar -xzf maldetect-current.tar.gz;cd maldetect-*;sh ./ or sudo sh ./

It will give an output similar to the following… `Linux Malware Detect v1.3.4 (C) 1999-2010, R-fx Networks (C) 2010, Ryan MacDonald inotifywait (C) 2007, Rohan McGovern This program may be freely redistributed under the terms of the GNU GPL``installation completed to /usr/local/maldetect config file: /usr/local/maldetect/conf.maldet exec file: /usr/local/maldetect/maldet exec link: /usr/local/sbin/maldet cron.daily: /etc/cron.daily/maldet``maldet(32517): {sigup} performing signature update check… maldet(32517): {sigup} local signature set is version 2010051510029 maldet(32517): {sigup} latest signature set already installed`

Step 3: Configuring LMD

By default all options are fully commented in the configuration file, so configure it according to your needs. But before making any changes let’s have a detailed review of each option below.

email_alert : If you would like to receive email alerts, then it should be set to 1.

email_subj : Set your email subject here.

email_addr : Add your email address to receive malware alerts.

quar_hits : The default quarantine action for malware hits, it should be set 1.

quar_clean : Cleaning detected malware injections, must set to 1.

quar_susp : The default suspend action for users wih hits, set it as per your requirements.

quar_susp_minuid : Minimum userid that can be suspended.

Open file /usr/local/maldetect/conf.maldet and make changes according to your needs nano /usr/local/maldetect/conf.maldet To update the maldet use the below commands. maldet -u or maldet -d To scan the files for a particular user maldet -a /home/username/ It will scan all the files and provide you the output. To scan all user under public_html paths under /home*/ this can be done with: [email protected][~]# maldet --scan-all /home?/?/public_html

[email protected][~]-maldet --scan-all /home

To scan the same path but the content that has been created/modified in the last 5 days: [email protected][~]# maldet --scan-recent /home?/?/public_html 5 To scan but forget to turn on the quarantine option, you could quarantine all malware results from a previous scan with: [email protected][~]# maldet --quarantine SCANID If you wanted to attempt a clean on all malware results from a previous scan that did not have the feature enabled, you would do with. [email protected][~]# maldet --clean SCANID If you had a file that was quarantined from a false positive or that you simply want to restore (i.e: you manually cleaned it), you can use the following: [email protected][~]# maldet --restore config.php.2384 [email protected][~]# maldet --restore /usr/local/maldetect/quarantine/config.php.2384

Did this answer your question?