Before doing anything check to see if the proper patch was applied to the server
Login as root
wget
http://kb.parallels.com/Attachments/19203/Attachments/plesk_remote_vulnerability_checker.php
Then run command: php -d safe_mode=0 plesk_remote_vulnerability_checker.php
Output Should Be: The patch has been successfully applied.
If you are not patched then visit
http://kb.parallels.com/en/113321
Before doing anything else ensure that the web server is shut down
/etc/init.d/httpd stop.
Then ensure you change ALL passwords. The exploit stole ALL usernames and passwords for your server. Even if you patch the server the person can come back in at any time unless you change:
All Users
Root Password
FTP Passwords
Mail Passwords
If you have quite a few accounts Parallels has created a handy script to mass change everything.
http://kb.parallels.com/en/113391
Then remove all the files located in cgi-bin that have the extension .pl
They will all have random names that are generated from dictionary names some examples are:
countertug.pl dactyloscopic.pl magnetitic.pl unlikable.pl vermiculose.pl
If you are not sure if the files should be deleted. Open them with a text editor like nano or vi and the top header of the file will look like this:
#!/usr/bin/perl
#part of the Gootkit ddos system
use Fcntl qw
flock
EFAULT);
So once the cgi-bin folders are clean remove all cron jobs referencing them (run "crontab -u username -r -i" on each user until they're all gone)
If you want to see what users have cron jobs go to /var/spool/cron and check the contents of each file there. You can just type cat filename and it will echo the contents which correspond with cron jobs entries look for entries that reference the files in the cgi-bin directories
You could also login to plesk control panel and click on domains and under Additional Tools – Scheduled Tasks you will see any cron entries for that domain. Be careful because you may have cron jobs that were not put there buy the exploit.
Go to /tmp directory
Remove all /tmp/apachectrl* files
Remove id" and "ua" files
Restart Web Services /etc/init.d/httpd start