How To Recover A Deleted Binary From Active Linux Malware

Malware Rootkits Linux Security Linux Forensics

Date
June 02, 2019
Author
The Sandfly Security Team

Often, Linux malware will delete itself after it starts so that file scanners and integrity checks won’t see the binary present. It also can make forensic analysis harder if you can’t get to the binary easily. However, it is easy to recover a deleted process binary on Linux as long as the process is still in memory. Let’s take a look.

Recovering a Deleted Linux Process Binary Command

The basic command to recover a deleted process binary is simple. Just do the following:

cp /proc/<PID>/exe /tmp/recovered_bin

Where <PID> is the Process ID of the deleted process you want to recover. The above command will copy the binary to /tmp/recovered_bin so you can do with it what you will.

Practicing Recovery of a Deleted Process

We’re going to use the sleep command to simulate a process that has deleted itself from the disk. You can run this series of command safely on your own Linux system so you can practice recovery of a deleted binary.

cd /tmp
cp /bin/sleep x
./x 3600 &
rm x
Linux Deleted Process Binary Simulation

Now check that the binary is in fact gone:

ls -al /tmp/x
ls: cannot access /tmp/x: No such file or directory

The above copies the sleep command as “x” under /tmp and runs for 3600 seconds and then exits. We then delete “x” so they system binary appears removed.

You can see the process still running in the ps listing below.

Linux Deleted Process Listing

Forensics Examination of Linux /proc for a Deleted Process

Now let’s look at the /proc directory for this process. The /proc filesystem is a special filesystem on Linux that tracks almost all kernel and process information you would ever want.

Under /proc the system flagged the binary as deleted. The command format is:

ls -al /proc/<PID>/exe

Where again <PID> is the process ID we’re interested in like so:

ls -al /proc/12725/exe
lrwxrwxrwx 1 root root 0 May 23 19:39 /proc/12725/exe -> /tmp/x (deleted)
Linux Forensics Deleted Process ls Listing
Linux Forensics Deleted Binary Listing

Recovery of Deleted Linux Process

But, the Linux file system will not actually delete that file as long as a running process still has it open. The file is there, but it simply is not being shown to you any more.

This /proc/12725/exe link will easily get you the binary that started the process. Simply copy it to where you want and the binary that was deleted is now yours:

cp /proc/12725/exe /tmp/recovered_bin
Linux Forensics Deleted Process Binary Recovery

The hashes of the recovered binary and the sleep command that we used to emulate the attack are identical which proves the file recovered correctly.

sha1sum /tmp/recovered_bin
d76373f39b93bbc5191e5f8ca0f9c2f692e5aa71 /tmp/recovered_bin
sha1sum /bin/sleep
d76373f39b93bbc5191e5f8ca0f9c2f692e5aa71 /bin/sleep

You can now use this binary for further analysis as you wish such as a quick look with strings or disassembler of your choice.

Linux Binary Analysis with Strings Command

Never Kill a Suspicious Process Blindly

The above is reason 4,387 to never simply kill a suspicious process you find until you have thoroughly investigated what is going on. If you were to kill the process first, you’d lose the binary as it would be released by the filesystem and likely destroyed.

If a system is infected with something, isolate it on the network and then take your time and look around. Do not go in with guns blazing because you will destroy critical data.

As we advise in the Linux command line forensics cheat sheet: Don’t Panic. Take your time, collect your evidence, and only then rebuild the system after you’ve figured out what is going on and how the attack happened (root cause analysis). What’s the point of rebuilding a box if you don’t know how the person entered and whether they’ll just do the same thing again immediately when you bring it back online?

Finally, did you know that Sandfly’s agentless Linux security platform automatically hunts for deleted processes and grabs forensic data about the situation for you? Why not give it a try?


Let Sandfly keep your Linux systems secure.

Learn More