Concrete signature match: Backdoor - Provides unauthorized remote access for Linux platform, family Mirai
This is a concrete detection of a Linux-based backdoor belonging to the Mirai botnet family, variant AJ. The malware is designed to infect Linux IoT/embedded devices, establishing persistence and control through actions like changing file permissions (`chmod 777`) and manipulating system files, likely to enroll the device into a botnet for DDoS attacks or other malicious activities.
No specific strings found for this threat
rule Backdoor_Linux_Mirai_AJ_2147816822_0
{
meta:
author = "threatcheck.sh"
detection_name = "Backdoor:Linux/Mirai.AJ!xp"
threat_id = "2147816822"
type = "Backdoor"
platform = "Linux: Linux platform"
family = "Mirai"
severity = "Critical"
info = "xp: an internal category used to refer to some threats"
signature_type = "SIGNATURE_TYPE_ELFHSTR_EXT"
threshold = "4"
strings_accuracy = "High"
strings:
$x_1_1 = "/var/tmp/sonia" ascii //weight: 1
$x_1_2 = "/dev/FTWDT101_watchdog" ascii //weight: 1
$x_2_3 = "/bin/busybox chmod 777" ascii //weight: 2
$x_1_4 = "/dev/netslink/" ascii //weight: 1
$x_1_5 = "/bin/busybox rm -rf .file" ascii //weight: 1
$x_1_6 = "npxXoudifFeEgGaACScs" ascii //weight: 1
condition:
(filesize < 20MB) and
(
((4 of ($x_1_*))) or
((1 of ($x_2_*) and 2 of ($x_1_*))) or
(all of ($x*))
)
}fdfa52c109d3fb8faec1f646af0a972c30c767f3ab42b9e02fb6e028ac5d0832e0207d8f191257a46b9ebc289398ff80c7995998a74c20b073e8d108b89da01086a89d23fc74b81cb10aee961f4f21d5e91bb72156223155bbfd8ba4c2b727d27d1b05f19b24b7cb9d7cfc5053b98da46c922e19282981a0407f5815fd65a1e5c3340f7f279d4362a1a3a7182a4e07ae41a74febd11299b97b468c3aeda3473bImmediately isolate the infected Linux device from the network. Identify and terminate any malicious processes, then remove all associated files (e.g., in `/var/tmp/sonia`). Change all default or weak administrative credentials, update device firmware and software, and implement strong network segmentation and firewall rules to prevent reinfection and further propagation.