Skip to main content
rfxn
LMDGPL v2v1.6.6.1Since 2005READMEArchitecture

Linux Malware Detect

Order-of-magnitude faster shell-native malware scanning for Linux

Stars

1,384

Forks

245

Last Push

Apr 6, 2026

Latest Release
1.6.6.1

Architecture

Multi-Stage Detection Pipeline

Input
HashMD5 + SHA-256
HEXAho-Corasick
YARA-XPolymorphic
StatisticalObfuscation
Result

Hash-first short-circuiting — files matching known signatures at the hash stage skip all downstream engines, delivering up to 43x faster scan throughput via batch-parallel processing with hardware-accelerated SHA-256 (SHA-NI).

Response & Alerting Channels

Quarantine

Zero-perm storage

Clean

Surgical removal

Email Alert

HTML + Text

Webhooks

Slack · Discord · Telegram

Key Concepts

Batch-Parallel Engine

Files are processed in parallel batches with hash-first short-circuiting. Known threats exit at the hash stage, skipping all downstream engines for up to 43x faster throughput.

Hardware-Accelerated Hashing

SHA-256 via SHA-NI CPU instructions and MD5 checksums provide wire-speed signature matching. Hash misses cascade to progressively deeper analysis stages.

Multi-Layer Signatures

Five detection mechanisms — MD5, SHA-256, HEX (Aho-Corasick), YARA-X rules, and statistical analysis — each targeting different threat classes from known hashes to polymorphic obfuscation.

Real-Time Monitoring

Kernel-based inotify watches detect file changes instantly with dynamic tuning. ModSecurity2 inspectFile hooks enable HTTP upload scanning at the web server layer.

Multi-Channel Alerting

Unified HTML+Text email alerts with native Discord (embeds), Slack (Block Kit), and Telegram (MarkdownV2) webhooks. ELK Stack integration for centralized telemetry.

ClamAV Integration

Threat signatures auto-export to ClamAV format, enabling defense-in-depth with layered scanning. Signatures derived from real-world network edge intrusion detection.

Full Documentation

Linux Malware Detect (LMD)

Malware scanner for Linux — multi-stage threat detection (MD5, SHA-256, HEX, YARA, statistical analysis), ClamAV integration, real-time inotify monitoring, quarantine/clean/restore operations, and multi-channel alerting (email, Slack, Telegram, Discord).

(C) 2002-2026, R-fx Networks <proj@rfxn.com>
(C) 2026, Ryan MacDonald <ryan@rfxn.com>
Licensed under GNU GPL v2


What's New in 2.0.1

43x faster native scan engine — the native scanning pipeline has been completely rewritten with batch parallel processing. Real-world benchmark on ~10,000 files:

VersionRuntimeFilesHits
v1.6.61,217s9,93135
v2.0.128s9,93135

MD5 and HEX signature matching now use batch grep with Aho-Corasick parallel workers, eliminating per-file pattern compilation overhead and ~500,000 subprocess forks per scan. Configure parallel worker count with scan_workers (default: auto).

Other highlights: scan lifecycle management (--kill, --pause, --stop/--continue, -L), SHA-256 hash scanning with CPU hardware auto-detection (scan_hashtype), native YARA scanning (scan_yara=1), Discord webhook alerting, Slack/Telegram alerting fixes, ClamAV hex wildcard support in the native engine, and 200+ bug fixes across the codebase. See CHANGELOG for full details.



Quick Start

# Install to /usr/local/maldetect
./install.sh

# Scan all files under a path
maldet -a /home/?/public_html

# Scan files modified in the last 2 days
maldet -r /home/?/public_html 2

# Enable YARA scanning at runtime
maldet -co scan_yara=1 -a /home/?/public_html

# Quarantine all hits from a scan
maldet -q SCANID

# Start real-time inotify monitoring
maldet -m users

# Update signatures
maldet -u

1. Introduction

LMD's architecture, detection stages, and supported platforms.

Linux Malware Detect (LMD) is a malware scanner for Linux released under the GNU GPLv2 license, designed around the threats faced in shared hosted environments. It uses threat data from network edge intrusion detection systems to extract malware that is actively being used in attacks and generates signatures for detection. In addition, threat data is derived from user submissions with the LMD checkout feature and from malware community resources.

LMD focuses on the malware classes that traditional AV products frequently miss: PHP shells, JavaScript injectors, base64-encoded backdoors, IRC bots, and other web-application-layer threats that target shared hosting user accounts rather than operating system internals.

