user@threatcheck.sh ~ threat-analysis
bash
$ analyze-threat Backdoor:Linux/Gafgyt.W!MTB
Backdoor:Linux/Gafgyt.W!MTB - Windows Defender threat signature analysis

Backdoor:Linux/Gafgyt.W!MTB - Windows Defender Threat Analysis

$ cat analysis.txt
=== THREAT ANALYSIS REPORT ===
Threat Name: Backdoor:Linux/Gafgyt.W!MTB
Classification:
Type:Backdoor
Platform:Linux
Family:Gafgyt
Detection Type:Concrete
Known malware family with identified signatures
Variant:W
Specific signature variant within the malware family
Suffix:!MTB
Detected via machine learning and behavioral analysis
Detection Method:Behavioral
Confidence:Very High
False-Positive Risk:Low

Concrete signature match: Backdoor - Provides unauthorized remote access for Linux platform, family Gafgyt

Summary:

This threat is a backdoor from the Gafgyt malware family, designed to infect Linux systems and add them to a botnet. The compromised machine can then be used by an attacker to launch Distributed Denial-of-Service (DDoS) attacks. The malware typically spreads by scanning for other devices with weak or default credentials.

Severity:
Medium
VDM Static Detection:
No specific strings found for this threat
YARA Rule:
rule Backdoor_Linux_Gafgyt_W_2147797445_0
{
    meta:
        author = "threatcheck.sh"
        detection_name = "Backdoor:Linux/Gafgyt.W!xp"
        threat_id = "2147797445"
        type = "Backdoor"
        platform = "Linux: Linux platform"
        family = "Gafgyt"
        severity = "Critical"
        info = "xp: an internal category used to refer to some threats"
        signature_type = "SIGNATURE_TYPE_ELFHSTR_EXT"
        threshold = "2"
        strings_accuracy = "Low"
    strings:
        $x_1_1 = "SCANNER STOPPED" ascii //weight: 1
        $x_1_2 = "KILLATTK" ascii //weight: 1
        $x_1_3 = {66 74 70 67 65 74 20 2d 76 20 2d 75 20 61 6e 6f 6e 79 6d 6f 75 73 20 2d 70 20 61 6e 6f 6e 79 6d 6f 75 73 20 2d 50 20 32 31 20 [0-21] 20 66 74 70 31 2e 73 68 20 66 74 70 31 2e 73 68}  //weight: 1, accuracy: Low
        $x_1_4 = {8b 4d fc 8b 45 fc 83 e8 03 8b 14 85 ?? ?? ?? ?? 8b 45 fc 83 e8 02 8b 04 85 ?? ?? ?? ?? 31 c2 8b 45 fc 31 d0 35 b9 79 37 9e 89 04 8d 80 43 05 08 ff 45 fc}  //weight: 1, accuracy: Low
        $x_1_5 = {55 89 e5 83 ec 10 8b 45 08 a3 80 43 05 08 8b 45 08 2d 47 86 c8 61 a3 84 43 05 08 8b 45 08 05 72 f3 6e 3c a3 88 43 05 08 c7 45 fc 03 00 00 00 eb 33}  //weight: 1, accuracy: High
    condition:
        (filesize < 20MB) and
        (2 of ($x*))
}
Known malware which is associated with this threat:
Filename: SecuriteInfo.com.Linux.Siggen.9999.9567.1211
2191afb2c4262dd513a776a3b7bdf9611274157a22905b7586bb2c7763ad6361
08/12/2025
Filename: mpsl
07fe72452f6ab996516bde953d29c0a75b1bb8e699ea32c13ad86c603be7da4a
08/12/2025
Filename: colonna.mpsl
f76d8568f0f331d8c4a118aab5fc4df4de3c502b20b5c5d13a02575bdfe98d9b
06/12/2025
Filename: mpsl
cdbb9c9e15bcc1361dc7acc5fe75643b6728c64ff4a200631d06c67c6a7053af
02/12/2025
Filename: mpsl
3625c3d81624dc6e8bc45b8569bab9c11601d17f52cc0deac30cd15583026716
01/12/2025
Remediation Steps:
Isolate the affected Linux system from the network to prevent lateral movement and C2 communication. Use the security product to remove the detected file and any associated persistence. Immediately change all passwords, apply system patches, and harden the system by disabling unnecessary services.
=== END REPORT ===
$ reanalyze-threat
This analysis was last updated on 08/11/2025. Do you want to analyze it again?
$ ls available-commands/
user@threatcheck.sh:~$