I noticed a couple of days ago that a scheduled task had stopped running. On checking LuCI, the task had been removed and the following in it's place:-
That's definitely malicious. It will fetch and execute arbitrary code from the remote location.
It's very likely that malware has been inserted other places in the router's filesystem. Using a known-clean PC (never has been connected to this router or online) re-flash the router without saving settings then set a secure password and reconfigure it.
Start by upgrading your device. 22.03.3 does have known issues, so at least upgrade to 22.03.6 (latest for the 22.03 series). Recommended would be to upgrade to to 23.05.2. Both of these will have the most up-to-date security patches.
Regarding the backup files -- I'd restore them manually -- and examine each file. The key files are usually:
Plus any that are for specific packages you're running.
Make a backup of the current system, too -- you may want to examine those files to see what might be going on (once you can do it safely on a different machine and have a secure router again).
This may not be too pernicious as it appears that the primary intent is to download a binary which most likely mines crypto and posts any profitable results to another server. The binary (named amd64) is placed in a hidden directory that starts with .systemd-private- under either /var/tmp, $HOME, or /tmp
One of the interesting things here is that this is one of the first times that I can recall seeing an OpenWrt device that was legitimately hacked or otherwise doing something that is not normal.
I am not sufficiently well versed in deconstructing stuff of this type to be able to actually say if this was a hack due to a vulnerability vs something hidden in a package that may have been installed by the OP at some point, or some other explanation. However, this behavior is almost certainly not normal nor is it expected for OpenWrt in general. I cannot personally speak to the content/purpose of this particular code, either -- this is well outside my area of expertise.
In the vast majority of "has my router been hacked" type threads, it turns out to be normal processes that are misunderstood by the posters (for example, NTP syncs or other similar processes that are mistaken for 'phone home' routines or otherwise assumed to be potentially malicious.
@jupiterx64 - when you reinstall your packages and config files, it makes sense to ensure that any tutorials you are following or configurations you put in place are well vetted. If there are any questions along the way, feel free to ask.