Detection Stages

  • MD5 file hash matching for exact threat identification
  • HEX pattern matching via native batch grep engine with parallel workers
  • Compound signature (csig) scanning with multi-pattern boolean logic (AND/OR/threshold), case-insensitive matching, wide (UTF-16LE) matching, and bounded gap wildcards
  • Native YARA rule scanning with full module support and custom rules
  • Statistical string-length analysis for detecting obfuscated threats (base64, gzinflate)
  • ClamAV integration for extended coverage with LMD-maintained ClamAV signatures

Scanning & Monitoring

  • Scan all files, recently modified files, or files from a list
  • Kernel inotify real-time file monitoring (create/modify/move events)
  • HTTP upload scanning via ModSecurity2 inspectFile hook
  • Background scanning for unattended large-scale operations
  • Per-scan include/exclude regex filtering

Quarantine & Response

  • Quarantine queue with zero-permission file storage
  • Batch quarantine/restore by scan ID
  • Signature-specific cleaner rules for malware removal
  • Full file restoration (content, owner, permissions, mtime)

Alerting & Reporting

  • HTML + text email alerts with unified rfxn design (teal brand, card entries)
  • SMTP relay support (TLS/SSL) for environments without local MTA
  • Slack Block Kit, Telegram MarkdownV2, Discord embed per-entry alerts
  • Customizable alert templates via alert/custom.d/ overrides
  • Scan reports with per-file hit details, color-coded hit types

Infrastructure

  • Automatic ClamAV signature linking for dual-engine coverage
  • Daily cron with auto-detection of 12+ hosting control panels
  • CPU/IO resource control (nice, ionice, cpulimit)
  • Signature and version auto-updates
  • systemd service unit and SysV init script support

Supported Platforms

LMD runs on any Linux distribution with bash and standard GNU utilities. Tested platforms:

PlatformInit SystemPackage Config Path
RHEL / Rocky / AlmaLinux 8, 9, 10systemd/etc/sysconfig/maldet
CentOS 6, 7SysV / systemd/etc/sysconfig/maldet
Debian 10, 11, 12systemd/etc/default/maldet
Ubuntu 20.04, 22.04, 24.04systemd/etc/default/maldet
GentooOpenRC
SlackwareSysV
FreeBSD— (partial; no inotify)

2. Installation

Installing, upgrading, and removing LMD from a system.

The included install.sh script handles all installation tasks. Previous installations are automatically backed up.

./install.sh

The installer:

  • Copies files to /usr/local/maldetect
  • Creates the maldet symlink in /usr/local/sbin/
  • Installs the cron.daily script to /etc/cron.daily/maldet
  • Installs the systemd service unit (or SysV init script on older systems)
  • Links LMD signatures to ClamAV data directories (if ClamAV is installed)
  • Preserves existing configuration (conf.maldet), custom signatures, and ignore files across upgrades

Previous installs are saved to /usr/local/maldetect.bk{PID} with a maldetect.last symlink to the most recent backup.

Default paths:

  • Install path: /usr/local/maldetect
  • Binary symlink: /usr/local/sbin/maldet
  • Cron script: /etc/cron.daily/maldet
  • Service unit: /usr/lib/systemd/system/maldet.service

3. Configuration

All user-facing settings and their defaults. See man maldet(1) for the complete reference.

The main configuration file is /usr/local/maldetect/conf.maldet. All options are commented for ease of configuration. Options use 0/1 for disable/enable unless otherwise noted.

Configuration can also be overridden at runtime using the -co flag:

maldet -co quarantine_hits=1,email_addr=you@domain.com -a /home

3.1 General Options

VariablePurposeDefault
autoupdate_signaturesAuto-update signatures daily via cron1
autoupdate_versionAuto-update LMD version daily via cron1
autoupdate_version_hashedVerify LMD executable SHA-256 hash against upstream (falls back to MD5)1
sigup_intervalHours between automatic signature update checks via independent cron job (/etc/cron.d/maldet-sigup); 0 = disabled6
cron_prune_daysDays to retain quarantine/session/temp data21
cron_daily_scanEnable daily automatic scanning via cron1
scan_daysDays to look back for modified files in daily cron scans1
import_config_urlURL to download remote configuration override
import_config_expireCache expiry for imported config (seconds)43200
sig_import_md5_urlURL to download custom MD5 signatures
sig_import_hex_urlURL to download custom HEX signatures
sig_import_yara_urlURL to download custom YARA rules
sig_import_sha256_urlURL to download custom SHA-256 signatures
sig_import_csig_urlURL to download custom compound signatures
session_legacy_compatGenerate legacy plaintext session files alongside TSV: auto (detect old-format sessions), 1 (always), 0 (TSV only)auto

3.2 Alerting

VariablePurposeDefault
email_alertEnable email alerts after scans0
email_addrAlert recipient addressyou@domain.com
email_subjEmail subject line templatemaldet alert from $(hostname)
email_ignore_cleanSuppress alerts when all hits were cleaned1
email_panel_user_alertsSend panel user alerts on hit detection0
email_panel_fromFrom header for panel user alertsyou@example.com
email_panel_replytoReply-To header for panel user alertsyou@example.com
email_panel_alert_subjSubject line for panel user alertsmaldet alert from $(hostname)
email_formatEmail format: text, html, or bothhtml
smtp_relaySMTP relay URL (e.g., smtps://smtp.gmail.com:465)
smtp_fromSender address for SMTP relay delivery
smtp_userSMTP authentication username
smtp_passSMTP authentication password
slack_alertEnable Slack file upload alerts0
slack_subjFile name for Slack uploadmaldet alert from $(hostname)
slack_tokenSlack Bot API token (scopes: files:write, files:read)
slack_channelsComma-separated list of channel names or IDsmaldetreports
telegram_alertEnable Telegram alerts0
telegram_file_captionCaption for Telegram report filemaldet alert from $(hostname)
telegram_bot_tokenTelegram Bot API token
telegram_channel_idTelegram chat or group ID
discord_alertEnable Discord webhook alerts0
discord_webhook_urlDiscord webhook URL for alert delivery

