I did this and nothing was returned. Simply moved to the next line with another prompt.Can either of you run this command to see what is actually running?
This malware is trying very hard to cover its tracks,Code:for i in $(pidof sshd); do ls -l /proc/$i/exe; done
My "System" page does not have that option. Running stock firmware, not merlin if that helps.Thanks.
It doesn't seem to be the cause, but the option I was referring to was Administration - System > Allow SSH Port Forwarding.
EDIT: Reboot the router after making any changes to get rid of the currently running {sshd} processes.
Were theI did this and nothing was returned. Simply moved to the next line with another prompt.
{sshd} processes visible in top at the time you ran it? If not, wait for the next occurrence and try again, please.My "System" page does not have that option. Running stock firmware, not merlin if that helps.
Yes, that option isn't present in stock firmware. I assumed you were using Merlin's firmware as this is the Merlin forum.My "System" page does not have that option. Running stock firmware, not merlin if that helps.
  PID  PPID USER     STAT   VSZ %VSZ CPU %CPU COMMAND
19405  5315 bald      R      228  0.0   0 24.8 {sshd} 
bald@rustyb:/tmp/home/root# ps | grep "[s]sh"
  932 bald        224 S    {sshd} 
 1695 bald        224 S    {sshd} 
 4050 bald        224 S    {sshd} 
...
27340 bald        224 S    {sshd} 
27438 bald        224 S    {sshd} 
28062 bald        224 S    {sshd} 
bald@rustyb:/tmp/home/root# 
bald@rustyb:/tmp/home/root# for i in `ps | grep -i "[s]shd" | awk '{print $1}'` ; do ec
ho ${i} ; ls -l /proc/${i}/exe ; echo ; done
932
lrwxrwxrwx    1 bald      root             0 Oct 19 03:18 /proc/932/exe -> /tmp/hklp (deleted)
1695
lrwxrwxrwx    1 bald      root             0 Oct 19 03:18 /proc/1695/exe -> /tmp/hklp (deleted)
4050
lrwxrwxrwx    1 bald      root             0 Oct 19 03:18 /proc/4050/exe -> /tmp/hklp (deleted)
...
27340
lrwxrwxrwx    1 bald      root             0 Oct 19 03:18 /proc/27340/exe -> /tmp/hklp (deleted)
27438
lrwxrwxrwx    1 bald      root             0 Oct 19 03:18 /proc/27438/exe -> /tmp/hklp (deleted)
28062
lrwxrwxrwx    1 bald      root             0 Oct 19 03:18 /proc/28062/exe -> /tmp/hklp (deleted)
bald@rustyb:/tmp/home/root# ls -l /tmp/hklp
-rwxrwxrwx    1 bald      root         70928 Oct 19 02:18 /tmp/hklp
bald@rustyb:/tmp/home/root#Thanks, that's very interesting.PPID 224 does not exist. I tried to just kill them off and two show up again immediately.
Is there anything else in /tmp that looks unusual with a similar timestamp as hklp?PPID 224 does not exist. I tried to just kill them off and two show up again immediately.
ls -ltr /tmpThanks, that's very interesting.
"224" isn't a PPID it's the memory size. The router's ps doesn't show the PPID unfortunately which is why we were using top in batch mode.
Can you try and make a copy of /tmp/hklp and store it somewhere for later analysis? Might need to send it to Asus or @RMerlin.
bald@rustyb:/tmp/home/root# ps | grep -i "[s]shd"27513 bald 224 S {sshd}bald@rustyb:/tmp/home/root# kill -9 27513bald@rustyb:/tmp/home/root# ps | grep -i "[s]shd"28301 bald 224 S {sshd}28302 bald 232 S {sshd}bald@rustyb:/tmp/home/root# for i in `ps | grep -i "[s]shd" | awk '{print $1}'` ; do echo ${i} ; ls -l /proc/${i}/exe ; echo ; done28301lrwxrwxrwx 1 bald root 0 Oct 19 05:25 /proc/28301/exe -> /tmp/hklp (deleted)28302lrwxrwxrwx 1 bald root 0 Oct 19 05:25 /proc/28302/exe -> /tmp/hklp (deleted)bald@rustyb:/tmp/home/root# ls -lah /tmp | grep hkbald@rustyb:/tmp/home/root#bald@rustyb:/tmp/home/root# ps | grep -i "[s]shd"bald@rustyb:/tmp/home/root# ls -lah /tmp | grep hkbald@rustyb:/tmp/home/root#If you have the time I'd be interested in getting a copy of that file. You can PM me if you're willing, although I'd understand if you don't.I saved a copy of /tmp/hklp. clamscan doesn't alert on it.
Do a hard factory reset. You haven't said what router you're using so you'll have to look up your model on this page:How should I properly "nuke this box from orbit?" Hold WPS, etc?
Is there anything else in /tmp that looks unusual with a similar timestamp as hklp?
