How to deal when non malicious file are reported by Rootkit Hunter?

Raspberry Pi
Reading Time: 2 minutes

I received this email after installing Rootkit Hunter.

I concluded they are not malicious files but detected by Rootkit Hunter.
– False positive.

I setup script which performs scanning by Rootkit Hunter everyday.
But I want to avoid unintentionally detecting then I configured white list.

In this article I will share it.

If you are interested in Rootkit Hunter and to be planned to install, this article is useful.

Found preloaded shared library:

 These lines are useful to avoid it.

sudo vim /etc/rkhunter.conf
# Adding this line to rkhunter.conf


Firstly I assumed
${PLATFORM} is environment variables and should be replaced by actual file name.
Then I configured as below but didn’t make sense.

# To find actual file name
ls -l /usr/lib/arm-linux-gnueabihf/libarmmem-*.so
lrwxrwxrwx 1 root root    16 Apr 30  2019 /usr/lib/arm-linux-gnueabihf/ ->
-rw-r--r-- 1 root root  9512 Apr 30  2019 /usr/lib/arm-linux-gnueabihf/
-rw-r--r-- 1 root root 17708 Apr 30  2019 /usr/lib/arm-linux-gnueabihf/
lrwxrwxrwx 1 root root    16 Apr 30  2019 /usr/lib/arm-linux-gnueabihf/ ->

# Configuring them to rkhunter.conf

I setup without replacing ${PLATFORM}, then warning was removed. 

The command … has been replaced by a script:

 I configured like this.

sudo nvim /etc/rkhunter.conf

# Configuring rkhunter.conf

According to original warning message, egrep/fgrep/which are script.
So I checked if they are really OK, and they are.


cat /usr/bin/egrep 
exec grep -E "$@"

cat /usr/bin/fgrep 
exec grep -F "$@"

cat /usr/bin/which
#! /bin/sh
set -ef
if test -n "$KSH_VERSION"; then
        puts() {
                print -r -- "$*"
        puts() {
                printf '%s\n' "$*"

Hidden file found:

According to warning message, “/etc/.fstab is hidden file”.
I checked the contents of this.

cat /etc/.fstab 
proc            /proc           proc    defaults          0       0
PARTUUID=0d91114b-01  /boot           vfat    defaults          0       2
PARTUUID=0d91114b-02  /               ext4    defaults,noatime  0       1

It looks OK then I added to white list as well.

sudo nvim /etc/rkhunter.conf

# Adding this line to rkhunter.conf

sshd and other files are detected

 I thought “It is OK…” but it is not.
After a few days sshd/ssh are detected.

 I am trying to solve them.


 How was it?

I think receiving email regarding ssh/sshd is annoying, I am working on it!



Copied title and URL