3.3 Scanning Options

VariablePurposeDefault
scan_hashtypeHash algorithm for stage 1: auto, sha256, md5, bothauto
scan_max_depthMaximum directory depth for find15
scan_min_filesizeMinimum file size to scan24 bytes
scan_max_filesizeMaximum file size to scan2048k
scan_hexdepthByte depth for HEX signature matching262144
scan_hex_chunk_sizeFiles per micro-batch in HEX+CSIG scanning (range: 1024-20480)10240
scan_csigEnable compound signature (csig) scanning (native mode only)1
scan_workersParallel workers for MD5, SHA-256, HEX, and CSIG scan passesauto
scan_cpuniceNice priority for scan process (-19 to 19)19
scan_ioniceIO scheduling class priority (0-7)6
scan_cpulimitHard CPU limit percentage (0=disabled)0
scan_ignore_rootSkip root-owned files in scans1
scan_ignore_userSkip files owned by specific users
scan_ignore_groupSkip files owned by specific groups
scan_user_accessAllow non-root users to run scans0
scan_user_access_minuidMinimum UID for --mkpubpaths user directory creation100
scan_find_timeoutTimeout for find file list generation (0=disabled, min 60s, 14400=4hr recommended)0
scan_export_filelistSave find results to tmp/find_results.last0
scan_tmpdir_pathsWorld-writable temp paths included in -a/-r scans/tmp /var/tmp /dev/shm /var/fcgi_ipc
string_length_scanEnable statistical string-length analysis0
string_lengthMinimum suspicious string length150000
scan_progress_log_intervalSeconds between progress log checkpoints during background scans (0=disabled)60
scan_meta_cleanup_ageHours to retain completed/killed scan meta files (0=disabled)48
maint_compress_ageDays before completed session files are gzipped (0=disabled)30
maint_archive_ageDays before compressed sessions are bundled into monthly archives (0=disabled)90

3.4 YARA Scanning

Native YARA scanning invokes the yara binary (or yr from YARA-X) independently of ClamAV, supporting full YARA modules, compiled rules, and custom rule files that ClamAV's limited YARA subset cannot handle. When both are available, yr (YARA-X) is preferred. When set to auto, native YARA is enabled only when ClamAV is unavailable and a yara/yr binary is found, preventing duplicate rule evaluation.

VariablePurposeDefault
scan_yaraEnable native YARA scan stage: auto (detect binary, ClamAV fallback), 0 (disabled), 1 (enabled)auto
scan_yara_timeoutTimeout in seconds (0=no timeout)300
scan_yara_scopeRule scope when ClamAV is also active: all (full native scan) or custom (only custom rules natively, ClamAV handles rfxn.yara)custom
sig_import_yara_urlURL to download custom YARA rules on signature update

Custom YARA rules can be placed in two locations, both preserved across upgrades:

  • sigs/custom.yara — single-file rules
  • sigs/custom.yara.d/ — drop-in directory for .yar and .yara rule files

Compatible with third-party rule sets such as YARA Forge and Signature Base. Compiled rules (yarac output) are also supported via sigs/compiled.yarc.

Batch scanning: YARA 4.0+ and all YARA-X versions use --scan-list for efficient batch file scanning. Older YARA versions fall back to per-file scanning automatically.

Enable at runtime without editing config:

maldet -co scan_yara=1 -a /home/?/public_html

3.5 Quarantine Options

VariablePurposeDefault
quarantine_hitsAutomatically quarantine detected malware0
quarantine_cleanTry to clean malware from quarantined files0
quarantine_suspend_userSuspend cPanel account or revoke shell on hit0
quarantine_suspend_user_minuidMinimum UID to suspend (protects system accounts)500
quarantine_on_errorQuarantine files when scan engine returns error1