Code:ls -ltr /tmp
bald@rustyb:/tmp/home/root# ls -ltr /tmp/drwxr-xr-x    4 bald      root            80 Dec 31  1969 vardrwxr-xr-x    2 bald      root            40 Dec 31  1969 share-rw-r--r--    1 bald      root             0 Dec 31  1969 settingsdrwxr-xr-x    3 bald      root            60 Dec 31  1969 notifydrwxr-xr-x    2 bald      root            40 Dec 31  1969 inadyn.cachedrwxr-xr-x    3 bald      root            60 Dec 31  1969 homedrwxr-xr-x    3 bald      root            60 Dec 31  1969 confmtd-rw-r--r--    1 bald      root            17 Dec 31  1969 misc.jsonlrwxrwxrwx    1 bald      root            18 May  4  2018 syslog.log-1 -> /jffs/syslog.l1lrwxrwxrwx    1 bald      root            16 May  4  2018 syslog.log -> /jffs/syslog.log------x--T    1 bald      root             0 Oct 19 05:27 ebtables.lock-rw-rw-rw-    1 bald      root          2238 Oct 19 05:27 wl0_hapd.confdrwxrwxrwx    2 bald      root            40 Oct 19 05:27 netooldrwxrwxrwx    2 bald      root            80 Oct 19 05:27 asdfile-rw-rw-rw-    1 bald      root             0 Oct 19 05:27 asd.init-rw-rw-rw-    1 bald      root          2240 Oct 19 05:27 wl1_hapd.confsrwxrwxrwx    1 bald      root             0 Oct 19 05:27 wpa_ctrl_2509-2srwxrwxrwx    1 bald      root             0 Oct 19 05:27 wpa_ctrl_2509-1-rw-rw-rw-    1 bald      root             0 Oct 19 05:27 awsiot_logdrwxrwxrwx    3 bald      root            80 Oct 19 05:27 avahi-rw-rw-rw-    1 bald      root           359 Oct 19 05:27 run_lldpd.sh-rw-rw-rw-    1 bald      root             0 Oct 19 05:27 mastiff_log-rw-rw-rw-    1 bald      root             5 Oct 19 05:27 mastiff.pid-rw-rw-rw-    1 bald      root            64 Oct 19 05:27 lldpd_bind_ifnames-rw-rw-rw-    1 bald      root            64 Oct 19 05:27 lld2d.conf-rw-rw-rw-    1 bald      root          4302 Oct 19 05:27 lighttpd.confdrwxrwxrwx    2 bald      root            40 Oct 19 05:27 asusfbsvcsdrwxr-xr-x    2 bald      root            40 Oct 19 05:27 cfg_mntlrwxrwxrwx    1 bald      root             8 Oct 19 05:27 zcip -> /sbin/rclrwxrwxrwx    1 bald      root             8 Oct 19 05:27 wpa_cli -> /sbin/rclrwxrwxrwx    1 bald      root             8 Oct 19 05:27 udhcpc_wan -> /sbin/rcdrwxrwxrwx    3 bald      root           260 Oct 19 05:27 ppplrwxrwxrwx    1 bald      root             8 Oct 19 05:27 dhcp6c -> /sbin/rc-rw-r--r--    1 bald      root           263 Oct 19 05:27 wchannel.json-rw-rw-rw-    1 bald      root           411 Oct 19 05:27 filter_ipv6.default-rw-rw-rw-    1 bald      root          1200 Oct 19 05:27 filter.default-rw-r--r--    1 bald      root           398 Oct 19 05:27 chanspec_private.json-rw-rw-rw-    1 bald      root           192 Oct 19 05:27 chanspec_avbl.txt-rw-r--r--    1 bald      root           248 Oct 19 05:27 chanspec_avbl.json-rw-r--r--    1 bald      root           446 Oct 19 05:27 chanspec_all.jsondrwxrwxrwx    2 bald      root            60 Oct 19 05:27 asusdebuglog-rw-r--r--    1 bald      root            72 Oct 19 05:27 E8:9C:25:D4:B6:B0.cap-rw-r--r--    1 bald      root            31 Oct 19 05:27 E8:9C:25:D4:B6:B0.bi-rw-r--r--    1 bald      root             2 Oct 19 05:27 relist.json-rw-rw-rw-    1 bald      root            92 Oct 19 05:27 obvsie-rw-rw-rw-    1 bald      root             1 Oct 19 05:27 obstatus-rw-rw-rw-    1 bald      root            92 Oct 19 05:27 guest_vsie-rw-r--r--    1 bald      root            93 Oct 19 05:27 aplist.jsondrwxrwxrwx    2 bald      root           100 Oct 19 05:27 dm-rw-rw-rw-    1 bald      root            19 Oct 19 05:27 hw_auth_clmdrw-rw-rw-    2 bald      root            60 Oct 19 05:27 bwdpi-rw-rw-rw-    1 bald      root           432 Oct 19 05:28 wan0_bound.env-rw-rw-rw-    1 bald      root            10 Oct 19 05:28 udhcpc0.expires-rw-rw-rw-    1 bald      root           663 Oct 19 05:28 redirect_rules-rw-r--r--    1 bald      root           153 Oct 19 05:28 nbr_list.json-rw-rw-rw-    1 bald      root           496 Oct 19 05:28 