3.6 Monitoring Options

VariablePurposeDefault
default_monitor_modeStartup mode for monitor (users or path to file); empty = disabled""
inotify_base_watchesBase number of file watches per user path16384
inotify_minuidMinimum UID for user home monitoring500
inotify_docrootSubdirectories to monitor in user homespublic_html,public_ftp
inotify_sleepSeconds between scan batches15
inotify_reloadtimeSeconds between config reloads3600
inotify_cpuniceNice priority for monitor process18
inotify_ioniceIO priority for monitor process6
inotify_cpulimitHard CPU limit for monitor (0=disabled)0
inotify_verboseLog every file scanned (debug only)0
digest_intervalInterval between periodic digest summary alerts: 24h, 30m, 7d, 0 (disabled)24h
digest_escalate_hitsHit count threshold for immediate escalation alert; 0 = disabled0
cron_digest_hookEnable cron.daily hook digest sweep (fires digest if new hook detections exist)1
monitor_paths_extraPath to a line-separated file of additional inotify watch paths/usr/local/maldetect/monitor_paths.extra

3.7 Post-Scan Hooks

A configurable hook script can be invoked after scan completion, receiving scan results via positional arguments, LMD_* environment variables, and optionally JSON on stdin. The hook never breaks scanning — failures are logged, not fatal. See maldet(1) for the full hook contract.

VariablePurposeDefault
post_scan_hookPath to hook script (root-owned, not world-writable). Cannot be set via -co""
post_scan_hook_formatOutput tier: args, file, json (cumulative)args
post_scan_hook_execExecution mode: async (non-blocking), sync (wait)async
post_scan_hook_timeoutSeconds before SIGTERM (0=disabled, min 5)60
post_scan_hook_onScan type filter: all, cli, digestall
post_scan_hook_min_hitsMinimum hits to fire (0=always)1

3.8 ClamAV Integration

When ClamAV scanning is enabled (scan_clamscan=1 or auto with a detected binary), LMD selects the best available ClamAV engine in priority order:

  1. Remote clamdscan (if scan_clamd_remote=1 and config exists)
  2. Local clamd daemon running as root
  3. Local clamd daemon running as non-root (with --fdpass)
  4. clamscan binary (fallback, slower)

LMD signatures are automatically symlinked to ClamAV data directories by install.sh, giving ClamAV access to LMD's MD5 (rfxn.hdb), HEX (rfxn.ndb), and YARA (rfxn.yara) signatures.

Signature validation gate: Before deploying updated signatures to ClamAV data directories, LMD validates them via clamscan -d against a staging directory. If validation fails, existing LMD signatures are removed from the ClamAV path to prevent malformed databases from breaking ClamAV. The SIGUSR2 reload signal to clamd is only sent when at least one ClamAV data directory passes validation (issue #467).

VariablePurposeDefault
scan_clamscanEnable ClamAV as scan engine: auto (detect binary at runtime), 0 (disabled), 1 (enabled)auto

3.9 Remote ClamAV

VariablePurposeDefault
scan_clamd_remoteUse a remote clamd server for scanning0
remote_clamd_configPath to remote clamd config file/etc/clamd.d/clamd.remote.conf
remote_clamd_max_retryMax retries on remote clamd failure5
remote_clamd_retry_sleepSeconds between retries3

3.10 ELK Integration

VariablePurposeDefault
enable_statisticEnable ELK stack statistics collection0
elk_hostTCP host for ELK input
elk_portTCP port for ELK input
elk_indexElasticsearch index name

3.11 Configuration Loading Order

Later sources override earlier values:

  1. internals/internals.conf — internal paths, binary discovery, URL definitions
  2. conf.maldet — user-facing configuration
  3. internals/compat.conf — deprecated variable mappings
  4. /etc/sysconfig/maldet or /etc/default/maldet — system overrides
  5. CLI -co|--config-option — runtime overrides

4. Usage

Command-line interface, exit codes, and common examples. See man maldet(1) for the complete option reference.

usage: maldet [OPTION] [ARGUMENT]

SCANNING:
  -a, --scan-all PATH           scan all files in path (wildcard: ?)
  -r, --scan-recent PATH DAYS   scan files created/modified in last X days
  -f, --file-list FILE          scan files from a line-separated file list
  -b, --background              run scan in the background

SCAN FILTERS:
  -i, --include-regex REGEX     include only matching paths
  -x, --exclude-regex REGEX     exclude matching paths
  -co, --config-option V=V,...  override config options at runtime
  -U, --user USER               run as specified user

MONITORING:
  -m, --monitor USERS|PATHS|FILE|RELOAD  start inotify monitoring
  -k, --kill-monitor            stop inotify monitoring

SCAN MANAGEMENT:
  -L, --list-active             list active scans (text/json/tsv)
  --kill SCANID                 abort a running scan
  --pause SCANID [DURATION]     pause a running scan (e.g., 2h, 30m)
  --unpause SCANID              resume a paused scan
  --stop SCANID                 checkpoint and stop a running scan
  --continue SCANID             resume a stopped scan from checkpoint
  --maintenance                 rotate histories, compress/archive old sessions

QUARANTINE & RESTORE:
  -q, --quarantine SCANID       quarantine hits from scan
  -n, --clean SCANID            clean malware from scan hits
  -s, --restore FILE|SCANID     restore quarantined file(s)
  -qd PATH                      override quarantine directory for this run

REPORTING:
  -e, --report [SCANID|list|latest|hooks|active]  view scan report
  --all                         show full history with -e list (default: recent)
  --format text|json|html|tsv   set report output format (default: text)
  --mailto ADDRESS              email report to address
  --json-report [SCANID|list]   shorthand: --report --format json
  --alert-daily                 generate inotify monitor digest alert
  --digest                      fire unified digest (monitor + hook sources)
  -l, --log                     view event log

UPDATES:
  -u, --update-sigs [--force]   update malware signatures
  -d, --update-ver [--force|--beta]  update LMD version
  --cron-sigup                  cron sig update (internal use)

OTHER:
  -p, --purge                   clear logs, quarantine, temp data
  -c, --checkout FILE           submit suspected malware to rfxn.com
  --test-alert TYPE CHANNEL     test alert delivery (scan|digest, email|slack|telegram|discord)
  --mkpubpaths                  create per-user pub/ data directories
  --web-proxy IP:PORT           set HTTP/HTTPS proxy
  -hscan, --hook-scan           scan via service hook (internal use)
  -v, --version                 show version information
  -h, --help                    show detailed help

4.1 Exit Codes

CodeMeaning
0Success, no malware hits
1Error or all scan paths non-existent
2Malware hits found

Examples:

# Scan all files under user web roots
maldet -a /home/?/public_html

# Scan recent files with auto-quarantine and YARA enabled
maldet -co quarantine_hits=1,scan_yara=1 -r /home/?/public_html 2

# Background scan with email alert to specific address
maldet -b -co email_addr=admin@example.com -a /var/www

# View the most recent scan report
maldet -e

# Email a specific report
maldet --mailto admin@example.com -e 050910-1534.21135

# Output scan report as JSON (pipe to jq for formatting)
maldet --format json -e 050910-1534.21135

# List all reports as JSON
maldet --format json -e list

# Shorthand JSON output (equivalent to --format json -e)
maldet --json-report 050910-1534.21135

# Restore all quarantined files from a scan
maldet -s 050910-1534.21135

JSON Output: Use --format json -e or --json-report to output structured JSON (v1.0 schema) with scanner metadata, scan details (path, times, file counts), per-hit entries with signature name, file path, hit type, owner, permissions, and quarantine status, plus a summary with per-type breakdowns. Both TSV and legacy plaintext sessions are supported; legacy sessions include "source": "legacy" and render unavailable enriched fields (hash, size, owner, etc.) as null.

4.2 Scan Management

Long-running scans on large filesystems (1M+ files) can be controlled without kill -9:

# List active scans (running, paused, stopped)
maldet -L

# List active scans as JSON
maldet --format json -L

# Abort a running scan (full cleanup of temp files and workers)
maldet --kill 260327-1509.25279

# Pause a scan for 2 hours (workers sleep, I/O freed)
maldet --pause 260327-1509.25279 2h

# Resume a paused scan
maldet --unpause 260327-1509.25279

# Checkpoint and stop a scan for later resume
maldet --stop 260327-1509.25279

# Resume from checkpoint (skips completed stages, restores prior hits)
maldet --continue 260327-1509.25279

# Rotate histories, compress old sessions, archive by month
maldet --maintenance

Checkpoint resume: --stop writes a checkpoint file recording the scan stage, hit count, config options, and per-worker progress. --continue validates the checkpoint, warns if signatures changed, rebuilds the file list from current filesystem state, restores prior hits, and resumes scanning from the interrupted stage. HEX workers resume at chunk granularity (~30s lost work per worker).

Engine support: Native engine (HEX/CSIG/hash workers) and standalone clamscan support all lifecycle operations. Daemon-based ClamAV (clamdscan/clamd) supports --kill only — --pause and --stop are rejected with an error message because daemon I/O state is opaque and shared with other clients.


5. Ignore Options

Excluding paths, file types, and signatures from scans and monitoring.

Four ignore files control what is excluded from scanning:

FileFormatPurpose
ignore_pathsLine-separated pathsExclude directories or files from scans
ignore_file_extLine-separated extensionsExclude file extensions (.js, .css)
ignore_sigsLine-separated patternsSkip matching signatures (regex, substring match)
ignore_inotifyLine-separated literal pathsExclude inotify monitoring events

All ignore files are located under /usr/local/maldetect/.

Examples:

# ignore_paths
/home/user/public_html/cgi-bin

# ignore_file_ext
.js
.css

# ignore_sigs
base64.inject.unclassed

# ignore_inotify (literal paths; ERE metacharacters are auto-escaped)
/home/user
/var/tmp

Note: ignore_sigs entries are treated as extended regex patterns and match as substrings. An entry php.shell will suppress php.shell, php.shell.v2, {YARA}php.shell.backdoor, etc. Use ^php\.shell$ for an exact match. The . character matches any character in regex; escape it as \. for a literal dot.


6. Cron Daily

Automated daily scanning, data pruning, and signature updates.