nat_rules_eth0_eth0lrwxrwxrwx    1 bald      root            24 Oct 19 05:28 nat_rules -> /tmp/nat_rules_et0-rw-rw-rw-    1 bald      root          5818 Oct 19 05:28 filter_rulessrwxrwxrwx    1 bald      root             0 Oct 19 05:28 mcpd_mcpctl_addr-rw-rw-rw-    1 bald      root             1 Oct 19 05:28 ping_76.133.210.1_79.done-rw-rw-rw-    1 bald      root           146 Oct 19 05:28 ping_76.133.210.1_79-rw-r--r--    1 bald      root           120 Oct 19 05:29 resolv.dnsmasq-rw-r--r--    1 bald      root            46 Oct 19 05:29 resolv.confdrwxrwxrwx    5 bald      root           240 Oct 19 05:29 lighttpd-rw-rw-rw-    1 bald      root             1 Oct 19 05:29 ping_76.133.210.1_80.done-rw-rw-rw-    1 bald      root           146 Oct 19 05:29 ping_76.133.210.1_80drwxrwxrwx    6 bald      root           140 Oct 19 05:29 mnt-rw-rw-rw-    1 bald      root           102 Oct 19 05:29 usb_errdrwxrwxrwx    3 bald      root            60 Oct 19 05:29 skynetdrwxrwxrwx    2 bald      root           180 Oct 19 05:29 nc-rw-rw-r--    1 bald      root         26242 Oct 19 05:29 menuTree.js-rw-rw-rw-    1 bald      root          2931 Oct 19 05:29 diag_port_status.json-rw-rw-rw-    1 bald      root          9332 Oct 19 05:34 ce0.log-rw-rw-rw-    1 bald      root           216 Oct 19 05:38 usb.log-rw-rw-rw-    1 bald      root            94 Oct 19 05:46 webs_upgrade.log-rw-r--r--    1 bald      root           162 Oct 19 05:58 allwclientlist.json-rw-r--r--    1 bald      root           137 Oct 19 05:59 wiredclientlist.json-rw-r--r--    1 bald      root            61 Oct 19 05:59 current_wired_client_list.json-rw-rw-rw-    1 bald      root          5832 Oct 19 05:59 devdrwxr-xr-x    9 bald      root          1760 Oct 19 05:59 etc-rw-r--r--    1 bald      root           304 Oct 19 05:59 clientlist.json-rw-r--r--    1 bald      root          1450 Oct 19 05:59 nmp_cache.js-rw-rw-rw-    1 bald      root             0 Oct 19 05:59 watchdog_heartbeatbald@rustyb:/tmp/home/root# dateSat Oct 19 06:00:47 PDT 2024bald@rustyb:/tmp/home/root# Sorry, it is a RT-AX88U Pro.If you have the time I'd be interested in getting a copy of that file. You can PM me if you're willing, although I'd understand if you don't.
If the problem reoccurs please run the command in post #111 exactly as written.
Do a hard factory reset. You haven't said what router you're using so you'll have to look up your model on this page:
If you wish to share the file, it's convenient to use paste.c-net, like:I saved a copy of /tmp/hklp. clamscan doesn't alert on it.
wget --quiet -O- --post-file='/tmp/hklp' 'https://paste.c-net.org/'Oh that is super cool. Thank you.If you wish to share the file, it's convenient to use paste.c-net, like:
Code:wget --quiet -O- --post-file='/tmp/hklp' 'https://paste.c-net.org/'
You will get a web link as return on the command which you can share with people you choose. Works directly on the router.
The plot thickens.
Unfortunately, this file was deemed malicious by automated scans.
All files are automatically scanned for malicious content, in effort to avoid serving malware to unsuspecting users.
If you are the original uploader of this file, and believe the detection is a false positive, please get in touch.
As a quick workaround, for passing a malware sample to a colleague, encrypting your content would probably bypass the scan.
See the "Privacy / Encrypted usage" section at https://paste.c-net.org/ for details.
I think I'm experiencing a similar issue. Been going on for a few months now. I may try turning off the OpenVPN server and see if that changes anything.
AiCloud - OFF
AiProtection - OFF
SSH Port Forwarding - OFF
OpenVPN server - ON (non-standard port but do see connection attempts)
WireGuard server - ON
I don't see any sustained data transfer nor have seen any high cpu usage like the OP.
Daily
View attachment 61983
Last 24 hours showing some ridiculous values.
View attachment 61984

Welcome To SNBForums
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!