The cron job installed at /etc/cron.daily/maldet performs three tasks:

  1. Prune quarantine, session, and temp data older than cron_prune_days (default: 21)
  2. Update signatures and version (when autoupdate_signatures and autoupdate_version are enabled)
  3. Scan recently modified files under detected hosting panel paths (within scan_days days, default: 1)

The daily scan auto-detects installed control panels and adjusts scan paths accordingly:

PanelScan Path
cPanel/home?/?/public_html/ (+ addon/subdomain docroots)
Plesk/var/www/vhosts/?/
DirectAdmin/home?/?/domains/?/public_html/, /var/www/html/?/
Ensim/home/virtual/?/fst/var/www/html/
ISPConfig/var/www/clients/?/web?/web, …/subdomains, /var/www
Virtualmin/home/?/public_html/, /home/?/domains/?/public_html/
ISPmanager/var/www/?/data/, /home/?/data/
Froxlor/var/customers/webs/
Bitrix/home/bitrix/www/, /home/bitrix/ext_www/?/
VestaCP / HestiaCP/home/?/web/?/public_html/ (+ public_shtml, tmp, private)
DTC${conf_hosting_path:-/var/www/sites}/?/?/subdomains/?/html/

If monitor mode is active, daily scans are skipped and a daily report of monitoring events is issued instead.

For custom scan paths, use the hook file /usr/local/maldetect/cron/custom.cron. For configuration overrides specific to cron, use /etc/sysconfig/maldet (RHEL) or /etc/default/maldet (Debian) or /usr/local/maldetect/cron/conf.maldet.cron.

A weekly watchdog script (/etc/cron.weekly/maldet-watchdog) provides independent fallback signature updates when the primary cron is broken or stale.


7. Inotify Monitoring

Real-time file monitoring with kernel inotify, digest alerts, and supervisor management.

Real-time file monitoring uses the kernel inotify subsystem to detect file creation, modification, and move events. Requires a kernel with CONFIG_INOTIFY_USER (standard on all modern kernels).

# Monitor all user home directories (UIDs >= inotify_minuid) — foreground
maldet -m users

# Monitor in the background (daemon mode)
maldet -b -m users

# Monitor specific paths
maldet -m /home/mike,/home/ashton

# Monitor paths from a file
maldet -m /root/monitor_paths

# Stop monitoring (sends SIGTERM; escalates to SIGKILL after 10s)
maldet -k

How it works:

maldet -m runs a supervisor process in the foreground by default. The supervisor manages an inotifywait child and handles crash recovery, configuration reloads, and digest alerting. Use -b to daemonize the supervisor and return immediately.

  1. monitor_init() sets up inotify watches on all files under monitored paths
  2. File events are queued and batch-scanned every inotify_sleep seconds (default: 15)
  3. Configuration is reloaded every inotify_reloadtime seconds (default: 3600)
  4. Kernel max_user_watches and max_user_instances are auto-tuned for optimal performance
  5. If inotifywait crashes, the supervisor restarts it with exponential backoff (2, 4, 8, 16, 32 seconds); after 3 consecutive failures the supervisor exits

Digest alerts are sent periodically at the interval set by digest_interval (default: 24h). If the hit count since the last digest exceeds digest_escalate_hits, an immediate escalation alert is sent (default: 0, disabled).

Additive paths: To watch additional paths without editing conf.maldet, add them one per line to the file referenced by monitor_paths_extra (default: /usr/local/maldetect/monitor_paths.extra). These are merged with the primary watch list on every config reload.

When using the users mode, only subdirectories matching inotify_docroot (default: public_html,public_ftp) are monitored, plus the system temp directories /tmp, /var/tmp, and /dev/shm.

Note: ignore_inotify entries are now treated as literal paths. ERE metacharacters (., *, +, etc.) are automatically escaped before matching. If your ignore_inotify file contained regex patterns, update them to use literal path strings.


8. Signature System

Signature types, naming conventions, updates, and custom rule files.

LMD ships with five signature types:

TypeFileFormatCount
MD5 hashessigs/md5v2.datHASH:SIZE:{MD5}sig.name.N~14,801
SHA-256 hashessigs/sha256v2.datHASH:SIZE:{SHA256}sig.name.NCDN
HEX patternssigs/hex.datHEXSTRING:{HEX}sig.name.N~2,054
Compound sigssigs/csig.datSUBSIG1||SUBSIG2:signameCDN
YARA rulessigs/rfxn.yaraYARA syntax~783 rules
Compiled YARAsigs/compiled.yarcyarac outputoptional

ClamAV-compatible signatures are also maintained:

  • sigs/rfxn.hdb — ClamAV MD5 format
  • sigs/rfxn.ndb — ClamAV HEX format
  • sigs/rfxn.hsb — ClamAV SHA-256 format (requires ClamAV >= 0.97)

Signature naming convention: {TYPE}category.name.variant_number

Categories include: bin. (binary), c. (C language), exp. (exploit), php. (PHP), js. (JavaScript), perl. (Perl), html. (phishing), base64.inject., gzbase64.

Hit prefixes in scan reports:

PrefixSource
{MD5}MD5 hash match (stage 1)
{SHA256}SHA-256 hash match (stage 1)
{HEX}HEX pattern match (stage 2)
{CSIG}Compound signature match (stage 2.5)
{SA}Statistical analysis (string length)
{YARA}Native YARA scan (scan_yara=1)
{CAV}ClamAV engine (clamd/clamscan)

8.1 Signature Updates

Signatures are updated daily via the cron job or manually:

maldet -u            # update signatures
maldet -u --force    # force update even if current

8.2 Custom Signatures

Custom signatures can be added in three formats, all preserved across upgrades:

TypeFileFormat
Custom MD5sigs/custom.md5.datSame as md5v2.dat
Custom SHA-256sigs/custom.sha256.datSame as sha256v2.dat
Custom HEXsigs/custom.hex.datSame as hex.dat
Custom CSIGsigs/custom.csig.datSame as csig.dat
Custom YARAsigs/custom.yaraYARA rule syntax
Custom YARA (drop-in)sigs/custom.yara.d/*.yarYARA rule files
Compiled YARAsigs/compiled.yarcyarac output (optional)

Remote import URLs can be configured for automatic download during signature updates:

VariablePurpose
sig_import_md5_urlURL for custom MD5 signatures
sig_import_sha256_urlURL for custom SHA-256 signatures
sig_import_hex_urlURL for custom HEX signatures
sig_import_csig_urlURL for custom compound signatures
sig_import_yara_urlURL for custom YARA rules

9. Quarantine & Cleaning

Isolating, restoring, and cleaning malware-infected files.

Quarantined files are stored under /usr/local/maldetect/quarantine/ with permissions set to 000. Original path, owner, permissions, and modification time are recorded in /usr/local/maldetect/sess/quarantine.hist for full restoration.

# Quarantine all hits from a scan
maldet -q SCANID

# Restore all quarantined files from a scan
maldet -s SCANID

# Restore a specific file
maldet -s /usr/local/maldetect/quarantine/config.php.23754

# Clean (attempt malware removal) from a scan
maldet -n SCANID

Quarantine file naming: FILENAME.INODE (e.g., config.php.23754)

For non-root scans (e.g., ModSecurity2 upload scanning), quarantine data is stored under /usr/local/maldetect/pub/USERNAME/quar/. Use the -U flag to interact with non-root quarantine:

maldet -U nobody -s 112012-0032.13771

9.1 Cleaner Rules

The cleaner function looks for signature-named scripts under the clean/ directory. Each script receives the infected file path as an argument and should strip the malicious content. After cleaning, the file is rescanned — if it still triggers a hit, the clean is marked FAILED.

To create a clean rule for signature php.cmdshell.r57, add a file clean/php.cmdshell.r57 containing a command like sed -i with the appropriate pattern. Successful cleans restore the file to its original path, owner, and permissions.

The cleaner is a sub-function of quarantine — files must be quarantined (or use -n) for cleaning to execute.


10. Hook Scanning

Service hook API for ModSecurity, FTP, Exim, and custom integrations.

LMD provides real-time file scanning for multiple services via the unified hookscan.sh API. A single script handles mode dispatch for ModSecurity, pure-ftpd, ProFTPD, Exim, and generic (custom) integrations.

Hook scan detections are logged to a rolling hit log (hook.hits.log) rather than creating per-scan session files. Detections are included in periodic digest alerts and can be viewed via maldet --report hooks.

10.1 ModSecurity

SecRequestBodyAccess On
SecTmpSaveUploadedFiles On   # Required for ModSecurity >= 2.9
SecRule FILES_TMPNAMES "@inspectFile /usr/local/maldetect/hookscan.sh" \
    "id:1999999,phase:2,t:none,deny,log,auditlog,severity:2, \
     msg:'Malware upload blocked by LMD'"

Malicious uploads are rejected with a deny action and logged to the ModSecurity audit log. No mode argument is needed — hookscan.sh defaults to ModSecurity mode for backward compatibility. Both ModSecurity v2 and v3 (libmodsecurity) use the same popen() contract.

10.2 pure-ftpd

# pure-ftpd.conf (or command-line flags):
CallUploadScript yes

# Start the upload-script daemon:
pure-uploadscript -r /usr/local/maldetect/hookscan.sh -B

Requires pure-ftpd compiled with --with-uploadscript. The mode is auto-detected via the UPLOAD_VUSER environment variable. Infected files are quarantined after upload (fire-and-forget — uploads cannot be blocked, only post-processed).

10.3 ProFTPD

<IfModule mod_exec.c>
  ExecEngine on
  ExecLog /var/log/proftpd/exec.log
  ExecTimeout 30
  ExecOnCommand STOR /usr/local/maldetect/hookscan.sh proftpd %f
  ExecEnviron PROFTPD_USER %u
  ExecEnviron PROFTPD_HOME %d
</IfModule>

Note: mod_exec always returns PR_DECLINED regardless of script exit code — uploads cannot be blocked by this hook. LMD quarantines infected files after the upload completes.

10.4 Exim

# exim.conf
av_scanner = cmdline:\
  /usr/local/maldetect/hookscan.sh exim %s :\
  maldet\: (.+):\
  maldet\: (.+)

The three colon-separated fields are: command template, trigger regex, and name-capture regex. When malware is detected, Exim rejects the message using the captured signature name.

10.5 Generic API

For custom integrations, batch scanning, and third-party use:

# Single file scan
hookscan.sh generic /path/to/file
# Exit: 0 = clean, 1 = error, 2 = infected
# Stdout: CLEAN: /path, INFECTED: signame /path, ERROR: reason

# Batch scan from a file list
hookscan.sh generic --list /tmp/filelist.txt

# Batch scan from stdin
find /uploads -newer /tmp/marker -type f | hookscan.sh generic --stdin

Batch output produces one STATUS: PATH line per file. Exit code is worst-result-wins.

10.6 Configuration

Hook scan configuration is stored in conf.maldet.hookscan (optional — defaults are built into the script). The reference defaults are in conf.maldet.hookscan.default.

Key variables:

VariableDefaultDescription
hookscan_timeout30Scan timeout in seconds
hookscan_fail_open1Allow file on scan error (0 = block)
hookscan_escalate_hits0Immediate alert at N hook hits/hour (0 = disabled)
hookscan_service_usersapache,nginx,...Service UIDs exempt from homedir restriction
hookscan_user_rate_limit60Max scans/hour for non-root callers
hookscan_user_show_signames1Show signature names to non-root callers
hookscan_list_max_bytes1048576Max list file size (1 MB)
hookscan_list_max_entries10000Max entries in file list

Run maldet --mkpubpaths after enabling to create per-user data directories for non-root scan operations.

10.7 Test Alerts

Verify that alert delivery channels are correctly configured:

maldet --test-alert scan email      # test per-scan email alert
maldet --test-alert scan slack      # test per-scan Slack alert
maldet --test-alert digest email    # test digest email alert
maldet --test-alert digest telegram # test digest Telegram alert

Test alerts use the real rendering pipeline with synthetic data. The subject line is prefixed with [TEST]. Channel isolation ensures only the specified channel fires.

10.8 Hook Digest

Hook detections are summarized via periodic digest alerts:

# On-demand digest (reads all sources: monitor + hooks)
maldet --digest

# View hook scan activity
maldet --report hooks                    # last 24 hours
maldet --report hooks --last 7d          # last 7 days
maldet --report hooks --mode modsec      # filter by mode

The daily cron job automatically fires a hook digest when new detections exist (controlled by cron_digest_hook=1 in conf.maldet).

10.9 CXS Migration

For administrators replacing CXS with LMD:

CXS ComponentLMD Equivalent
cxscgi.shhookscan.sh modsec
cxsftp.shhookscan.sh ftp
ProFTPD mod_exec to cxshookscan.sh proftpd
cxs --filehookscan.sh generic
cxswatchmaldet --monitor
/etc/cxs/cxs.confconf.maldet.hookscan

Integration

Connecting LMD with external tools, automation pipelines, and third-party scanners.

ClamAV

LMD signatures are automatically symlinked to ClamAV data directories by install.sh, providing dual-engine coverage. Set scan_clamscan=auto (default) for automatic ClamAV detection. See 3.8 ClamAV Integration for engine selection and signature validation.

ELK Stack

Enable enable_statistic=1 with elk_host, elk_port, and elk_index to stream scan events to Elasticsearch. See 3.10 ELK Integration.

Alerting Channels

LMD supports four alert delivery channels beyond email: Slack (Block Kit), Telegram (MarkdownV2), Discord (webhook embeds), and SMTP relay for environments without a local MTA. See 3.2 Alerting for configuration.

JSON Reports

Machine-readable scan output for CI/CD and automation:

maldet --format json -e SCANID    # JSON report to stdout
maldet --json-report list         # list all scans as JSON

See man maldet(1) for the v1.0 JSON schema.

Hosting Panel Detection

The daily cron auto-detects 12+ hosting control panels and adjusts scan paths. See 6. Cron Daily for the full panel matrix.


License

LMD is developed and supported on a volunteer basis by Ryan MacDonald [ryan@rfxn.com].

Linux Malware Detect (LMD) is distributed under the GNU General Public License (GPL) v2 without restrictions on usage or redistribution. The copyright statement and GNU GPL are included in the COPYING.GPL file. Credit must be given for derivative works as required under GNU GPL.


Support

The LMD source repository is at: https://github.com/rfxn/linux-malware-detect

Bugs, feature requests, and general questions can be filed as GitHub issues or sent to proj@rfxn.com.

The official project page is at: https://www.rfxn.com/projects/linux-malware-detect/